Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Demo: Manage security posture of GenAI apps

See how Cloudflare One helps you manage the security posture of GenAI tools like ChatGPT, Claude, and Gemini. This demo highlights: API integrations: Available for ChatGPT, Gemini, and Claude, and most popular SaaS apps 0:18 Posture findings: Scan for misconfigurations, unauthorized activity, and other security issues 0:50 Shadow AI discovery: Find what third-party AI apps access your SaaS tools 1:15.

The Easiest Way to Get Hacked: Open Introspection. #graphql #businesslogic #apisecurity #rbi

The RBI incident (Burger King, Tim Hortons) proves that BLA often results from a cascade of simple flaws, not one complex attack. The key mistake: GraphQL Introspection was enabled. This gave the attacker the full API blueprint - the map needed to find the open registration validation flaw and execute a massive data leak. Action Item: If you have GraphQL, check your production settings now. Disable Introspection. Don't hand the attacker the map to your castle!

Veracode 2025 Year in Review: Scaling Security for a New Era

This year, the cybersecurity landscape shifted. Between the rapid adoption of AI-generated code and the increasing complexity of software supply chains, security teams faced unprecedented challenges. According to IBM’s annual Cost of a Data Breach Report, the global average cost of a data breach in 2025 was USD 4.44 million. Organizations needed more than just tools; they needed a partner capable of moving at the speed of modern development.

2025 in review: What innovations and milestones defined AlgoSec's transformative year in 2025?

As we close out 2025, I find myself reflecting on what has been an extraordinary journey for AlgoSec. This year was marked by breakthrough innovations, significant industry recognition, and an unwavering commitment to our vision of secure application connectivity. From launching game-changing solutions to earning accolades on the global stage, 2025 challenged us to push boundaries – and we rose to the occasion with confidence and purpose.

Create Custom File Classifiers with Nightfall AI. No Regex Required

DLP solutions have a challenge in detecting standard document types: financial records, source code, and customer lists. Moreover, what happens when your organization needs to protect business-critical documents that don't fit pre-built categories? Or when you need more granular classification to support specific workflows? Traditional approaches force you to choose between brittle regex patterns that generate false positives.

CVE-2025-55182: First Days of React2Shell Exploitations

On December 3rd Lachlan Davidson disclosed an unauthenticated remote code execution vulnerability in React Server Components (RSC) that exploits how React.js (and Next.js) decodes payloads sent to React Server Function endpoints. On December 4th we started observing fingerprinting attempts for these vulnerabilities and on December 5th we started observing exploitation attempts. React.js is used by 66% of the global digital supply, in the top 0.06% of all technologies.

The strain of reactive infrastructure reliability

Every IT Operations team knows the feeling: the alert storm hits, dashboards light up, and another late-night scramble begins. You fix the issue, document it, and brace for the next one. The pattern repeats; not because your team lacks skill or visibility, but because the systems you rely on don’t move as fast as the infrastructure they manage. Downtime doesn’t start when systems fail. It starts when signals go unanswered.

Understanding Ransomware Email Threats

The Ransomware-as-a-Service (RaaS) ecosystem has changed the look and shape of modern day ransomware attacks. Malicious actors typically view their cybercrimes as a business, hoping to make the most amount of money with the least amount of effort. For example, according to research, AI-automated phishing attacks performed similarly to human generated ones and 350% better than the ones sent to the control group.

Why AppSec and Network Risk Management Must Be Unified in the Modern Enterprise

How Mend.io’s ServiceNow integration helps organizations manage application, network, and operational risks together—at scale. Managing AppSec and network risk as separate programs is no longer realistic for enterprise security teams. Today’s digital environments are interconnected, distributed, and constantly changing. A single misconfiguration, unpatched server, or vulnerable open-source component can become a point of exploitation when combined with weaknesses elsewhere in the stack.