Explore Risk Horizon Blogs & Articles

Blog

Managing the National Vulnerability Database (NVD) Issue: Solutions for Improved Vulnerability Management

Recent reports have revealed a significant issue with the National Vulnerability Database (NVD) that may impact your vulnerability management activities. The NVD is a widely recognized and longstanding vulnerability

Learn more
Blog

RiskHorizon.ai Joins NVIDIA Inception: Accelerating Innovation in AI-Driven Cybersecurity

We are thrilled to announce that RiskHorizon.ai has been accepted into the NVIDIA Inception program. This collaboration underscores our commitment to advancing AI-driven cybersecurity solutions and positions us to deliver even more effective protections against evolving cyber threats.

Learn more
Blog

RiskHorizon AI Joins Elite CrowdStrike, AWS & NVIDIA Cybersecurity Accelerator to Advance AI-Powered Exposure Management

[Silicon Valley, February 26, 2025] – RiskHorizon AI, an emerging leader in AI-driven exposure management, has been selected to participate in the CrowdStrike and AWS 2025 Cybersecurity Accelerator, alongside its continued participation in NVIDIA’s Inception Program. This selection places RiskHorizon.ai among a distinguished co

Learn more
Blog

Understanding APT29: A Closer Look at the Cyber Threat Landscape

Recently, Microsoft disclosed a concerning security breach involving, APT 29, also known as Cozy Bear or Midnight Blizzards. This sophisticated group gained unauthorized access to a corporate Microsoft cloud tenant through a simple trick called a “Password Spraying Attack.

Learn more
Blog

China Nation State (All Threat Actors)

Recent reports from FBI Director Christopher Wray underscore an alarming surge in Chinese-affiliated hacking activities, particularly targeting critical US infrastructure. Wray’s testimony before the House Select Committee on the Chinese Communist Party reveals a growing and imminent threat.

Learn more
Blog

The Implications of a $20 Million Zero-Day

Russian based Operation Zero has unveiled a monumental $20 million bounty for zero-day exploits, targeting the extensive iPhone and Android ecosystem. This move comes amidst a backdrop of escalating geopolitical tensions, where digital exploits are becoming tools in a new era of

Learn more

Experience the Future of
Cybersecurity Today