Mini Shai-Hulud Strikes PyTorch Lightning and intercom-client: Inside the Cross-Ecosystem Supply Chain Attack
The Shai-Hulud Worm Returns: New npm Supply Chain Attack Compromises SAP Packages
Latest news
How to
Get to know us
Our partner
Scaling AppSec Accuracy with a Two-Person Team
Scaling AppSec Without Scaling Headcount: How Rapyd Used Kodem to Shift from Volume to Impact
#Category name
Mini Shai-Hulud compromised PyTorch Lightning (2.6.2, 2.6.3) and intercom-client (7.0.4). Affected versions, IOCs and response runbook.
A group of critical vulnerabilities in the Common UNIX Printing System (CUPS) has emerged, affecting the majority of major Linux distributions.
This report evaluates the security posture of the top five open-source AI libraries on GitHub examining reachability, exploitability, fixability, and initial access potential i
Powerful CI and SCM Policy Updates Ensure the Security of Builds and PRs with Remediation Guidance for Transitive Dependencies
Kodem’s Monorepo Support helps manage dependencies while ensuring consistent security and pinpointing vulnerabilities.
Discover the key security issues in Scala, explore critical CVEs, and learn best practices to secure your Scala applications against vulnerabilities.
Best practices for addressing Rust security vulnerabilities. Rust-lang vulnerability examples and remediation tips.
New Jira integration brings runtime intelligence directly into the JIRA environment making it easier than ever for developers to identify and fix vulnerabilities efficiently.
Learn how Attack Path Analysis identifies potential attack routes, helping you break the attack chain and secure your application with precision.
How to secure critical infrastructure and reduce AI security risks by focusing on defenses at runtime.
Which is better, eBPF or kernel modules for vulnerability detection and attack monitoring? Evidence points towards eBPF.
Effective cloud cost management can be achieved by implementing a self-managed NAT
Vulnerability Alert: CVE-2024-6387, dubbed regreSSHion, has been discovered in OpenSSH. Get remediation guidance now.
Kodem Security's Runtime-Powered SAST introduces a groundbreaking approach, reshaping the application security landscape.
Kodem’s integration with Google Cloud means we’re actively scanning, analyzing, and responding to threats in real-time, across all stages of the development lifecycle
Review software security requirements for Secure SDLC Regulations and SDLC security guidance on how to achieve compliance.
Kodem Security is thrilled to announce that it has been honored with the 2024 Fortress Award for Best Application Security Solution
Kodem Introduces Runtime-Powered Application Security Testing, New AI capabilities and Strategic Expansion of Leadership Team
CVE-2024-3094 reveals a critical flaw in XZ-Utils, essential for data compression in software development.
Introducing Kodem Remedies, a novel security remediation mechanism that leverages full Code-to-Runtime context.
Vulnerability discovered in libwebp library which parses WebP image format. The libwebp vulnerability fix requires a runtime SBOM tool.
The Application Age demands a new approach to security.
Today we are excited to introduce Kodem to the world. Our mission is to make AppSec simple.