Download Now

Articles, News and Industry Tips

Read the latest articles on best practices, building customer-centric products, and the latest in cybersecurity.
Filters
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Threat Integrations
The Hidden Tax on Cybersecurity Integrations: Why Security Product Integrations Are Harder Than They Should Be and How Loginsoft Helps

January 19, 2026

Vulnerability Management
Introducing LOVI MCP: Real-Time Vulnerability Intelligence for AI-Powered Security

January 12, 2026

Software Supply Chain Security
Beyond Traditional SCA: Detecting Exploitable Vulnerabilities Using CodeQL Reachability Analysis (Text4Shell Case Study)

December 22, 2025

DevSecOps
Azure Bicep: Simplifying Infrastructure as Code for the Cloud Deployments

December 18, 2025

Vulnerability Management
The React2Shell Crisis: Technical Deep Dive into CVE-2025-55182 and Widespread Exploitation Activity

December 17, 2025

Threat Integrations
TLS 1.3 vs TLS 1.2 Understanding Key Security and Performance Differences

December 10, 2025

Artificial Intelligence (AI)
Build MCP for AI: How to Build Model Context Protocol

December 9, 2025

Software Supply Chain Security
Shai-Hulud 2.0: Inside the Most Sophisticated Supply-Chain Attack

December 8, 2025

Vulnerability Management
CVE-2025-43807 - Stored Cross-Site Scripting (XSS) Vulnerability in Liferay Portal Explained

December 2, 2025

Vulnerability Management
CVE-2025-6544 & CVE-2025-6507 - Deserialization Vulnerabilities and MySQL JDBC Bypass in H2O-3 Explained

November 27, 2025

Vulnerability Management
CVE-2025-59476-Log Message Injection Vulnerability in Jenkins Core Explained

November 24, 2025

Vulnerability Management
CVE-2025-59474 Missing Permission Check in Jenkins Allows Unauthorized Access to Agent Names

November 21, 2025

Subscribe to our Newsletter