Security Practitioner
Filter Content:
Categories:
Tags:
October 11, 2022 | Attack Blogs
Introduction The recent FortiOS / FortiProxy / FortiSwitchManager CVE has been reportedly exploited in the wild. We would like to…September 13, 2022 | Customer Stories
Pen testers, vulnerability scanners, and installed agents alert on potential vulnerabilities and breaches. You receive a list, or a notification,…August 31, 2022 | Blogs
Researchers recently discovered some 900,000 Kubernetes clusters that were potentially exposed to malicious scans and data theft during a threat-hunting…August 30, 2022 | Webinar Replays
Noah King, one of Horizon3's front-end developers, is inviting you into his experience as he learns to be an expert…August 30, 2022 | Webinar Replays
Attackers don't have to "hack in" using zero-day vulnerabilities. Often, attackers log in by chaining together misconfigurations, dangerous product defaults,…August 25, 2022 | Webinar Replays
As the industry accelerates toward a threat landscape of attack and defense by algorithm and machine, humans must run at…July 13, 2022 | Attack Blogs
It's been more than six months since the Log4Shell vulnerability (CVE-2021-44228) was disclosed, and a number of post-mortems have come…June 29, 2022 | Disclosures
CVE-2022-28219 is an unauthenticated remote code execution vulnerability affecting Zoho ManageEngine ADAudit Plus, a compliance tool used by enterprises to…June 28, 2022 | Webinar Replays
In this session, Noah and his mentors will not only explore why the Kerberoasting attack technique is so pervasive and…June 28, 2022 | Webinar Replays
With the announcement of the addition of external penetration testing capabilities to NodeZero, Horizon3.ai is hosting a webinar to introduce…