Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Azure Key Vault and Application Secrets and Certificates with Key Manager Plus

Managing certificates and client secrets across multiple Azure Key Vaults and applications manually? It's not just time-consuming, it's nearly impossible to do effectively. That's where Key Manager Plus comes in. Its seamless Azure integration gives you complete visibility and control over every certificate and secret across your Azure Key Vault and registered applications, all from one centralized dashboard.

SHA1-Hulud, npm supply chain incident

On November 24th, 2025, we identified a new supply chain attack in the npm ecosystem, referred to as SHA1-Hulud. We believe this is a second wave of the Shai-Hulud attack, which occurred in September 2025. Snyk will continue monitoring this active incident until it is resolved. Updates on this incident will be on our trust center.

SPARK 2025: B2C2 CEO Cactus Raazi on Institutional Liquidity & Stablecoin Conversions w/ Fireblocks

SPARK 2025 | Customer Story In this discussion from SPARK 2025, Cactus Raazi, CEO of The Americas at B2C2, shares invaluable insights on the institutional adoption of digital assets, the strategic partnership between B2C2 and Fireblocks, and the future of stablecoins in the real economy.

Are Passwords Really Dead in 2025?

Our latest discussion tackles persistent challenges in cybersecurity, specifically focusing on identity and access management (IAM). Experts highlight how attackers are now logging in rather than breaking in, underscoring the critical need for robust password encryption policies. This shift puts a spotlight on effective data protection and online security measures to safeguard against evolving threats.

Solving Al Agent Sprawl: API Governance Across Multi Gateway Environments

As organizations accelerate adoption of AI agents, autonomous workflows powered by LLMs and MCP servers are rapidly proliferating across internal systems, partner networks, cloud environments, and API gateways. The result? A sprawling, often invisible attack surface: shadow APIs, duplicate endpoints, context drift, unmanaged agent access, inconsistent policies, and risk of data exposure or compliance failures.

OWASP Top 10 2025 Edition - The 443 Podcast - Episode 350

This week on the podcast, we cover OWASP’s update to the top 10 web application security weaknesses and its changes from the 2021 list. We also cover a recently uncovered adversary-in-the-middle campaign that’s pushing malicious software updates to targeted systems. We conclude with our opinions on Microsoft’s latest AI features, which are coming to Windows.

Why User Consent Is Revolutionizing LLM Privacy Practices

Ask most people what “consent” means and you’ll hear about a banner that asks to collect cookies. That was yesterday. Modern LLMs ingest emails, tickets, docs, chats, and logs. They create embeddings, reference snippets with retrieval, and sometimes fine-tune on past conversations. If you do not wire user consent into each of those steps, you either violate laws, lose user trust, or both. That is why user consent is revolutionizing LLM privacy practices.

Get better visibility for the WAF with payload logging

As the surface area for attacks on the web increases, Cloudflare’s Web Application Firewall (WAF) provides a myriad of solutions to mitigate these attacks. This is great for our customers, but the cardinality in the workloads of the millions of requests we service means that generating false positives is inevitable. This means that the default configuration we have for our customers has to be fine-tuned.

Top 5 Cyber Security Trends for 2026: Navigating the Shift from Prevention to AI Testing

The world of cyber security is on the cusp of a fundamental transformation. For decades, the primary security model has been one of prevention building higher walls and stronger gates to keep adversaries out. But as we look toward 2026, this fortress mentality is proving insufficient.