Security Research
Metarget Update: Enhanced Open-Source Cyber Range with Over 330 Vulnerabilities and Seamless One-Click Recovery
When researching vulnerabilities, we often find that environment setup takes up a significant amount of time, and in comparison, the actual time spent testing PoCs and exploits may be relatively short. Meanwhile, ...
CVE-2024-0012 – PAN-OS Security Vulnerability – November 2024
A critical vulnerability (CVE-2024-0012) in PAN-OS firewalls threatens secure access and enables unauthorized system exploitation. Affected Platform CVE-2024-0012 is a critical vulnerability impacting Palo Alto Networks’ PAN-OS, the operating system underpinning the ...
CVE-2024-9474 – PAN-OS Security Vulnerability – November 2024
A critical vulnerability (CVE-2024-9474) in PAN-OS exposes networks to unauthorized access and control, creating significant security risks. Affected Platform CVE-2024-9474 affects Palo Alto Networks’ PAN-OS, specifically versions utilized in the company’s firewall ...
CVE-2024-43093 – Android Security Vulnerability – November 2024
A critical vulnerability (CVE-2024-43093) in the Android operating system allows privilege escalation, posing significant risks to affected devices. Affected Platform CVE-2024-43093 affects devices running Android, specifically versions 11 through 14. Identified in ...
CVE-2024-49039 – Windows Security Vulnerability – November 2024
A critical vulnerability (CVE-2024-49039) in Windows Task Scheduler enables privilege escalation through improper authentication. Affected Platform CVE-2024-49039 targets Microsoft Windows platforms, exploiting vulnerabilities in the Windows Task Scheduler. The issue has been ...
Fortune 1000 at risk: How we discovered 30k exposed APIs & 100k API vulnerabilities in the world’s largest organizations
Discover the alarming state of API security in Fortune 1000 and CAC 40. Escape's latest research reveals 2k high-risk vulnerabilities ...
Ten Lessons Learned from The Mother of All Breaches Data Leak
What a year after the Mother of All Breaches data leak has taught us on cybersecurity, data protection, and more. It’s almost been a year since the “Mother of All Breaches” (MOAB), ...
CVE vs KEV Explained: Key Insights for Cybersecurity Leaders
CVEs and KEVs share some similarities, but understanding their distinctions is key to enhancing your organization’s security posture. To protect their organizations, cybersecurity professionals must understand and prioritize continually emerging vulnerabilities. In ...
Understand CVE vs CVSS for Improved Cybersecurity
CWEs and CVEs have similarities and differences. Understanding both can help you keep your organization secure. Staying ahead of vulnerabilities is critical for any cybersecurity pro tasked with protecting an organization’s assets ...
Cybersecurity Vulnerability News: October 2024 CVE Roundup
Keep Your Organization Safe with Up-to-Date CVE Information Cybersecurity vulnerability warnings from the National Institute of Standards and Technology (NIST) continue to identify critical concerns. If not promptly addressed, your organization is ...