Horizon3.ai, the leading provider of offensive security solutions, announced the availability of High-Value Targeting, Advanced Data Pilfering, Threat Actor Intelligence, and Vulnerability Risk Intelligence. Together, these capabilities bring attacker context directly into risk-based vulnerability management (RBVM) – defining a new standard for how enterprises identify, prioritize, and fix what matters most.
“Today we’re closing a gap by giving defenders the upper hand and turning attackers’ own tactics against them,” said Snehal Antani, CEO and Co-Founder, Horizon3.ai. “Attackers have long focused on the weaknesses most likely to give them leverage. With these new RBVM enhancements, we’re enriching vulnerability management by arming security leaders with the proof to focus on what matters most.”
Cyber Technology Insights : Intruder’s 2025 Exposure Management Index Reveals Growing Cyber Risks
This release represents the next evolution of the NodeZero platform, moving beyond autonomous pentesting to attacker-validated risk management. Where continuous pentesting helped organizations move from noise to exploitability, RBVM is now a significant step forward to help teams mature from endless lists of vulnerabilities to clear, attacker-validated risk prioritization.
Today’s specific advancements include:
- High-Value Targeting (HVT): prioritizes an organization’s most impactful weaknesses, such as compromised executive identities and critical production systems, then emulates threat actor behavior like executive impersonation, critical system shutdown, and operational disruption.
- Advanced Data Pilfering (ADP): uncovers clear signals too often buried in static, ranking what attackers are most likely to steal such as from credentials hidden in file servers, unannounced financials in ERPs, or sensitive source code in developer environments. Each finding is then autonomously tied to associated risks such as intellectual-property theft, regulatory breach, or ransomware exposure.
- Threat Actor Intelligence (TAI): announced earlier this year, TAI links attack tactics, techniques, and procedures (TTPs) to the real-world adversaries who use them, from ransomware crews to nation-state groups, and demonstrates the technical and business impact of attacks.
Cyber Technology Insights : 61% of Cybersecurity Experts Eye AI Adoption as Manufacturing Cyber Risks Escalate
- Vulnerability Risk Intelligence (VRI): transforms raw vulnerability data into attacker-prioritized intelligence by bridging the gap between scanning and attacker validation. NodeZero is able to analyze and classify findings by exploitability, threat actor pressure, and business risk, removing noise, reducing false negatives, and speeding up the vulnerability management process.
Together, HVT, ADP, TAI, and VRI build directly on NodeZero’s pentest findings, adding attacker context to every operation and process. Every attack graph node is annotated with adversary, target, and data context, giving enterprises attacker-driven findings they can quickly act on.
With these new capabilities, NodeZero now gives security teams a unified view of attacker-validated risk, reducing remediation times as well as increasing process efficiency in finding, fixing, and verifying risks.
Cyber Technology Insights : TXOne Report Highlights Rising OT/ICS Cyber Risks Amid Global Digital Transformation
Source: businesswire
To participate in our interviews, please write to our CyberTech Media Room at info@intentamplify.com




