Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Seal Security and Socket Team Up to Fix Critical npm Overrides

When developing a JavaScript package with npm, direct dependencies are defined within the dependencies section of the package.json file. Developers manage these dependencies' versions using semver-compliant version specifications. This allows for precise control, from specifying exact versions to defining ranges that permit the package manager to select compatible versions.

DevSecOps Automation Framework

Security is often seen as a roadblock in development, slowing releases and adding friction between teams. However, as software development cycles become faster and more complex, security must evolve from a blocker to an innovation driver. DevSecOps ensures security is a core part of the development workflow, and automation plays a crucial role in making this integration smooth and effective.

AI Code Generation: Code Security & Quality, Benefits, Risks & Top Tools

AI code generation is exactly what it sounds like — using artificial intelligence to write and improve code. Tools powered by large language models (LLMs) and specialized AI systems can help developers generate boilerplate code, fix bugs, and even refactor entire sections of an application. And developers are leaning in. According to a GitHub survey, 92% of developers have already used AI coding tools at work or on personal projects.

Leveraging Retrospective Detection for Zero-Day Threats

Within the cybersecurity landscape, zero-day vulnerabilities have become a significant threat to companies, especially bigger enterprises. It is a form of cyberattack in which a security flaw that is undiscovered by the organization is exploited by attackers. Zero-day threats pose a serious challenge to enterprises as it becomes difficult to detect and mitigate an attack which is unknown.

Security Bulletin: Apache Camel Message Header Injection via Improper Filtering

In the days leading up to the publication of the Apache Camel Message Header Injection via Improper Filtering, now known as CVE-2025-27636, alarmist noise emerged from the wider cyber community, with Kevin Beaumont describing it as an “end of the world zero day” in Apache Camel, along with explicit details on how elements of this vulnerability worked.

Introducing Alfred for fully autonomous AI-built vulnerability assessments

We are excited to announce Detectify Alfred, a revolutionary system that uses AI to completely autonomously collect and prioritize threat intelligence and generate high-fidelity security tests for the CVEs that are most likely to be exploited in the wild.

Introducing dark web insights to Outpost24's EASM platform

We’re pleased to announce that a new Digital Risk Protection (DRP) integration has been added to Outpost24’s External Attack Surface management (EASM) platform: the Dark Web module. Security teams need complete visibility on their organization’s exposure and potential threats. This doesn’t only include your owned online assets, but also your dark web presence.

CVE-2025-1094: SQL Injection Vulnerability in PostgreSQL's Escaping Functions

CVE-2025-1094 presents a critical challenge to established SQL security paradigms, effectively circumventing fundamental best practices. Though initially reported over a month ago, the gravity of its implications warrants an extensive analysis. This vulnerability challenges the long-held assumption that proper escaping guarantees protection against SQL injection attacks.