Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Vector and Embedding Weaknesses in AI Systems

AI security threats are evolving at roughly the same speed that AI itself is: extremely fast. One of the most recent—and least understood—vulnerabilities involves vector and embedding weaknesses. These issues have gained attention with their addition to the OWASP Top 10 for LLMs, and the risks are becoming more urgent as Retrieval-Augmented Generation (RAG) continues to dominate enterprise AI adoption.

MITRE CVE Program Uncertainty: Mend.io's commitment to uninterrupted vulnerability protection

As many of you may know, MITRE’s DHS contract to manage the CVE and CWE programs expired on April 16, 2025. While emergency funding has since been restored for a short time, the long-term future of these programs still remains uncertain. Understandably, this situation has raised concerns throughout the cybersecurity community about the stability and continuity of vulnerability tracking and management systems that many organizations have come to rely upon.

What Is File-Level Restore, and Why Does It Matter for Kubernetes Backups?

Kubernetes environments move fast — and when something breaks, it can break fast. If you’re a platform engineer managing stateful apps or a DevOps lead keeping critical workloads alive, you’ve likely felt the sting of a storage misstep. One wrong file deletion or a corrupted directory, and suddenly you’re restoring entire volumes just to recover a few megabytes.

Human Error - The Most Common Cybersecurity Mistakes for DevOps

Even though security tooling and automation in DevOps have advanced, human error remains the primary cause of cybersecurity breaches. It’s commonly known that nearly 95% of security incidents stem from our mistakes. A smiled dev philosopher would say: “We’re all just beta software in the giant simulation called life. Debugging takes time.”

Claude AI BLEW MY MIND! (Board Game Challenge)

In this video, I challenge Claude AI to a head-to-head match in the board game King of Tokyo Duel. I walk the AI through the rules, give it everything it needs to understand how to play, and then we battle it out! Claude picks up the game shockingly fast — its strategy, decision-making, and logic were next-level. I was seriously mind-blown at how intelligent it was… Should we put this to the test with other AI's like ChatGPT?

Introducing GitGuardian Custom Tags, Making Filtering and Sorting Incidents and Honeytokens Easier

GitGuardian has introduced custom tags, empowering teams to manage and prioritize secrets incidents and Honeytokens better than ever. GitGuardian has always automatically applied certain predefined tags to help teams identify incidents where, for example, a secret was found in a Default branch, is in a sensitive file, or discovered from a historical scan, just to name a few options.