Digital transformation of healthcare can lead to better treatments, improved outcomes, and reduced costs for healthcare organizations.
Horizon3.ai experts were in the news this week on topics ranging from the future of penetration testing, the Atlassian Confluence flaw, AI.
Shields Health Care Group, Inc. reported this week that it is investigating a data breach which may have impacted 56 healthcare facilities and the patients of those facilities.
University credentials being sold on the dark web and used against individuals or the institution itself in subsequent cyberattacks.
The CISOs Report finds CISOs are prioritizing Zero Trust and partner risk management to mitigate critical security challenges.
NodeZero is the first autonomous penetration testing platform to offer both internal and external pentesting in one self-service platform.
The Horizon3.ai Attack Team released their VMware Authentication Vulnerability (CVE-2022-22972) Technical Deep Dive.
XorDdos Is continuing to hunt servers with weak passwords. According to a recent post from Microsoft, there’s been a 254% increase in activity from XorDdos – an eight-year-old network of infected Linux machines used for DDoS attacks.
Horizon3.ai news, including an award nomination, plus cybersecurity updates for education and M&A.
The Log4Shell RCE vulnerability in Apache Log4j, CVE-2021-44228, dates to 2013 when Log4j 2.0-beta9 was released. An analysis of our pentesting data using NodeZero identified and provided proof of exploit for over 105 unique instances of the CVE within our customers’ environments.
It took just two days for a pair of researchers from Horizon3.ai to discover exploits for the new F5 BIG-IP vulnerability, and have called for devices to be immediately updated to protect against bad actors.
It’s World Password Day, but it’s never a bad time to think about credential security and usage. Credentialed attacks are the most popular means of entry into any digital infrastructure, and remain the easiest method of reconnaissance and privilege escalation for bad actors. With some of the most sophisticated open-source attack tools to date, it’s important for organizations to fight machine speeds with machine speeds, and humans by exception.