CanisterWorm: When a CI/CD Breach Became a Self-Spreading npm Worm
A supply chain compromise moved from CI pipelines into the npm ecosystem, stealing secrets, hijacking packages, and persisting on developer...
A supply chain compromise moved from CI pipelines into the npm ecosystem, stealing secrets, hijacking packages, and persisting on developer...
A critical vulnerability was announced today affecting React Server Components (RSC), which affects React (CVE-2025-55182) and all frameworks using RSC,...
Table of contentsWhat is the OWASP Non-Human Identities Top 10 Project?A deep dive into the NHI Top 101. NHI1:2025 -...
Remediating an issue like today’s outage on Windows machines with the CrowdStrike Falcon Sensor at cloud scale can be particularly...
The state of cloud security is a dynamic and ever-evolving landscape, as both attackers and defenders continuously adapt their tactics...
In recent years, supply chain attacks targeting software developers and suppliers have become increasingly common. The primary objective of these...
We're excited to announce the release of our new free community cloud security tool IAM AWS Policy Evaluator (IAM APE),...
A GCP Organization is the top node of the permissions hierarchy, making policies defined at this level powerful, automatically applying...
On March 25, 2022, a PoC was published for the 4-year old CVE-2018-25032 in Zlib open source software that everyone...