Introducing HoneyBee: How We Automate Honeypot Deployment for Threat Research
Turning attacker insights into stronger cloud security protections.
Turning attacker insights into stronger cloud security protections.
A practical guide to the risks, blind spots, and protections every security team needs to know.
Exploring how simple setup flaws become open doors for attackers—and what teams can do to shut them.
Detect and mitigate a critical supply chain compromise affecting over 100+ packages, organizations should act urgently.
Executives from Brex and FICO share how AI is reshaping security strategies.
A deeper look at the npm debug/chalk supply-chain incident: deobfuscating the wallet-hijacking browser interceptor, quantifying the ~2-hour exposure with Wiz telemetry (~99% package prevalence, ~10% malware presence), and unpacking what made it spread so fast.
A deeper look at the Nx supply chain attack: analyzing the performance of AI-powered malware, calculating incident impact, and sharing novel TTPs for further investigation.
Detect and mitigate a critical supply chain compromise affecting the Nx NPM Package. Organizations should act urgently.
New AWS Bedrock keys simplify authentication while raising security considerations.
Inside the Lazarus subgroup that’s hijacking cloud platforms, poisoning supply chains, and stealing billions in digital assets.
In the race to lead in AI, the U.S. is prioritizing rapid innovation and national security.
Detect and mitigate CVE-2025-53770 and CVE-2025-53771 - critical vulnerabilities in Microsoft SharePoint Server currently under active exploitation.