Recent Critical Vulnerabilities: August 2024 CVE Roundup

Protecting Organizations with Up-to-Date CVE Awareness  Reports from the National Institute of Standards and Technology (NIST) through its National Vulnerability Database (NVD) highlight critical cybersecurity vulnerabilities that demand immediate attention and underscore ...

CVE-2024-38178 Vulnerability within Microsoft Edge

High threat level vulnerability CVE-2024-38178 discovered on Microsoft Edge browser : OFFICIAL CVE-2024-38178 PATCHING INFORMATION : A recent discovery has unveiled CVE-2024-38178, a critical vulnerability within Microsoft Windows, which impacts Internet Explorer ...

Protect Critical Operations with OT Network Segmentation

  As aspects of the business world that were once independent from one another have become increasingly interconnected, the convergence of Operational Technology (OT) and Information Technology (IT) has led to unprecedented ...
The Birth of DEF CON and Black Hat Hacker Conferences | Jeff Moss | Be Fearless Podcast EP 1

SquareX at Hacker Summer Camp: DEF CON 32 Day 1

Day 1 Recap with Team SquareXEnergized from the rush of Black Hat USA, Team SquareX dove straight into the next phase of Hacker Summer Camp: DEF CON 32. This year, the event was ...

The Role of Microsegmentation in Kubernetes Environments

Optimizing Kubernetes security and efficiency of through granular control Kubernetes stands out as a powerful and versatile platform amongst application systems, allowing organizations to efficiently manage containers. However, enterprises face security challenges ...

Recent Vulnerabilities in Cybersecurity: July 2024 CVE Roundup

Recent cybersecurity vulnerabilities reported on the National Institute of Standards and Technology (NIST)’s National Vulnerability Database pose significant risks to organizations worldwide. Without mitigation, data breaches and system compromises are possible. July’s ...

Navigating Cybersecurity Legal Liabilities

Safeguarding your business with an emphasis on cybersecurity also means understanding potential legal liabilities The digital landscape offers opportunities for businesses to thrive and connect with consumers worldwide. However, these opportunities come ...
Introducing the API Threat Landscape, a new resource for API security researchers

Introducing the API Threat Landscape, a new resource for API security researchers

Since 2022, Escape's security research team has been tracking API-related data breaches. We’ve decided to make our database public, providing detailed insights into primary attack vectors, threat actors, tools, and techniques. The ...

What are CIS Benchmarks?

What are CIS Benchmarks, their practical benefits, and the process on implementing them in your organization’s security policy? In cybersecurity, the Center for Internet Security (CIS) Benchmarks stand as a cornerstone for ...
CVE of the month, CheckPoint Security Gateway exploit CVE-2024-24919

CVE of the month, CheckPoint Security Gateway exploit CVE-2024-24919

This month we dive into CheckPoints CVE-2024-24919 to explain what this vulnerability does and why we have seen it being used in the wild already! ...

Application Security Check Up