April 24, 2026 Securing the AI Supply Chain: How OX VibeSec Defends Against Anthropic MCP Vulnerability
April 23, 2026 Shai-Hulud: The Third Coming — Bitwarden CLI Backdoored in Latest Supply Chain Campaign
April 15, 2026 The Mother of All AI Supply Chains: Critical, Systemic Vulnerability at the Core of Anthropic’s MCP
March 24, 2026 Critical Access Control Flaw in Apache Superset Exposes Sensitive Data to Unauthorized Users
March 24, 2026 Known, Unpatched, Exploitable: Redash’s Python Sandbox Escape Gives Attackers Full Server Access
March 10, 2026 CVE-2025-11158: Critical RCE Found in Widely-Deployed Pentaho Platform, Putting Enterprise BI at Risk
February 20, 2026 Newly discovered NPM worm is hijacking CI workflows and targeting AI-based packages
February 17, 2026 Code Runner VS Code Extension Enables Remote Code Execution via Settings Manipulation
February 2, 2026 Millions of AI Servers at Risk: Critical vLLM RCE Lets Attackers Take Over via Video Link (CVE-2026-22778)
December 17, 2025 Top 10 Snyk Alternatives for DevSecOps and Platform Engineering Workflows [2026 Update]
December 17, 2025 Agility Meets Security: Kaltura’s Journey to Streamlined Development with OX Security
December 12, 2025 React Vulnerabilities Strike Again: Denial Of Service & Information Leakage in Patched Versions of React2Shell
December 11, 2025 React2Shell | Going Granular: A Deep-Deep-Deep Technical Analysis of CVE-2025-55182
December 10, 2025 OX Named Innovation Leader for the Second Consecutive Year in Frost & Sullivan’s ASPM Frost Radar
December 3, 2025 5 Best DAST Tools for Enterprise Security in 2026: Scaling Beyond Basic Web App Scans
November 25, 2025 OX Recognized by Gartner as Sample Vendor for ADR, Bridging Code Creation and Runtime Security
October 23, 2025 OX Research: AI Code Not Inherently Less Secure, but “Army of Juniors” Effect Undermines Software Security
October 21, 2025 Forked and Forgotten: 94 Vulnerabilities in Cursor and Windsurf Put 1.8M Developers at Risk
September 30, 2025 Solving the AI Confidence Paradox: Why Developers Don’t Trust the Tools They Use Most
September 23, 2025 OX Security Named a Leader in Application Security Posture Management by IDC MarketScape
September 18, 2025 Application Vulnerability Assessment: A Practical Guide for Modern DevSecOps Teams
August 21, 2025 From Regulation to Reality: How OX Security Helps Teams Operationalize the EU Cyber Resilience Act
August 21, 2025 Unmasking the Hidden Risks: Why Scanning Public Container Images is Your Next Security Imperative
August 14, 2025 The aftermath of CVE-2025-4609: Critical Sandbox Escape Leaves 1.5M Developers Vulnerable
August 11, 2025 10 Best SCA Tools for 2025: Evaluating Software Composition Analysis for Modern Security Pipelines
August 7, 2025 A Practical Guide to Application Security Testing: Methods, Tools, and Real-World Integration
July 10, 2025 How to Become a Secure Developer Rockstar: Five Ways to Launch Your Software Career with Security at the Center
July 1, 2025 Can You Trust that Verified Symbol? Exploiting IDE Extensions is Easier Than it Should Be
June 30, 2025 How to Avoid Reckless Adoption of AI-Assisted Development: What Every Team Needs to Know
June 24, 2025 From Payloads to PowerPoints: Security Reporting that Speaks Your Business Colleagues’ Language
June 19, 2025 From Regulation to Resilience: How the EU AI Act Impacts Software Development and Why ASPM Matters
June 15, 2025 Confirmed Critical | “The Grafana Ghost” exposes 36% of public-facing instances to malicious account takeover
April 10, 2025 Integrate Microsoft Teams with OX ASPM for Streamlined Security and Development Workflows
February 20, 2025 Drowning in Application Security Alerts? Prioritize What Matters with Unified AppSec
January 14, 2025 A Get out of Security Debt: five ways automation tools help prioritize security issues across the SDLC
January 14, 2025 Application Security Testing: The Ultimate Guide to Modern AST Platforms & Practices
January 7, 2025 Exploitable vs. Not-Exploitable: How to Tell the Difference for Your Software Vulnerabilities
November 7, 2024 SCA Security: Mitigate Supply Chain Risks with Advanced Software Composition Analysis
November 6, 2024 Three Ways Ox Security Helps You Navigate Financial Compliance in Application Security
October 30, 2024 OX Security Named to Lightspeed and Fortune “Cyber 60” List of Top VC-backed Early-Growth Cybersecurity Companies
October 10, 2024 OX Security Wins “Application Security Company of the Year” at CyberSecurity Breakthrough Awards 2024
September 26, 2024 Navigating the Challenges of Vulnerability Management: Reachability Analysis Explored
September 10, 2024 Effectively Communicating Risk with Visibility: Eli Edelkind’s Cybersecurity Playbook for Executives
August 20, 2024 That was then, this is now….Modernizing AppSec in Fast-Paced Development Environments
August 15, 2024 How to Align Infosec to Business Operations: Sam Curry’s Cybersecurity Playbook for Executives
July 24, 2024 The Essential Role of Multi-Layered Defense and Role Based Access Control: OX Security’s Enhanced RBAC Functionality
June 19, 2024 Obtaining Security Budgets You Need (Not Deserve): Ira Winkler’s Cybersecurity Playbook for Executives
June 17, 2024 From Risk to Resolution: OX Security’s Integrations with KEV and EPSS Drive Smarter Vulnerability Prioritization
May 9, 2024 Demystifying Attack Path Analysis in Application Security: Benefits, Implementation, and Considerations
May 8, 2024 Press Release: OX Security and HCLSoftware Announce Strategic Partnership to Launch AppScan Supply Chain Security
May 7, 2024 Unlocking a New Era in Application Security with OX Security’s Attack Path Reachability Analysis
May 7, 2024 Press Release: Optimizing Application Security with OX Security’s Attack Path Reachability Analysis
May 6, 2024 Press Release: OX Security Named Winner of the Coveted Global InfoSec Awards during RSA Conference 2024
March 21, 2024 Bridging the Gap: Integrating SOCs into Application Security for Enhanced Cyber Resilience
March 15, 2024 Securing Your Software Development in Compliance with CISA: How OX Security Simplifies the Process
March 7, 2024 Say Goodbye to Manual AppSec Overhead: Unleashing the Power OX’s Automated No-Code Workflows
January 31, 2024 Press Release: OX Security Unveils the First Active Application Security Posture Management Platform to Eliminate Manual Practices
December 21, 2023 Protect Your Software Supply Chain with OX Security’s Latest Integration with Bitbucket Cloud
December 20, 2023 Code’s Covert Threat: Unveiling Secrets and Personally Identifiable Information (PII)