3 OAuth TTPs Seen This Month — and How to Detect Them with Entra ID Logs
How OAuth tokens, JWT fields and Entra sign-in logs reveal attacker behavior, and how to turn those signals into reliable detections.
How OAuth tokens, JWT fields and Entra sign-in logs reveal attacker behavior, and how to turn those signals into reliable detections.
Detect and mitigate malicious npm packages linked to the recent Shai-Hulud-style campaign. Over 25,000 affected repositories across ~350 unique users.
How secure are top private AI companies? Find out from our scans and disclosures.
Wiz Research has uncovered 550+ secrets hiding in plain sight. We worked with Microsoft to shut the door.
Turning attacker insights into stronger cloud security protections.
Wiz Research discovers vulnerability stemming from 13-year-old bug present in all Redis versions, used in 75% of cloud environments.
How attackers exploit exposed databases for extortion—and the defenses that work.
Wiz and the leading CSPs are launching one of the largest hacking competitions ever to secure the open-source software powering the cloud ecosystem
A closer look at LameHug, the Amazon Q Developer Extension compromise, s1ngularity, and PromptLock.
When common processes start asking the wrong questions
Exploring how simple setup flaws become open doors for attackers—and what teams can do to shut them.
New research reveals four common security risks systematically affecting vibe-coded applications - with remediation strategies curated together with Lovable.