attack paths

On-Prem Misconfigurations Lead to Entra Tenant CompromiseÂ
As enterprises continue to transition on-premises infrastructure and information systems to the cloud, hybrid cloud systems have emerged as a vital solution, balancing the benefits of both environments to optimize performance, scalability, ...

Google Extends Generative AI Reach Deeper into Security
The Google Chronicle cybersecurity platform extensions are based on the Gemini LLM with the addition of cybersecurity data ...

NodeZero APT: Azure Password Spray Leads to Business Email Compromise
NodeZero APT: Azure Password Spray to Business Email Compromise The post NodeZero APT: Azure Password Spray Leads to Business Email Compromise appeared first on Horizon3.ai ...

The Elephant In the Room – NTLM Coercion and Understanding Its Impact
Since introducing NTLM coercion techniques such as PetitPotam into the NodeZero platform, we frequently have security practitioners request help understanding these techniques and what impact they have to their enterprise. […] The ...

AWS Misconfiguration Leads to Buckets of Data
Misconfigured AWS Role Enables Cloud Initial Access The post AWS Misconfiguration Leads to Buckets of Data appeared first on Horizon3.ai ...

Apache ActiveMQ RCE Leads to Domain Compromise
Pervasive CISA Known Exploited Vulnerability Enables Initial Access The post Apache ActiveMQ RCE Leads to Domain Compromise appeared first on Horizon3.ai ...

NodeZero Pivots Through Your Network with the Attacker’s Perspective
A NodeZero autonomous attack that leveraged two weaknesses to achieve domain compromise in 33 minutes, 9 seconds. The post NodeZero Pivots Through Your Network with the Attacker’s Perspective appeared first on Horizon3.ai ...

Privileged Credentials Often Bite Back
Active Directory Analytics Solution Enables Domain Compromise The post Privileged Credentials Often Bite Back appeared first on Horizon3.ai ...

You Can’t Manage Risk if You Lack Context
Low-Level Vulnerability Leads to Domain Compromise The post You Can’t Manage Risk if You Lack Context appeared first on Horizon3.ai ...

Orca Security Reports Widespread Cloud Security Issues
An Orca Security analysis of cloud workload and configuration data captured from billions of assets running on Amazon Web Services (AWS), Microsoft Azure and Google Cloud Platform in the first half of ...