Blog

Insights from application security experts and industry leaders

Featured

Kai Gets Internet Access: Turning Context Into Intelligence for Product Security Teams

Oct 15, 2025

For years, product security teams have lived with a gap. Tools surfaced findings — CVEs, outdated packages, risky dependencies — but rarely the context to make sense of them. Engineers still had to open a browser, type a CVE into Google, skim through NVD, vendor advisories, GitHub issues, and random blogs to answer basic questions: Is this actually exploitable in our environment? Is there a safe upgrade path? Has anyone seen this exploited in the wild? This release closes that gap.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

ISO 42001: What it Means for AI Security and Application Security Teams

As organizations increasingly adopt AI, the demand for standardized frameworks to manage AI risks has grown - enter ISO 42001.

March 12, 2025
Application Security

February 2025 Edition of Kodem Kernels

Product enhancements that empower entire teams to simplify their application security processes, prioritize issues based on impact and remediate vulnerabilities more precision.

February 26, 2025
Kodem Kernels - Product Updates

Breaking the Developer Security Mold: A Call for Automated & Distributed Defenses

See why organizations must adopt automated defenses, infrastructure protections, external validation, and a stronger security culture to combat modern cyber threats.

February 7, 2025
Application Security

Press Release: Security Rivals Unite to Launch “Opengrep” Following Semgrep Clampdown

The evolving landscape of open-source security highlights the importance of preserving access, innovation, and trust for the developer community.

January 23, 2025
Kodem News
Application Security

‍Unveiling the State of Application Security Workflows 2025

This report offers actionable insights to future-proof application security programs and workflows, based on input from industry leaders, practitioners, developers, and DevOps professionals.

January 15, 2025
Kodem News
Application Security

January 2025 Edition of Kodem Kernels - Product Advancements and Innovations

Kodem introduces transformative updates for security teams: runtime-informed prioritization, actionable remediation guidance with detailed fixes, and runtime-driven function-level analysis across multiple languages.

January 10, 2025
Kodem Kernels - Product Updates

Vulnerability Alert: CVE-2024-53677:

CVE-2024-53677 is a critical file upload vulnerability affecting Apache Struts2 versions 2.0.0 through 6.3.0. At its core, the vulnerability stems from flaws in the deprecated “File Upload Interceptor” component. CVE-2024-53677 is a critical file upload vulnerability affecting Apache Struts2 versions 2.0.0 through 6.3.0. At its core, the vulnerability stems from flaws in the deprecated “File Upload Interceptor” component.

December 20, 2024
Vulnerabilities

A Comparative Study of Reachability Analysis in Application Security

Explore our comparative study on reachability analysis in AppSec, highlighting modern solutions that integrate static and runtime data for precise vulnerability management and prioritization.

December 4, 2024
Application Security
SCA Security

How to Manage and Fix Security Risks Utilizing Free Tooling

DevOps security can utilize free tooling to detect hard-coded secrets, generate SBOMs, and enforce best practices.

November 19, 2024
Application Security
SCA Security

Winner of Top Infosec Innovators Award for Application Security

Cyber Defense Magazine annually spotlights top innovators and names Kodem Security as the winner of 2024 Top Application Security

November 1, 2024
Kodem News

‍How OpenAI o1 Changed Offensive Security

OpenAI o1 model's iterative thinking and mid-attack adaptation mark a breakthrough in AI-enhanced penetration testing.

October 18, 2024
Application Security
Runtime Intelligence

Attack Chain Methodology: Aligning AppSec Strategies with Real-World Threats

The disconnect between traditional AppSec approaches and attack methodologies emphasizes the need for security strategies to better align with real-world threats and attack techniques.

October 1, 2024
Attack Path Analysis
Runtime Intelligence