.png)
Unveiling the State of Application Security Workflows 2025
This report offers actionable insights to future-proof application security programs and workflows, based on input from industry leaders, practitioners, developers, and DevOps professionals.
.png)
January 2025 Edition of Kodem Kernels - Product Advancements and Innovations
Kodem introduces transformative updates for security teams: runtime-informed prioritization, actionable remediation guidance with detailed fixes, and runtime-driven function-level analysis across multiple languages.
.png)
Vulnerability Alert: CVE-2024-53677:
CVE-2024-53677 is a critical file upload vulnerability affecting Apache Struts2 versions 2.0.0 through 6.3.0. At its core, the vulnerability stems from flaws in the deprecated “File Upload Interceptor” component. CVE-2024-53677 is a critical file upload vulnerability affecting Apache Struts2 versions 2.0.0 through 6.3.0. At its core, the vulnerability stems from flaws in the deprecated “File Upload Interceptor” component.
.png)
A Comparative Study of Reachability Analysis in Application Security
Explore our comparative study on reachability analysis in AppSec, highlighting modern solutions that integrate static and runtime data for precise vulnerability management and prioritization.
.png)
How to Manage and Fix Security Risks Utilizing Free Tooling
DevOps security can utilize free tooling to detect hard-coded secrets, generate SBOMs, and enforce best practices.

Winner of Top Infosec Innovators Award for Application Security
Cyber Defense Magazine annually spotlights top innovators and names Kodem Security as the winner of 2024 Top Application Security

How OpenAI o1 Changed Offensive Security
OpenAI o1 model's iterative thinking and mid-attack adaptation mark a breakthrough in AI-enhanced penetration testing.
.png)
Attack Chain Methodology: Aligning AppSec Strategies with Real-World Threats
The disconnect between traditional AppSec approaches and attack methodologies emphasizes the need for security strategies to better align with real-world threats and attack techniques.

Vulnerability Alert: Critical CUPS Vulnerability Affecting Major Linux Distributions
A group of critical vulnerabilities in the Common UNIX Printing System (CUPS) has emerged, affecting the majority of major Linux distributions.
.png)
The State of AI Security: Insights from the Top 5 Open-Source AI Frameworks
This report evaluates the security posture of the top five open-source AI libraries on GitHub examining reachability, exploitability, fixability, and initial access potential i