Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security Advisory: Critical RCE Vulnerabilities in React Server Components & Next.js (CVE-2025-55182 / CVE-2025-66478)

On December 3, 2025, coordinated disclosures revealed that multiple releases of React 19 and Next.js contain a critical flaw in the React Server Components (RSC) “Flight” protocol, allowing unauthenticated remote code execution (RCE). The vulnerability originates from unsafe deserialization of attacker-controlled data in server-side RSC payload handling.

PyTorch Users at Risk: Unveiling 3 Zero-Day PickleScan Vulnerabilities

JFrog Security Research found 3 zero-day critical vulnerabilities in PickleScan, which would allow attackers to bypass the most popular Pickle model scanning tool. PickleScan is a widely used, industry-standard tool for scanning ML models and ensuring they contain no malicious content.

Defining and Defending Against a Zero Day Attack

Unexpected attacks are the hardest to fend off. In the realm of cyber, Zero Day vulnerabilities are among the greatest risks, as these software flaws are unknown and exploited before a fix is available, potentially compromising the thousands of organizations that are unwittingly using vulnerable software.

CVE-2025-54057: Stored XSS Vulnerability in Apache SkyWalking Exposes Monitoring Dashboards to Attackers

Apache SkyWalking is one of the most widely adopted open-source Application Performance Monitoring (APM) and observability platforms, trusted by developers and DevOps teams to visualize telemetry, trace distributed systems, and ensure application uptime. However, a recently disclosed vulnerability has revealed that the very dashboards designed to improve visibility could be turned into attack vectors.

Defining and Defending Against a Zero Day Attack

Unexpected attacks are the hardest to fend off. In the realm of cyber, Zero Day vulnerabilities are among the greatest risks, as these software flaws are unknown and exploited before a fix is available, potentially compromising the thousands of organizations that are unwittingly using vulnerable software.

Best 5 Platforms to Help Eliminate CVEs from Container Images

The rapid adoption of containerized applications has reshaped software development and deployment across industries. Containers allow teams to deliver updates faster, scale efficiently, and manage dependencies with precision. However, this flexibility comes with a critical challenge: vulnerabilities hidden inside container images.

Can Claude Opus 4.5 Build a SECURE Note Taking App?

Can Claude Opus 4.5 actually build a secure, fully functional note-taking app? In this video, I challenge the latest Claude model to create an app with real features — create, edit, update, delete, plus basic security — and see if the code holds up in practice. This is a real test of how far AI can go in building usable software.

Secure your code at scale with AI-driven vulnerability management

As development teams adopt generative AI at an unprecedented pace, security teams face an evolving set of challenges in securing the software development life cycle. The increasing speed and scale of code changes make it more difficult for organizations to manage risk effectively. Legacy scanners often fail to keep up, returning slow results and noisy alerts that increase remediation time and leave organizations exposed to potential breaches.