Articles, News and Industry Tips

Read the latest articles on best practices, building customer-centric products, and the latest in cybersecurity.
Filters
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Threat Integrations
TLS 1.3 vs TLS 1.2 Understanding Key Security and Performance Differences

December 10, 2025

Artificial Intelligence (AI)
Build MCP for AI: How to Build Model Context Protocol

December 9, 2025

Software Supply Chain Security
Shai-Hulud 2.0: Inside the Most Sophisticated Supply-Chain Attack

December 8, 2025

Vulnerability Management
CVE-2025-43807 - Stored Cross-Site Scripting (XSS) Vulnerability in Liferay Portal Explained

December 2, 2025

Vulnerability Management
CVE-2025-6544 & CVE-2025-6507 - Deserialization Vulnerabilities and MySQL JDBC Bypass in H2O-3 Explained

November 27, 2025

Vulnerability Management
CVE-2025-59476-Log Message Injection Vulnerability in Jenkins Core Explained

November 24, 2025

Vulnerability Management
CVE-2025-59474 Missing Permission Check in Jenkins Allows Unauthorized Access to Agent Names

November 21, 2025

Artificial Intelligence (AI)
Unlock Secure AI Power: Mastering Model Context Protocol (MCP) for Seamless Azure Integrations

November 18, 2025

Vulnerability Management
CVE-2025-59432: Timing Attack Vulnerability in SCRAM Authentication

November 6, 2025

Vulnerability Management
CVE-2025-59475: Missing Permission Check in Jenkins Authenticated User Profile Menu

November 4, 2025

Vulnerability Management
CVE-2025-59340: Sandbox Bypass via JavaType Deserialization in Jinjava What Developers Need to Know

November 3, 2025

Vulnerability Management
CVE-2025-59822: HTTP Request Smuggling in http4s, What Developers Need to Know

October 31, 2025

Subscribe to our Newsletter