Horizon3.ai
Horizon3.ai

Research Blog

Welcome to our cybersecurity research blog where we uncover how malicious actors exploit weaknesses in systems, while going beyond the technical aspects and examining real-world perspectives across various industries.

Here you’ll find extensive research and insight from the well-known Horizon3.ai attack team, intuitive perspectives on everything security, and real-world attack path short stories that come directly from discoveries made by NodeZero.

Filters

Categories
Tags

Showing 13–18 of 137 results

Fireside Chat: Horizon3.ai and Moravian University

Horizon3.ai Principal Security SME Stephen Gates and Moravian University Director of Information Security James Beers discuss: - How James measures cyber risk within their constantly changing educational environment - What kinds of attacker TTPs are the most worrisome to organizations in higher education - Why an offensive approach to discover and mitigate exploitable vulnerabilities works best
Read More

Rust Won’t Save Us: An Analysis of 2023’s Known Exploited Vulnerabilities

Introduction Memory safety issues have plagued the software industry for decades. The Cybersecurity & Infrastructure Security Agency (CISA) has been leading a charge for secure-by-design and encouraging developers and vendors to utilize memory safe languages like Rust to eradicate this vulnerability class.  Google Chromium, the engine used by the majority of browsers around the world, reports that approximately 70% of...
Read More

CVE-2024-21893: Another Ivanti Vulnerability Exploited in the Wild. Verify with NodeZero Today!

On 22 January, Ivanti published an advisory stating that they discovered two new, high-severity vulnerabilities (CVE-2024-21888 and CVE-2024-21893) after researching previously reported vulnerabilities affecting Ivanti Connect Secure, Ivanti Policy Secure and ZTA gateways. Ivanti provides enterprise solutions, including patch management and IT security solutions to over 40,000 customers worldwide. While there is no evidence of any customers being impacted by...
Read More

CVE-2024-23897: Check Critical Jenkins Arbitrary File Leak Vulnerability Now!

On 24 January 2024, the Jenkins team issued a security advisory disclosing a critical vulnerability that affects the Jenkins CI/CD tool. Jenkins is a Java-based open-source automation server run by over 1 million users that helps developers build, test and deploy applications, enabling continuous integration and continuous delivery. The critical vulnerability is tracked as CVE-2024-23897 and affects Jenkins 2.441 and...
Read More