#Category name

Articles & News

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

License Compliance: A Legacy Problem, Reimagined with Runtime

License compliance is one of the oldest disciplines in application security. For more than two decades, organizations have relied on Software Composition Analysis (SCA) tools to identify copy-left licenses, produce audit trails, and reduce legal risk. Kodem’s new license enforcement capability represents the first real breakthrough in years.

August 26, 2025

Context Over CVSS: Why Medium, Low, CVEs Matter More Than You Think

In 2024, more than 33,000 CVEs were disclosed, an all‑time high, but only about 12% of those labeled “Critical” actually proved exploitable. Meanwhile, high‑profile exploit chains like Pegasus and Blastpass, and careless breaches like the Tea app hack, reveal that Medium‑ranked or poorly‑coded vulnerabilities, rather than CVSS labels, often lead to real attacker impact.

August 22, 2025

Circumventing Security in Claude Code: Misconfiguration and Denial-of-Service

Kodem recently identified two security issues in Claude Code: a misconfiguration allowing circumvention of user approval and a subsequent Denial-of-Service (DoS) condition.

July 30, 2025

Kodem just built the world’s only Dev to Prod Agentic Taskforce in Cyber

At RSAC 2025, we launched Kai, the first AI-native application security engineer. Today, we’re expanding it into a fully agentic task force that truly performs AppSec tasks from start to finish. 

July 28, 2025

FedRAMP RFC-0012

The Federal Risk and Authorization Management Program (FedRAMP) recently released RFC-0012, marking a notable shift towards more stringent standards for continuous vulnerability management. Cloud providers and security teams must adjust quickly to stay compliant and secure (FedRAMP, 2024).

July 25, 2025

Vulnerability Alert: CVE‑2025‑23266: NVIDIAScape: Three‑Line Container Escape in NVIDIA Container Toolkit

CVE‑2025‑23266, nicknamed NVIDIAScape, is a pre‑execution flaw in the NVIDIA Container Toolkit.

July 25, 2025

How Rapyd Used Kodem to Shift from Volume to Impact

Rapyd, a global fintech platform operating in over 100 countries, partnered with Kodem to modernize its application security program. Faced with mounting vulnerabilities and a shortage of specialized AppSec talent, Rapyd needed more than another scanner—it needed a platform that could think like an expert. Kodem delivered measurable reductions in triage time, rework, and risk exposure by focusing on what attackers can actually exploit.

July 24, 2025

Vulnerability Alert: CVE-2025-25257: Pre-Auth SQL Injection to Full RCE in Fortinet FortiWeb Fabric Connector

CVE-2025-25257 is a critical vulnerability in Fortinet FortiWeb Fabric Connector. It allows unauthenticated SQL injection, which attackers escalate into remote code execution (RCE) on affected appliances.

July 21, 2025

Vulnerability Alert: CVE-2025-47812: Wing FTP Server Remote Code Execution Vulnerability (Null Byte Injection)

CVE-2025-47812 is a critical vulnerability affecting Wing FTP Server versions prior to 7.4.4. This severe security flaw enables unauthenticated attackers to execute arbitrary code remotely (RCE) by exploiting inadequate validation of input containing null bytes (%00) in the authentication process

July 12, 2025

EPSS vs. Exploitability: Why Probability ≠ Risk in Your Environment

The Exploit Prediction Scoring System (EPSS) is a data-driven model that predicts the likelihood a given software vulnerability will be exploited in the wild.

July 1, 2025

Multi-Agent Architectures: The Next Leap in Application Security

Most security tools today, static analyzers, fuzzers, even single-agent LLMs, struggle to find complex, multi-step vulnerabilities. But the emerging model of multi-agent collaboration can fundamentally transform vulnerability discovery. Argusee’s recent results are just a glimpse of what's possible.

June 11, 2025

May 2025 Edition of Kodem Kernels

Product enhancements that empower entire teams to simplify their application security processes, prioritize issues based on impact and remediate vulnerabilities more precision.

May 1, 2025

When o3 found a Zero-Day

The Beginning of AI-Native Security Research

May 28, 2025

Exploit Trigger Detection: A new frontier in Application Protection

Application Detection and Response (ADR) technologies are essential for identifying and mitigating runtime attacks. Yet, many existing approaches struggle to detect nuanced, logic-based vulnerabilities effectively.

