On-Prem Misconfigurations Lead to Entra Tenant Compromise 

On-Prem Misconfigurations Lead to Entra Tenant Compromise 

As enterprises continue to transition on-premises infrastructure and information systems to the cloud, hybrid cloud systems have emerged as a vital solution, balancing the benefits of both environments to optimize performance, scalability, ...
someone taking notes on a digital pad

Google Extends Generative AI Reach Deeper into Security

The Google Chronicle cybersecurity platform extensions are based on the Gemini LLM with the addition of cybersecurity data ...
Security Boulevard
NodeZero APT: Azure Password Spray Leads to Business Email Compromise

NodeZero APT: Azure Password Spray Leads to Business Email Compromise

| | attack paths
NodeZero APT: Azure Password Spray to Business Email Compromise The post NodeZero APT: Azure Password Spray Leads to Business Email Compromise appeared first on Horizon3.ai ...
The Elephant In the Room – NTLM Coercion and Understanding Its Impact

The Elephant In the Room – NTLM Coercion and Understanding Its Impact

| | attack paths, Blog
Since introducing NTLM coercion techniques such as PetitPotam into the NodeZero platform, we frequently have security practitioners request help understanding these techniques and what impact they have to their enterprise. […] The ...
AWS Misconfiguration Leads to Buckets of Data

AWS Misconfiguration Leads to Buckets of Data

| | attack paths, Blog
Misconfigured AWS Role Enables Cloud Initial Access The post AWS Misconfiguration Leads to Buckets of Data appeared first on Horizon3.ai ...
Apache ActiveMQ RCE Leads to Domain Compromise

Apache ActiveMQ RCE Leads to Domain Compromise

| | attack paths, Blog
Pervasive CISA Known Exploited Vulnerability Enables Initial Access The post Apache ActiveMQ RCE Leads to Domain Compromise appeared first on Horizon3.ai ...
NodeZero Pivots Through Your Network with the Attacker’s Perspective

NodeZero Pivots Through Your Network with the Attacker’s Perspective

| | attack paths, Blog
A NodeZero autonomous attack that leveraged two weaknesses to achieve domain compromise in 33 minutes, 9 seconds. The post NodeZero Pivots Through Your Network with the Attacker’s Perspective appeared first on Horizon3.ai ...
Privileged Credentials Often Bite Back

Privileged Credentials Often Bite Back

| | attack paths, Blog
Active Directory Analytics Solution Enables Domain Compromise The post Privileged Credentials Often Bite Back appeared first on Horizon3.ai ...
You Can’t Manage Risk if You Lack Context

You Can’t Manage Risk if You Lack Context

| | attack paths, Blog
Low-Level Vulnerability Leads to Domain Compromise The post You Can’t Manage Risk if You Lack Context appeared first on Horizon3.ai ...
cloud costs, security, finops,

Orca Security Reports Widespread Cloud Security Issues

An Orca Security analysis of cloud workload and configuration data captured from billions of assets running on Amazon Web Services (AWS), Microsoft Azure and Google Cloud Platform in the first half of ...
Security Boulevard