Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Bringing secure, just-in-time secrets to Cursor with 1Password

Developers are moving faster than ever with AI. Cursor is redefining how software gets built, and 1Password is redefining how teams secure access to SaaS and AI. Today, we are announcing a new integration that brings these two worlds together in a way that keeps development speed high and credential risk near zero.

Migrating the ionCube Blog: Infrastructure, Automation, and a Fresh Start

WordPress. We love it. We know not everyone feels the same way. There are obvious reasons, one of which is the regular news (though not as regular as it used to be) of a plugin containing a vulnerability. Needless to say, that kind of news sucks. You have to admit though that WordPress has come a long way to make such things less sucky with an impactful auto update process. Unfortunately, the only kind of update which is beyond WordPress’s sphere is the back end, i.e. the AMP stack.

Critical React2Shell RCE Hits React and Next.js (CVE-2025-55182 / CVE-2025-66478)

React2Shell is a severe remote, unauthenticated RCE vulnerability recently uncovered in React Server Components (RSC) and the Next.js App Router — tracked as CVE-2025-55182, with CVE-2025-66478 later merged as a duplicate — that allows attackers to execute arbitrary code on servers by exploiting insecure Flight protocol deserialization (CWE-502), earning the flaw a maximum CVSS score of 10.0.

CISO Spotlight: Lefteris Tzelepis on Leadership, Strategy, and the Modern Security Mandate

Lefteris Tzelepis, CISO at Steelmet /Viohalco Companies, was shaped by cybersecurity. From his early exposure to real-world attacks at the Greek Ministry of Defense to building and leading security programs inside complex enterprises, his career mirrors the evolution of the CISO role itself. Now a group CISO overseeing security across multiple organizations, Lefteris brings a practitioner’s mindset to leadership and incident response.

Top tips: Secure your devices before you disconnect for the holidays

Top tips is a weekly column where we highlight what’s trending in the tech world and share ways to stay ahead. This week, as the holiday season rolls in and many of us finally take that much-needed break, let’s talk about something equally important: Stepping away from work safely. The holidays are all about resting–logging off and soaking in all the merry feelings. But to truly switch into that much-needed DND mode, it helps to secure your devices before you head out for the holidays.

7 Must-Have Features in Your CNAPP Solution

As organizations increasingly shift workloads, data, and applications to the cloud, the security landscape becomes more complicated. You’re no longer just managing a single environment, you’re managing dozens of services, containers, and APIs that are all interrelated and deployed across multiple clouds.

SASE in 2026: Why Convergence, Simplicity, and Zero Trust Require a More Technical Foundation

In 2026, one theme will become impossible for security and infrastructure leaders to ignore. The architecture that once secured the enterprise no longer aligns with how the enterprise actually works. Users are everywhere. Applications are everywhere. Data is everywhere. Threats are everywhere. What is not everywhere is consistency.

Turn Structured Data into Intelligent Action with Cribl and Tines

IT and security teams are stuck between two bad options: over-automate on noisy, incomplete data and risk eroding trust, or avoid automation and drown in manual triage. With surging data volumes and increasingly complex stacks, both choices drive alert fatigue, longer MTTD/MTTR, and analyst burnout. Tines and Cribl offer an alternative vision.

Detecting and Stopping Data Exfiltration in Real Time

Data exfiltration is no longer limited to elite external hackers — it’s a common occurrence in everyday business operations. Employees share files externally, upload documents to personal cloud accounts, copy source code to USB drives, or paste sensitive text into browser-based AI tools. Most of the time, these actions are unintentional.