Blog

Security Insights

Deep dives, expert analysis, and practical guidance on exposure management, adversarial validation, and the future of AI-driven exposure management.

Checkmarx and Bitwarden supply chain attack: Your CI/CD pipeline is the attack surface
CybersecurityVulnerability Intelligence

Checkmarx and Bitwarden Just Showed That Your Pipeline Is the Attack Surface

How the Checkmarx supply chain attack compromised Bitwarden's CLI pipeline in four minutes, what was stolen, and the program design gap that made it possible.

Apr 29, 20267 min
NIST Just Changed How It Tracks and Prioritizes CVEs - NVD Update 2026
CVEVulnerability Management

NIST Just Changed How It Tracks and Prioritizes CVEs

NIST has changed how it enriches CVEs in the NVD. Learn what the new risk-based triage model means for your vulnerability management program, scanner data, and remediation workflows.

Apr 29, 202613 min
Vercel security breach 2026 featured image
Data BreachesCybersecurity

The Vercel Hack: How One AI Tool Compromised the Infrastructure Behind Millions of Websites

Vercel's April 2026 security breach started with one AI tool's OAuth approval. Here is the full attack chain, blast radius, and what every security team must do now.

Apr 20, 202613 min
Strobes VI Supply Chain Attacks Ransomware Groups Threat Actors - Featured Image
Product UpdatesVulnerability Intelligence

Strobes VI Now Tracks Supply Chain Attacks, Ransomware Groups, and Threat Actors

224,487 supply chain incidents. 1,251 threat actors. Ransomware groups tracked in real time. Strobes VI now provides the threat intelligence layer that powers proactive exposure management, starting with the lessons from the Axios npm compromise.

Apr 3, 202611 min
How Strobes AI Turns a Supply Chain Zero-Day into Full Exposure Assessment
CTEMCybersecurity

How Strobes AI Turns a Supply Chain Zero-Day into a Full Exposure Assessment in Under 30 Minutes

When the axios npm package was compromised on March 31, 2026, Strobes AI agents autonomously performed incident response, identified every exposed repository across the attack surface, and generated a complete exposure assessment with remediation tasks in under 30 minutes.

Mar 31, 202610 min
Axios npm Supply Chain Attack 83M Weekly Downloads Compromised
CTEMVulnerability Intelligence

Axios npm Supply Chain Attack: 83M Weekly Downloads Compromised by Cross-Platform RAT

On March 31, 2026, attackers compromised the axios npm maintainer account and published backdoored versions deploying a cross-platform RAT to macOS, Windows, and Linux. Full incident breakdown with IOCs, detection guidance, and real-time AI-driven response.

Mar 31, 20269 min
Why Deduplication Is the Most Underrated Security Control
Vulnerability Intelligence

Why Deduplication Is the Most Underrated Security Control

Security teams face constant pressure from an overload of alerts and findings. Every new scanner or assessment adds to the pile, making it hard to focus on what matters. Instead of streamlining efforts, these tools often create more confusion by repeating the same issues across reports. This is wher

Feb 3, 202612 min
Automated Vulnerability Management: What It Is & Why You Need It
Vulnerability Intelligence

Automated Vulnerability Management: What It Is & Why You Need It

Organizations nowadays are struggling with a growing IT environment, cloud-based workloads, APIs, IoT devices, and containerized applications are just a few of the ingredients thrown into the mix. With every new asset comes the potential to grow the attack surface area, along with the possibility of

Aug 22, 20259 min
Top 5 CVEs & Vulnerabilities of November 2024
CVEVulnerability Intelligence

Top 5 CVEs & Vulnerabilities of November 2024

November has surfaced several high-impact vulnerabilities, earning their spot among the Top CVEs of November 2024. These issues, ranging from remote code execution flaws to authentication gaps, are raising red flags across the cybersecurity landscape. Left unaddressed, they could lead to unauthorize

Dec 3, 202410 min
Top CVEs & Vulnerabilities of October 2024
CVEVulnerability Intelligence

Top CVEs & Vulnerabilities of October 2024

October has brought some serious vulnerabilities to the forefront, capturing the attention of cybersecurity teams across industries. If you’re managing IT security or staying alert to cyber threats, knowing which vulnerabilities need immediate attention is essential. From remote code execution flaws

Nov 1, 20248 min
CVE-2024-38063: An In-Depth Look at the Critical Remote Code Execution Vulnerability
Vulnerability IntelligenceVulnerability Management

CVE-2024-38063: An In-Depth Look at the Critical Remote Code Execution Vulnerability

CVE-2024-38063: An In-Depth Look at the Critical Remote Code Execution Vulnerability In a recent security advisory, Microsoft disclosed a high-severity vulnerability identified as CVE-2024-38063. This critical Remote Code Execution (RCE) flaw, rated with a CVSS score of 9.8, poses a significant risk

Aug 16, 20244 min
Top 5 CVEs and Vulnerabilities of May 2024
Vulnerability IntelligenceVulnerability Management

Top 5 CVEs and Vulnerabilities of May 2024

May brought a fresh batch of security headaches. This month, we're focusing on critical vulnerabilities in widely used software like Apache, Gitlab, and Github. These flaws could allow attackers to steal data, hijack systems, or wreak havoc in your network. Let's break down the top 5 CVEs you need t

Jun 3, 20246 min