May 27, 2025

Navigating 2025 Secure SDLC Regulations

Understanding domestic and international regulatory landscapes is crucial to ensuring compliance and enhancing security postures. This blog post explores key software security mandates worldwide, including those from the United States, European Union, and Asia-Pacific, providing a comprehensive guide on navigating these complex regulations for a secure software development lifecycle.

May 23, 2025

Kodem’s Approach to ADR: Rethinking Application Detection & Response

Application Detection and Response (ADR) is emerging as the next evolution in application security, aiming to catch and stop attacks from within the application itself at runtime. Recent incidents like the Next.js middleware vulnerability CVE-2025-29927 – an authentication bypass triggered by a single HTTP header – underscore why traditional approaches often fall short.

May 14, 2025

Agentic Red Teams Are Here: Autonomous Vulnerability Discovery Ushers in a New Security Paradigm

Agentic red teams, AI-powered multi-agent systems capable of offensive security testing, have arrived as a timely and necessary innovation to fill this critical gap in the cybersecurity landscape.

April 1, 2025

Deep Runtime Evidence & Function-Level Visibility

Pinpoint real exposure with Kodem’s unique approach, as seen in real-world example of CVE-2025-29927 in Next.js.

March 27, 2025

Vulnerability Alert: CVE-2025-29927: Next.js Middleware Authorization Bypass

The Next.js team disclosed – CVE-2025-29927 vulnerability – that allows attackers to bypass authorization checks implemented in Next.js Middleware by manipulating the x-middleware-subrequest header.

March 24, 2025

Vulnerability Alert: Remote Code Execution vulnerability CVE-2025-24813

Remote Code Execution CVE-2025-24813 vulnerability - See how Kodem runtime SCA and ADR can identify and block these attacks without specific CVE signatures

March 19, 2025

ISO 42001: What it Means for AI Security and Application Security Teams

As organizations increasingly adopt AI, the demand for standardized frameworks to manage AI risks has grown - enter ISO 42001.

March 12, 2025

February 2025 Edition of Kodem Kernels

Product enhancements that empower entire teams to simplify their application security processes, prioritize issues based on impact and remediate vulnerabilities more precision.

February 26, 2025

Breaking the Developer Security Mold: A Call for Automated & Distributed Defenses

See why organizations must adopt automated defenses, infrastructure protections, external validation, and a stronger security culture to combat modern cyber threats.

February 7, 2025

Press Release: Security Rivals Unite to Launch “Opengrep” Following Semgrep Clampdown

The evolving landscape of open-source security highlights the importance of preserving access, innovation, and trust for the developer community.

January 23, 2025

‍Unveiling the State of Application Security Workflows 2025

This report offers actionable insights to future-proof application security programs and workflows, based on input from industry leaders, practitioners, developers, and DevOps professionals.

January 15, 2025

January 2025 Edition of Kodem Kernels - Product Advancements and Innovations

Kodem introduces transformative updates for security teams: runtime-informed prioritization, actionable remediation guidance with detailed fixes, and runtime-driven function-level analysis across multiple languages.

January 10, 2025

Vulnerability Alert: CVE-2024-53677:

CVE-2024-53677 is a critical file upload vulnerability affecting Apache Struts2 versions 2.0.0 through 6.3.0. At its core, the vulnerability stems from flaws in the deprecated “File Upload Interceptor” component. CVE-2024-53677 is a critical file upload vulnerability affecting Apache Struts2 versions 2.0.0 through 6.3.0. At its core, the vulnerability stems from flaws in the deprecated “File Upload Interceptor” component.

December 20, 2024

A Comparative Study of Reachability Analysis in Application Security

Explore our comparative study on reachability analysis in AppSec, highlighting modern solutions that integrate static and runtime data for precise vulnerability management and prioritization.

December 4, 2024

How to Manage and Fix Security Risks Utilizing Free Tooling

DevOps security can utilize free tooling to detect hard-coded secrets, generate SBOMs, and enforce best practices.

November 19, 2024

Winner of Top Infosec Innovators Award for Application Security

Cyber Defense Magazine annually spotlights top innovators and names Kodem Security as the winner of 2024 Top Application Security

November 1, 2024