Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Hidden Security Risks Living Inside Your APIs

Most organisations spend serious money on firewalls, endpoint protection, and threat monitoring. Yet one of the most commonly exploited attack surfaces gets far less attention: the APIs quietly running underneath almost every modern application. APIs are the connective tissue of today's digital infrastructure. They allow apps to talk to each other, enable third-party integrations, and power the real-time data exchanges that businesses depend on daily. They are also a favourite target for attackers who know that many organisations have not secured them properly.

Best GRC software solutions for 2026

The right GRC platform does more than help you check boxes. As compliance requirements grow and security threats become more complex, Governance, Risk, and Compliance (GRC) software is essential for protecting your organization, enabling proactive risk management, and building stronger resilience. ‍ In this article, we review five of the best GRC solutions, highlighting their key features, strengths, limitations, and use cases, to help you pick the right tool for your organization. ‍ ‍

RondoDox Botnet: From Zero to 174 Exploited Vulnerabilities

According to a 2024 report from IoT Analytics, there were 16.6 billion Internet of Things (IoT) connected devices at the end of 2023, and that number is expected to grow to 41.1 billion by 2030. This means an increased attack surface for malicious actors to take advantage of, especially given that the security posture of the vendors that provide these devices varies greatly.

The Vendor Tiering Series: Tiering that Scales

There’s no way to stop the clock in cybersecurity for InfoSec teams, but you can find ways to manufacture a better way to spend their time. Tiering does just that, prioritizing your team’s most finite resource. But to start, you need better data, and most importantly, better logic to redefine how you work.

Connected Vehicles, Accelerating Risk: Inside the Cyber Threats Facing Automotive

The automotive industry is changing faster than ever, with smarter factories, connected vehicles, digital supply chains, and software-driven everything. But as the industry accelerates into this new era, something else is racing alongside it: cyber threats. Over the past year, Bitsight Threat Intelligence data has shown a sharp rise in ransomware activity targeting companies across the auto ecosystem. And what’s striking is how often the same names keep appearing.

Now Available: Cyberhaven's Free AI App Risk Checker

Most security teams are being asked to "enable AI" before they have any real sense of which tools are safe to use. That gap is costing them. Cyberhaven's research found that the majority of AI tools in active enterprise use today fall into high or critical risk categories, and more than 80% of enterprise data flowing into AI is going to those risky tools, not to platforms built with serious security in mind. To help security teams cut through the noise, we built the Cyberhaven AI App Risk Checker.

The 6 Steps Organizations Should Immediately Take to Mitigate Quantum-Related Risk

Quantum computing is an emerging technology that presents significant data security risk to global organizations that rely on quantum vulnerable encryption algorithms, systems, and infrastructure. The threat isn’t theoretical. The risk of quantum-enabled attacks will fundamentally reshape how organizations encrypt their data, design their digital trust infrastructure, and maintain agility in production cryptographic systems.

Beyond Human Scale: The Shift to Machine-Speed Defense

Modern threats move faster than humans can process. Join UpGuard CISO Phil Ross to discover how to replace manual bottlenecks with a machine-speed operating system for risk that orchestrates vendor, human, and attack surface defenses into one unified strategy. Interested in finding out more about UpGuard?