
Navigating 2025 Secure SDLC Regulations
Understanding domestic and international regulatory landscapes is crucial to ensuring compliance and enhancing security postures. This blog post explores key software security mandates worldwide, including those from the United States, European Union, and Asia-Pacific, providing a comprehensive guide on navigating these complex regulations for a secure software development lifecycle.
Kodem’s Approach to ADR: Rethinking Application Detection & Response
Application Detection and Response (ADR) is emerging as the next evolution in application security, aiming to catch and stop attacks from within the application itself at runtime. Recent incidents like the Next.js middleware vulnerability CVE-2025-29927 – an authentication bypass triggered by a single HTTP header – underscore why traditional approaches often fall short.
.png)
May 2025 Edition of Kodem Kernels
Product enhancements that empower entire teams to simplify their application security processes, prioritize issues based on impact and remediate vulnerabilities more precision.

Agentic Red Teams Are Here: Autonomous Vulnerability Discovery Ushers in a New Security Paradigm
Agentic red teams, AI-powered multi-agent systems capable of offensive security testing, have arrived as a timely and necessary innovation to fill this critical gap in the cybersecurity landscape.
.png)
Deep Runtime Evidence & Function-Level Visibility
Pinpoint real exposure with Kodem’s unique approach, as seen in real-world example of CVE-2025-29927 in Next.js.

Vulnerability Alert: CVE-2025-29927: Next.js Middleware Authorization Bypass
The Next.js team disclosed – CVE-2025-29927 vulnerability – that allows attackers to bypass authorization checks implemented in Next.js Middleware by manipulating the x-middleware-subrequest header.

Vulnerability Alert: Remote Code Execution vulnerability CVE-2025-24813
Remote Code Execution CVE-2025-24813 vulnerability - See how Kodem runtime SCA and ADR can identify and block these attacks without specific CVE signatures
.png)
ISO 42001: What it Means for AI Security and Application Security Teams
As organizations increasingly adopt AI, the demand for standardized frameworks to manage AI risks has grown - enter ISO 42001.
.png)
February 2025 Edition of Kodem Kernels
Product enhancements that empower entire teams to simplify their application security processes, prioritize issues based on impact and remediate vulnerabilities more precision.
.png)
Breaking the Developer Security Mold: A Call for Automated & Distributed Defenses
See why organizations must adopt automated defenses, infrastructure protections, external validation, and a stronger security culture to combat modern cyber threats.
.webp)

.png)
.png)