Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

CISA Reports a Massive Spike in API Security Risks #CISAReport #ProtectAPIs APIExploit

In 2024, API-related vulnerabilities on CISA’s Known Exploited List jumped from 20% to 50%, making APIs a prime target for attackers. This sharp increase highlights the critical need for a dedicated API security strategy in 2025. Don’t wait—invest in API security today.

Exploited! PANOS Authentication Bypass Vulnerability (CVE20250108)

Recently, Palo Alto Networks disclosed CVE‑2025‑0108—a high-severity authentication bypass in the PAN‑OS management web interface. Although the flaw does not enable remote code execution, it compromises the confidentiality and integrity of management functions. In this post, we’ll break down the technical details, discuss the exploitation methodology, illustrate configuration and code examples, and outline effective mitigation strategies.

Artificial Intelligence Security Posture Management (AISPM): An Explainer

As AI Agents continue to revolutionize everything about how business is done, ensuring the security of these agents has become paramount. While organizations have rushed to adopt DLP processes and whitelist/blacklist policies to block the use of malicious prompts, it’s worth noting that DLP and firewalls have been around for a very long time and have proven limited in mitigating the risks of users copy/pasting sensitive information onto the internet.

Runtime security in cloud environments: what you need to know

Unlike static environments, cloud workloads are constantly shifting, with containers and virtual machines spinning up and down, and crucial sensitive information flowing dynamically across multiple platforms. Recent incidents, such as the increase in container-based malware infections and cloud misconfigurations resulting in major data breaches, have highlighted the need for runtime security.

PowerShell SMB Scanner: Lightweight Tool for Red Team SMB Enumeration (OpenSource)

A lightweight, PowerShell-based SMB enumeration and data-gathering tool for red team engagements and penetration testing. This tool is designed to work natively on Windows without the need for external dependencies like Python or Linux-based utilities.