Security Practitioner
Filter Content:
Categories:
Tags:
June 17, 2025 | Attack Blogs, Disclosures
Learn how Horizon3.ai uncovered CVE-2025-34508 in ZendTo, allowing attackers to access sensitive files through a path traversal flaw.June 12, 2025 | Blogs
Rewriting Cybersecurity Rules. Led by veterans and ethical hackers, Horizon3.ai's NodeZero platform is transforming how organizations defend against threats.June 9, 2025 | Attack Blogs
Discover how NodeZero's autonomous RAT operates, why credentials dominate post-exploitation, and what it means for your cyber defense.May 29, 2025 | Attack Blogs
Explore how a hard-coded JWT in Cisco IOS XE WLC enables unauthenticated file upload and potential RCE—and how to mitigate…May 22, 2025 | Attack Blogs
Analyze CVE-2025-32756, a Fortinet buffer overflow flaw under active attack, and see how NodeZero can validate exposure now.May 2, 2025 | Blogs
Discover how NodeZero emulates real attackers to uncover critical attack paths, escalate access, and deliver proof—fast and autonomously.April 30, 2025 | Video
DoD supply chain cyber threats are surging. Learn how CAPT helps suppliers find, fix & verify gaps with scalable, autonomous…April 28, 2025 | Blogs
Security leaders can’t afford blind spots. Learn why proving security effectiveness is now a must—and how to meet the Duty…April 9, 2025 | Attack Blogs, Disclosures
CVE-2025-3248 is a critical code injection vulnerability affecting Langflow, a popular tool used for building out agentic AI workflows. This…April 7, 2025 | Blogs
Spring updates are here! Explore NodeZero’s latest threat detection, pentest, and insights features—built to stay ahead of attackers.