
How OpenAI o1 Changed Offensive Security
OpenAI o1 model's iterative thinking and mid-attack adaptation mark a breakthrough in AI-enhanced penetration testing.
.png)
Attack Chain Methodology: Aligning AppSec Strategies with Real-World Threats
The disconnect between traditional AppSec approaches and attack methodologies emphasizes the need for security strategies to better align with real-world threats and attack techniques.

Vulnerability Alert: Critical CUPS Vulnerability Affecting Major Linux Distributions
A group of critical vulnerabilities in the Common UNIX Printing System (CUPS) has emerged, affecting the majority of major Linux distributions.
.png)
The State of AI Security: Insights from the Top 5 Open-Source AI Frameworks
This report evaluates the security posture of the top five open-source AI libraries on GitHub examining reachability, exploitability, fixability, and initial access potential i

Powerful CI and SCM Policy Updates Now Available
Powerful CI and SCM Policy Updates Ensure the Security of Builds and PRs with Remediation Guidance for Transitive Dependencies
Introducing Kodem Monorepo Support
Kodem’s Monorepo Support helps manage dependencies while ensuring consistent security and pinpointing vulnerabilities.

Addressing Scala Security Vulnerabilities: Best Practices for Fortifying your Code
Discover the key security issues in Scala, explore critical CVEs, and learn best practices to secure your Scala applications against vulnerabilities.

Addressing Rust Security Vulnerabilities: Best Practices for Fortifying Your Code
Best practices for addressing Rust security vulnerabilities. Rust-lang vulnerability examples and remediation tips.

Simplifying Developer Fixes with Runtime Intelligence - New JIRA Integration
New Jira integration brings runtime intelligence directly into the JIRA environment making it easier than ever for developers to identify and fix vulnerabilities efficiently.

Attack Path Analysis: Unleash Your Inner Adversary
Learn how Attack Path Analysis identifies potential attack routes, helping you break the attack chain and secure your application with precision.

Comparing eBPF and Kernel Modules for Application Vulnerability Detection and Attack Monitoring
Which is better, eBPF or kernel modules for vulnerability detection and attack monitoring? Evidence points towards eBPF.

From Managed NAT to Self-managed NAT: Embracing a FinOps Mindset for Effective Cloud Cost Management
Effective cloud cost management can be achieved by implementing a self-managed NAT

Guidelines for Reducing AI Security Risks in Critical Infrastructure
How to secure critical infrastructure and reduce AI security risks by focusing on defenses at runtime.

Vulnerability Alert: CVE-2024-6387, dubbed regreSSHion, has been discovered in OpenSSH.
Vulnerability Alert: CVE-2024-6387, dubbed regreSSHion, has been discovered in OpenSSH. Get remediation guidance now.

Runtime-powered SAST: The Future of Application Security Testing
Kodem Security's Runtime-Powered SAST introduces a groundbreaking approach, reshaping the application security landscape.
.jpg)
Kodem Security Now on Google Cloud Marketplace!
Kodem’s integration with Google Cloud means we’re actively scanning, analyzing, and responding to threats in real-time, across all stages of the development lifecycle

Navigating Secure SDLC Regulations | SDLC Security Guidance on How to Achieve Compliance
Review software security requirements for Secure SDLC Regulations and SDLC security guidance on how to achieve compliance.

PRESS RELEASE: Kodem Security Wins 2024 Fortress Cybersecurity Award for Best Application Security Solution
Kodem Security is thrilled to announce that it has been honored with the 2024 Fortress Award for Best Application Security Solution
.png)
PRESS RELEASE: Kodem Security Announces Groundbreaking Advancements & Strategic Expansion of Leadership Team
Kodem Introduces Runtime-Powered Application Security Testing, New AI capabilities and Strategic Expansion of Leadership Team
.png)
XZ-Utils and the Shifting Responsibilities in Open Source
CVE-2024-3094 reveals a critical flaw in XZ-Utils, essential for data compression in software development.

SeCURE your applications with Kodem Remedies
Introducing Kodem Remedies, a novel security remediation mechanism that leverages full Code-to-Runtime context.

Critical vulnerability in LibWebP exploited in the wild
Vulnerability discovered in libwebp library which parses WebP image format. The libwebp vulnerability fix requires a runtime SBOM tool.


