Articles, News and Industry Tips

Read the latest articles on best practices, building customer-centric products, and the latest in cybersecurity.
Filters
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Software Supply Chain Security
Shai-Hulud 2.0: Inside the Most Sophisticated Supply-Chain Attack

December 8, 2025

Vulnerability Management
CVE-2025-43807 - Stored Cross-Site Scripting (XSS) Vulnerability in Liferay Portal Explained

December 2, 2025

Vulnerability Management
CVE-2025-6544 & CVE-2025-6507 - Deserialization Vulnerabilities and MySQL JDBC Bypass in H2O-3 Explained

November 27, 2025

Vulnerability Management
CVE-2025-59476-Log Message Injection Vulnerability in Jenkins Core Explained

November 24, 2025

Vulnerability Management
CVE-2025-59474 Missing Permission Check in Jenkins Allows Unauthorized Access to Agent Names

November 21, 2025

Artificial Intelligence (AI)
Unlock Secure AI Power: Mastering Model Context Protocol (MCP) for Seamless Azure Integrations

November 18, 2025

Vulnerability Management
CVE-2025-59432: Timing Attack Vulnerability in SCRAM Authentication

November 6, 2025

Vulnerability Management
CVE-2025-59475: Missing Permission Check in Jenkins Authenticated User Profile Menu

November 4, 2025

Vulnerability Management
CVE-2025-59340: Sandbox Bypass via JavaType Deserialization in Jinjava What Developers Need to Know

November 3, 2025

Vulnerability Management
CVE-2025-59822: HTTP Request Smuggling in http4s, What Developers Need to Know

October 31, 2025

Threat Intelligence
Enhancing Azure Front Door with Threat Intelligence: Blocking Malicious IPs at the Edge

October 28, 2025

Vulnerability Management
The AWS Outage Lesson: Why Your Vulnerability Management Product Needs a Backup Content Provider

October 22, 2025

Subscribe to our Newsletter