Introducing zeroday.cloud: First-of-its-kind cloud and AI hacking competition
Wiz and the leading CSPs are launching one of the largest hacking competitions ever to secure the open-source software powering the cloud ecosystem
Wiz and the leading CSPs are launching one of the largest hacking competitions ever to secure the open-source software powering the cloud ecosystem
A closer look at LameHug, the Amazon Q Developer Extension compromise, s1ngularity, and PromptLock.
When common processes start asking the wrong questions
Exploring how simple setup flaws become open doors for attackers—and what teams can do to shut them.
New research reveals four common security risks systematically affecting vibe-coded applications - with remediation strategies curated together with Lovable.
Detect and mitigate a critical supply chain compromise affecting over 100+ packages, organizations should act urgently.
A deeper look at the npm debug/chalk supply-chain incident: deobfuscating the wallet-hijacking browser interceptor, quantifying the ~2-hour exposure with Wiz telemetry (~99% package prevalence, ~10% malware presence), and unpacking what made it spread so fast.
Exposed cloud credentials become the launchpad for mass phishing, highlighting email services as a prime target in cloud exploitation campaigns.
A deeper look at the Nx supply chain attack: analyzing the performance of AI-powered malware, calculating incident impact, and sharing novel TTPs for further investigation.
Detect and mitigate a critical supply chain compromise affecting the Nx NPM Package. Organizations should act urgently.
New AWS Bedrock keys simplify authentication while raising security considerations.
Wiz Research discovers a critical vulnerability chain allowing unauthenticated attackers to take over NVIDIA's Triton Inference Server.