Exposed APIs and issues in the world’s largest organizations

In this Help Net Security video, Tristan Kalos, CEO of Escape, discusses the results of its 2024 State of API Exposure report. The study highlights significant API security gaps affecting Fortune 1000 organizations, with over 28,500 exposed APIs and 98… Continue reading Exposed APIs and issues in the world’s largest organizations

Common API security issues: From exposed secrets to unauthorized access

Despite their role in connecting applications and driving innovation, APIs often suffer from serious security vulnerabilities. Recent investigations reveal that many organizations are struggling with exposed secrets such as passwords and API keys, whic… Continue reading Common API security issues: From exposed secrets to unauthorized access

Does emulation/software virtualization provide more isolation/security vs hardware virtualization?

From my understanding:

I can emulate many different architectures and systems with qemu as a user(mode) process.
There is separate user address space per process.
If a malicious process were to escape emulation it could compromise the use… Continue reading Does emulation/software virtualization provide more isolation/security vs hardware virtualization?

Researchers discover exposed API secrets, impacting major tech tokens

Escape’s security research team scanned 189.5 million URLs and found more than 18,000 exposed API secrets. 41% of exposed secrets were highly critical, i.e. could lead to financial risks for the organizations. Exposed API secrets The exposed secrets in… Continue reading Researchers discover exposed API secrets, impacting major tech tokens

Hackaday Links: August 20, 2023

Hackaday Links Column Banner

In some ways, we’ve become a little jaded when it comes to news from Mars, which almost always has to do with the Ingenuity helicopter completing yet another successful flight. …read more Continue reading Hackaday Links: August 20, 2023

Why am I able to access EC2 metadata endpoint from within a Docker container running in the EC2

My understanding of containers is very basic and so is my understanding of AWS EC2. Recently while trying to debug a security issue, I came across a scenario where I was able to gain an RCE. Whether this RCE was in a container or on the EC… Continue reading Why am I able to access EC2 metadata endpoint from within a Docker container running in the EC2