New in NodeZero®

Security Practitioner

SEARCH

CATEGORIES

TAGS

    Mythos Didn’t Break Cybersecurity. It Exposed What Was Already Broken.

    April 17, 2026
    Mythos shows that finding vulnerabilities isn’t the problem—understanding exploitability and impact is what security teams are missing.

    Incident Response Remediation: How to Eliminate Attack Paths After a Breach

    April 8, 2026
    Digital threat monitoring shows threats and exposure—but not whether attackers can exploit your environment. Here’s what matters next.

    10 Minutes with Claude: Remote Code Execution in Apache ActiveMQ (CVE-2026-34197)

    April 7, 2026
    CVE-2026-34197 enables remote code execution in ActiveMQ via Jolokia. Exploitation chains VM transport and remote config loading.

    Best Tools for Digital Threat Monitoring and Cyber Threat Visibility

    April 1, 2026
    Digital threat monitoring reveals attacker activity and exposure across your environment—but does it show what’s actually exploitable?

    When Conflict Extends Into Cyberspace: What Security Leaders Should Expect

    March 16, 2026
    Iranian cyber operators are increasingly targeting critical infrastructure and enterprise systems. Here’s what security leaders should expect and how to prepare.

    Preemptive Exposure Management Is the Goal. Autonomous Attack Validation Is How You Get There.

    March 4, 2026
    Reacting to cyberattacks has never been a winning strategy. Most organizations know this, yet many still find themselves responding after the fact, investigating incidents, explaining impact, and rebuilding trust with leadership. What’s changed is a growing recognition that risk must be reduced before attackers act, not measured after the damage is done. That’s the promise…

    When “Read-Only” Isn’t: K8s nodes/proxy GET to RCE

    February 27, 2026
    A Kubernetes service account with “read-only” nodes/proxy GET permission can execute arbitrary commands across pods via the kubelet API. This post breaks down how WebSocket behavior turns monitoring access into cluster-wide RCE—and how NodeZero detects it.
    Kubernetes nodes/proxy GET permission leading to kubelet remote code execution attack path

    How Do I Choose the Best Pentesting Solution for My Business?

    February 25, 2026
    Choosing a penetration testing solution isn’t a box-checking exercise. When the approach doesn't fit the need, teams often waste budget and time while walking away with a false sense of security. A clean pentest report might look reassuring, but it doesn’t automatically mean defenses are effective or that risk is actually being reduced. A better…

    How Horizon3.ai’s NodeZero® Platform Supports the Realtime Evaluation of the Effectiveness of Zero Trust Functionality for the US Federal Government.

    February 5, 2026
    NodeZero® enables federal agencies to continuously validate Zero Trust controls in production environments, delivering real-time, adversary-driven proof aligned to FedRAMP, NIST, CMMC, and DoD Zero Trust mandates.

    CVE-2025-40551: Another Solarwinds Web Help Desk Deserialization Issue

    January 28, 2026
    CVE-2025-40551 details multiple chained vulnerabilities in SolarWinds Web Help Desk that allow unauthenticated attackers to achieve remote code execution on vulnerable instances.