Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Snyk and Cognition partner to enhance security for AI-native development

Today, Snyk is excited to announce a new partnership with Cognition that significantly advances security within the software development lifecycle, validating our "Secure at Inception" model. This collaboration introduces new integrations, Snyk for Devin and Snyk for Windsurf, which directly embed Snyk Studio's security intelligence into Cognition's AI-native developer tools.

The Human Element: Navigating the Widening Gap Between Confidence and Reality in Cybersecurity

In my experience as an FBI agent and security leader, I’ve found that technology alone does not keep us safe. The human element, including our behaviors, our habits, and our decisions, is an ever-present and unpredictable variable in our layers of security. The Arctic Wolf 2025 Human Risk Behavior Snapshot: 2nd Edition brings this into sharp focus, revealing a landscape where employee actions and leadership overconfidence are creating a perfect storm for breaches.

What is shadow AI and what can you do about it?

Organizations across industries are actively investing in AI to streamline operations, boost productivity, and stay ahead in competitive markets. However, most proceed with caution when rolling out new AI solutions internally as they need to meet standards for AI security, compliance, and responsible use through rigorous testing and assessments. ‍ At the same time, teams may occasionally adopt AI solutions outside formal channels to simplify their workload.

CSP in 2025: What It Solves and Doesn't for Client-Side Risk

Preparing for PCI DSS 4.0.1 can feel complex, especially when so much of compliance now lives in the browser. Your assessor’s main goal is simple: to confirm that your controls are not only in place but also working as intended. Two requirements matter most for e-commerce environments. Many organizations start with Content Security Policy (CSP). It’s a sensible place to begin because CSP gives browsers a set of rules about what content to load.

Which Solutions Detect Unauthorized JavaScript Trackers in Real-Time?

According to Web Almanac, the top 1,000 websites load an average of 43 third-party domains on mobile and 53 on desktop, each a potential entry point for supply-chain tampering. A separate analysis found that most enterprise sites include 12 third-party and 3 fourth-party scripts in sensitive user journeys. That’s 15 external execution paths per transaction, and every one of them runs in the same browser as your checkout.

Oracle E-Business Suite Zero-Day (CVE-2025-61882) - Post-Incident Technical Brief

In late 2025, a critical pre-authentication remote-code-execution vulnerability (tracked as CVE-2025-61882) in Oracle E-Business Suite (EBS)— specifically the Concurrent Processing / BI-Publisher integration — was exploited in a large-scale extortion/data-theft campaign attributed to the Cl0p/Clop extortion cluster. Attackers abused the flaw to run attacker-controlled XSLT/Java payloads, gain remote code execution on EBS application servers, and exfiltrate sensitive data for extortion.

Making Cyber Risk Intelligence Easier to Understand, Explain, and Act On

Helping customers understand rating changes has always been a core commitment at Bitsight. A rating shift can spark questions from executives, board members, or regulators, and security leaders must be ready to answer with clarity and confidence. That’s why we’ve introduced new updates to the Bitsight platform designed to make our cyber risk intelligence solutions more actionable.

Building a Privacy-First AI Stack for Highly Regulated Industries

In a bid to quickly join the AI race, enterprises are steadily pouring time and money to adopt it. While designing a new AI tool, security and compliance are often an afterthought for developers and product managers. For industries that don’t handle sensitive data, AI adoption does not necessitate embedding strong privacy controls. However, highly regulated sectors like healthcare, finance, or government defence contractors can’t afford to launch without adhering to regulations.

The Power of Detection Engineering & Custom Parsers

In the fast-paced world of cybersecurity, detection engineering is a growing discipline that helps organizations stay ahead of threats. But success isn’t just about having the right tools or detection workflows in place—it’s about making sure those tools speak the same language to help you scale your efforts and better understand your overall security posture. This is where parsers play a critical role.