Using NodeZero® to Uncover the Paths Attackers Take, Before They Do
As someone who approaches networks with the intent to break in (ethically, of course), I know firsthand that the best way to secure an environment is to test it like a real adversary would. NodeZero,...
View ArticleGlobal InfoSec Awards 2025
Global InfoSec Awards 2025 Outstanding Adversarial Exposure Validation… Source
View ArticleHorizon3.ai Gains FedRAMP High Authorization, Delivering on Its Commitment to...
Business Wire 05/15/2025 Horizon3.ai, the global leader in offensive security, today announced it has gained Federal Risk and Authorization Management Program (FedRAMP®) High Authorization, unlocking...
View ArticleFrom War Room to Board Room: Own the Narrative.
It’s not when a breach occurs. It’s the time between discovering a critical weakness and verifying it’s fixed. That’s when your board will ask: “Why wasn’t it remediated faster?” Today, leadership is...
View ArticleHow Hackers Weaponize Slack: Lessons From Real Slack Dump Attacks
Slack has become seemingly ubiquitous among the workforce. The email disruptor, now owned by Salesforce, serves over 200K paid organizations, including 77 of the Fortune 100. As with most solutions...
View ArticleJerome’s Furniture: Compliance to Real Security
Jerome’s Furniture is committed to providing high-quality home furnishings at everyday low prices, treating customers like family, and ensuring transparency, service, honesty, quality, and a...
View ArticleCVE-2025-32756: Low-Rise Jeans are Back and so are Buffer Overflows
On May 13, 2025, FortiGuard Labs published an advisory detailing CVE-2025-32756, which affects a variety of Fortinet products: In their advisory, FortiGuard Labs states that Fortinet has observed this...
View ArticleCVE-2025-32756
A critical vulnerability, CVE-2025-32756, has been identified in various Fortinet products, including FortiCamera, FortiMail, FortiNDR, FortiRecorder, and FortiVoice. Threat actors are actively...
View ArticleCisco IOS XE WLC Arbitrary File Upload Vulnerability (CVE-2025-20188) Analysis
A recent Cisco disclosure detailed a vulnerability affecting Cisco IOS XE Wireless Controller Software version 17.12.03 and earlier. The issue was described as an unauthenticated arbitrary file upload,...
View ArticleCVE-2025-20188
CVE-2025-20188 is a critical arbitrary file upload vulnerability found in Cisco IOS XE Wireless Controller Software, including versions used in Catalyst 9800 and Embedded Wireless Controllers. It is...
View Article