Articles, News and Industry Tips

Read the latest articles on best practices, building customer-centric products, and the latest in cybersecurity.
Filters
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Artificial Intelligence (AI)
Build MCP for AI: How to Build Model Context Protocol

December 9, 2025

Threat Integrations
TLS 1.3 vs TLS 1.2. Understanding Key Security and Performance Differences

December 9, 2025

Software Supply Chain Security
Shai-Hulud 2.0: Inside the Most Sophisticated Supply-Chain Attack

December 8, 2025

Vulnerability Management
CVE-2025-59476-Log Message Injection Vulnerability in Jenkins Core Explained

November 24, 2025

Vulnerability Management
CVE-2025-59474 Missing Permission Check in Jenkins Allows Unauthorized Access to Agent Names

November 21, 2025

Artificial Intelligence (AI)
Unlock Secure AI Power: Mastering Model Context Protocol (MCP) for Seamless Azure Integrations

November 18, 2025

Vulnerability Management
CVE-2025-59432: Timing Attack Vulnerability in SCRAM Authentication

November 6, 2025

Vulnerability Management
CVE-2025-59475: Missing Permission Check in Jenkins Authenticated User Profile Menu

November 4, 2025

Vulnerability Management
CVE-2025-59340: Sandbox Bypass via JavaType Deserialization in Jinjava What Developers Need to Know

November 3, 2025

Vulnerability Management
CVE-2025-59822: HTTP Request Smuggling in http4s, What Developers Need to Know

October 31, 2025

Threat Intelligence
Enhancing Azure Front Door with Threat Intelligence: Blocking Malicious IPs at the Edge

October 28, 2025

Vulnerability Management
The AWS Outage Lesson: Why Your Vulnerability Management Product Needs a Backup Content Provider

October 22, 2025

Subscribe to our Newsletter