Kodem named Winner of Top Infosec Innovators Award for Application Security
We're excited to share that Kodem Security has won the 2024 Top InfoSec Innovators Award in the Application Security category!

Cyber Defense Magazine (CDM), the industry’s leading electronic information security magazine, annually spotlights the industry’s top innovators, and we’re honored to be recognized for our unique approach to application security.
Kodem Security’s runtime-powered application security platform goes beyond traditional tools by analyzing applications within live environments, giving organizations the insight they need to address actual vulnerabilities and attack paths. By integrating static application security testing (Runtime SAST), software composition analysis (SCA security), and infrastructure as code (IaC) security, we deliver a unified solution that enables real-time threat detection and remediation.
This award acknowledges Kodem’s dedication to innovation and impact on providing real actionable results reducing frustration and minimizing wasted time enabling engineers to focus on development. Our approach empowers organizations to tackle evolving threats with precision, helping developers build secure applications more efficiently.
Thank you, Cyber Defense Magazine, for this honor, and to our community for supporting our mission to redefine application security!

More blogs
.png)
CVE-2026-22218 & CVE-2026-22219: Arbitrary File Read & SSRF in Chainlit
Two high vulnerabilities affecting Chainlit, an open-source AI application framework used to build conversational AI and enterprise chatbots, can allow malicious actors to leak sensitive data and potentially enable broader cloud compromise.

Prompt Injection was Never the Real Problem
A review of “The Promptware Kill Chain”Over the last two years, “prompt injection” has become the SQL injection of the LLM era: widely referenced, poorly defined, and often blamed for failures that have little to do with prompts themselves.A recent arXiv paper, “The Promptware Kill Chain: How Prompt Injections Gradually Evolved Into a Multi-Step Malware,” tries to correct that by reframing prompt injection as just the initial access phase of a broader, multi-stage attack chain.As a security researcher working on real production AppSec and AI systems, I think this paper is directionally right and operationally incomplete.This post is a technical critique: what the paper gets right, where the analogy breaks down, and how defenders should actually think about agentic system compromise.
A Primer on Runtime Intelligence
See how Kodem's cutting-edge sensor technology revolutionizes application monitoring at the kernel level.
Platform Overview Video
Watch our short platform overview video to see how Kodem discovers real security risks in your code at runtime.
The State of the Application Security Workflow
This report aims to equip readers with actionable insights that can help future-proof their security programs. Kodem, the publisher of this report, purpose built a platform that bridges these gaps by unifying shift-left strategies with runtime monitoring and protection.
.png)
Get real-time insights across the full stack…code, containers, OS, and memory
Watch how Kodem’s runtime security platform detects and blocks attacks before they cause damage. No guesswork. Just precise, automated protection.

Stay up-to-date on Audit Nexus
A curated resource for the many updates to cybersecurity and AI risk regulations, frameworks, and standards.

