Whitepapers

Enhancing Cybersecurity Post-Breach: A Comprehensive Guide
Enhance cybersecurity post-breach with 7 strategies using NodeZeroâ„¢ for continuous testing, threat detection, and improved defenses for lasting protection. The post Enhancing Cybersecurity Post-Breach: A Comprehensive Guide appeared first on Horizon3.ai ...

Stay Ahead of Cyber Threats with Autonomous Penetration Testing
Explore how autonomous penetration testing with NodeZero helps organizations meet NIS 2 compliance by enhancing cybersecurity through scalable, efficient risk assessments. The post Stay Ahead of Cyber Threats with Autonomous Penetration Testing ...

New Industry Study: 70% Of Teams Skip Security Steps
Hot off the presses, the Fall 2021 Invicti AppSec Indicator is shedding light on the state of web application security (AppSec), including areas for improvement to speed up software innovation. The report, ...

Interplanetary Storm Botnet Shows Signs of Anonymization-Purpose Proxy-for-Hire Infrastructure
While botnets have been used for anything from performing Distributed Denial-of-Service (DDoS) attacks to stealing data and even sending spam, Bitdefender researchers have found signs that the Interplanetary Storm botnet could be ...

LemonDuck Crypto-Miner – a KingMiner Successor
Crypto-miners have been around for several years, in all forms and shapes, and distributed via various attack avenues. Increased competition from other cyber-criminal groups and various defenses set in place at the ...

How Well Are Enterprises Handling Web Application Security?
Enterprises are continuously battling criminals on many fronts. It’s an all-out war against enemies that are well-hidden and remain unpredictable. And the stakes are high – an effective, multi-stage attack can cripple ...

APT Hackers for Hire Used for Industrial Espionage
Bitdefender recently investigated an APT-style cyberespionage attack targeting an international architectural and video production company, pointing to an advanced threat actor and South Korean-based C&C infrastructure. The targeted company is known to ...

Smart Locks Not So Smart with Wi-Fi Security
The rise of online property rental in an increasingly competitive sharing economy has had a severe impact on the adoption of Internet-connected smart locks. Packed with features that allow landlords to issue ...

Kingminer Botnet Keeps up with the Times
The e-currency boom in late 2017 sparked a new type of “gold rush”, as cyber-criminals started racing to infect home computers and data centers with crypto-miners. While digital currencies have fluctuated wildly ...

StrongPity APT – Revealing Trojanized Tools, Working Hours and Infrastructure
Bitdefender researchers have recently found the APT group StrongPity has been targeting victims in Turkey and Syria. Using watering hole tactics to selectively infect victims and deploying a three-tier C&C infrastructure to ...