Articles, News and Industry Tips

Read the latest articles on best practices, building customer-centric products, and the latest in cybersecurity.
Filters
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Artificial Intelligence (AI)
Build MCP for AI: How to Build Model Context Protocol

December 9, 2025

Threat Integrations
TLS 1.3 vs TLS 1.2. Understanding Key Security and Performance Differences

December 9, 2025

Software Supply Chain Security
Shai-Hulud 2.0: Inside the Most Sophisticated Supply-Chain Attack

December 8, 2025

Vulnerability Management
CVE-2025-59476-Log Message Injection Vulnerability in Jenkins Core Explained

November 24, 2025

Vulnerability Management
CVE-2025-59474 Missing Permission Check in Jenkins Allows Unauthorized Access to Agent Names

November 21, 2025

Artificial Intelligence (AI)
What is Model Context Protocol (MCP) and the Security AI Integration for Azure

November 18, 2025

Vulnerability Management
CVE-2025-59432: Timing Attack Vulnerability in SCRAM Authentication

November 6, 2025

Vulnerability Management
CVE-2025-59475: Missing Permission Check in Jenkins Authenticated User Profile Menu

November 4, 2025

Vulnerability Management
CVE-2025-59340: Sandbox Bypass via JavaType Deserialization in Jinjava What Developers Need to Know

November 3, 2025

Vulnerability Management
CVE-2025-59822: HTTP Request Smuggling in http4s, What Developers Need to Know

October 31, 2025

Threat Intelligence
Enhancing Azure Front Door with Threat Intelligence: Blocking Malicious IPs at the Edge

October 28, 2025

Vulnerability Management
The AWS Outage Lesson: Why Your Vulnerability Management Product Needs a Backup Content Provider

October 22, 2025

Subscribe to our Newsletter