Security Research
Recent Critical Vulnerabilities: August 2024 CVE Roundup
Protecting Organizations with Up-to-Date CVE Awareness Reports from the National Institute of Standards and Technology (NIST) through its National Vulnerability Database (NVD) highlight critical cybersecurity vulnerabilities that demand immediate attention and underscore ...
CVE-2024-38178 Vulnerability within Microsoft Edge
High threat level vulnerability CVE-2024-38178 discovered on Microsoft Edge browser : OFFICIAL CVE-2024-38178 PATCHING INFORMATION : A recent discovery has unveiled CVE-2024-38178, a critical vulnerability within Microsoft Windows, which impacts Internet Explorer ...
Protect Critical Operations with OT Network Segmentation
As aspects of the business world that were once independent from one another have become increasingly interconnected, the convergence of Operational Technology (OT) and Information Technology (IT) has led to unprecedented ...
SquareX at Hacker Summer Camp: DEF CON 32 Day 1
Day 1 Recap with Team SquareXEnergized from the rush of Black Hat USA, Team SquareX dove straight into the next phase of Hacker Summer Camp: DEF CON 32. This year, the event was ...
The Role of Microsegmentation in Kubernetes Environments
Optimizing Kubernetes security and efficiency of through granular control Kubernetes stands out as a powerful and versatile platform amongst application systems, allowing organizations to efficiently manage containers. However, enterprises face security challenges ...
Recent Vulnerabilities in Cybersecurity: July 2024 CVE Roundup
Recent cybersecurity vulnerabilities reported on the National Institute of Standards and Technology (NIST)’s National Vulnerability Database pose significant risks to organizations worldwide. Without mitigation, data breaches and system compromises are possible. July’s ...
Navigating Cybersecurity Legal Liabilities
Safeguarding your business with an emphasis on cybersecurity also means understanding potential legal liabilities The digital landscape offers opportunities for businesses to thrive and connect with consumers worldwide. However, these opportunities come ...
Introducing the API Threat Landscape, a new resource for API security researchers
Since 2022, Escape's security research team has been tracking API-related data breaches. We’ve decided to make our database public, providing detailed insights into primary attack vectors, threat actors, tools, and techniques. The ...
What are CIS Benchmarks?
What are CIS Benchmarks, their practical benefits, and the process on implementing them in your organization’s security policy? In cybersecurity, the Center for Internet Security (CIS) Benchmarks stand as a cornerstone for ...
CVE of the month, CheckPoint Security Gateway exploit CVE-2024-24919
This month we dive into CheckPoints CVE-2024-24919 to explain what this vulnerability does and why we have seen it being used in the wild already! ...