Exposed JDWP Exploited in the Wild: What Happens When Debug Ports Are Left Open
Understanding the risks and impact of deploying dev-mode in production environments
Understanding the risks and impact of deploying dev-mode in production environments
How has AI-assisted development impacted secrets leakage? Learn the new patterns and emerging trends.
Insights from 96 organizations on the state of AI security in the cloud.
Building an efficient small language model for cybersecurity, from data prep to deployment
Helping LLMs generate safer and more secure code through open-sourced rules files.
The Wiz Threat Research team has identified a widespread cryptojacking campaign targeting commonly used DevOps applications including Nomad and Consul.
See how Data Security Posture Management (DSPM) delivers measurable impact across risk reduction, compliance, and operational efficiency.
How Deloitte and Wiz Enable End-to-End Security Without Slowing Down Development
Wiz Threat Research has observed exploitation in-the-wild of CVE-2025-4427 and CVE-2025-4428, the latest vulnerabilities affecting Ivanti Endpoint Manager Mobile (EPMM).
Wiz Research reveals the latest cloud data security trends across hundreds of thousands of real-world environments.
Wiz is excited to announce “The Cloud Hunting Games”, a new hands-on Capture the Flag (CTF) challenge designed to test your cloud incident response skills.
Build resilient GitHub Actions workflows with lessons from recent attacks.