Blog posts
All posts
NodeZero: autonomous, scalable and surprisingly affordable
See more, fix faster, pay less. That's the promise of NodeZero. Why still pay for a one-time pen test when, for less money, you can always have up-to-date insight? That's what NodeZero delivers. Recognize[...]
Domain compromise via Veeam: a leak no one saw coming
Strong passwords? Too bad. This Veeam vulnerability bypasses everything. Strong password? Check. Up-to-date systems? Check. But what if your backup software itself is the leak? CVE-2023-27532 shows that you need more than best practices.[...]
Why autonomous pentests do work (and scripted tools fail)
Automated = stupid. Autonomous = smart. NodeZero shows the difference. You may be thinking: automation is saving money. But when it comes to pen testing, that doesn't work. Unless you test autonomously. And that's[...]
Chinese RAT-attack and your edge devices: how vulnerable are you really?
The attack on the Dutch Ministry of Defense began at a Fortigate. Why that should be your concern too. The MIVD warned of Chinese malware via edge devices. Think your firewall is safe? This[...]
This is how “chaining” works in NodeZero: smart hacking like a real attacker
Hackers think in chains, not CVE scores. Find out why “chaining” is indispensable for realistic pen testing. Many pen tests provide a list of vulnerabilities. But what if the real threat is not in[...]
Improve your Password Policy with NodeZero’s AD Password Audit
In today's digital world, a strong password policy is crucial for your organisation's security. One of our customers, a large secondary school in Gelderland, the Netherlands, runs monthly AD Password Audit scans and has[...]