
Vulnerability Alert: Critical CUPS Vulnerability Affecting Major Linux Distributions
A group of critical vulnerabilities in the Common UNIX Printing System (CUPS) has emerged, affecting the majority of major Linux distributions.
.png)
The State of AI Security: Insights from the Top 5 Open-Source AI Frameworks
This report evaluates the security posture of the top five open-source AI libraries on GitHub examining reachability, exploitability, fixability, and initial access potential i

Powerful CI and SCM Policy Updates Now Available
Powerful CI and SCM Policy Updates Ensure the Security of Builds and PRs with Remediation Guidance for Transitive Dependencies

Introducing Kodem Monorepo Support
Kodem’s Monorepo Support helps manage dependencies while ensuring consistent security and pinpointing vulnerabilities.

Addressing Scala Security Vulnerabilities: Best Practices for Fortifying your Code
Discover the key security issues in Scala, explore critical CVEs, and learn best practices to secure your Scala applications against vulnerabilities.

Addressing Rust Security Vulnerabilities: Best Practices for Fortifying Your Code
Best practices for addressing Rust security vulnerabilities. Rust-lang vulnerability examples and remediation tips.

Simplifying Developer Fixes with Runtime Intelligence - New JIRA Integration
New Jira integration brings runtime intelligence directly into the JIRA environment making it easier than ever for developers to identify and fix vulnerabilities efficiently.

Attack Path Analysis: Unleash Your Inner Adversary
Learn how Attack Path Analysis identifies potential attack routes, helping you break the attack chain and secure your application with precision.

Guidelines for Reducing AI Security Risks in Critical Infrastructure
How to secure critical infrastructure and reduce AI security risks by focusing on defenses at runtime.

Comparing eBPF and Kernel Modules for Application Vulnerability Detection and Attack Monitoring
Which is better, eBPF or kernel modules for vulnerability detection and attack monitoring? Evidence points towards eBPF.