Back to Blog

Cloud & Application Security

13 posts
Vishing and SSO abuse are accelerating rapid SaaS extortion

Vishing and SSO abuse are accelerating rapid SaaS extortion

Vishing and SSO abuse are accelerating rapid SaaS extortion The most dangerous part of modern SaaS intrusions is not always malware. Sometimes it is speed, trus...

May 5, 2026
5 min read
ConsentFix v3 turns Azure OAuth phishing into a scalable token theft risk

ConsentFix v3 turns Azure OAuth phishing into a scalable token theft risk

ConsentFix v3 turns Azure OAuth phishing into a scalable token theft risk ConsentFix v3 matters because it shifts Azure account compromise away from password th...

May 4, 2026
5 min read
PyTorch Lightning supply-chain compromise puts AI developer credentials at risk

PyTorch Lightning supply-chain compromise puts AI developer credentials at risk

PyTorch Lightning supply-chain compromise puts AI developer credentials at risk The most dangerous supply-chain incidents are not always the ones that hit opera...

May 2, 2026
5 min read
CVE-2026-42208 turns exposed LiteLLM gateways into a secrets exposure risk

CVE-2026-42208 turns exposed LiteLLM gateways into a secrets exposure risk

CVE-2026-42208 turns exposed LiteLLM gateways into a secrets exposure risk CVE-2026-42208 is a critical SQL injection flaw in LiteLLM's proxy API key verificati...

April 29, 2026
5 min read
Lovable Incident Raises Cross-Tenant Data Exposure Concerns for AI Development Platforms

Lovable Incident Raises Cross-Tenant Data Exposure Concerns for AI Development Platforms

Lovable Incident Raises Cross-Tenant Data Exposure Concerns for AI Development Platforms Lovable, an AI platform used to build and iterate software projects, is...

April 23, 2026
2 min read
CVE-2026-5752 turns the Terrarium sandbox into a root-level escape risk

CVE-2026-5752 turns the Terrarium sandbox into a root-level escape risk

CVE-2026-5752 turns the Terrarium sandbox into a root-level escape risk A critical flaw in Terrarium, tracked as CVE-2026-5752, deserves attention well beyond a...

April 23, 2026
4 min read
Malicious Chrome extensions turn OAuth tokens into enterprise risk

Malicious Chrome extensions turn OAuth tokens into enterprise risk

Malicious Chrome extensions turn OAuth tokens into enterprise risk A newly reported cluster of malicious Chrome Web Store extensions is a useful warning for def...

April 15, 2026
5 min read
CVE-2026-39987 puts exposed Marimo notebooks on a fast credential-theft path

CVE-2026-39987 puts exposed Marimo notebooks on a fast credential-theft path

CVE-2026-39987 puts exposed Marimo notebooks on a fast credential-theft path CVE-2026-39987 is a sharp reminder that smaller developer and data-science platform...

April 12, 2026
4 min read
CVE-2026-33017: Langflow RCE Hits Exposed AI Pipelines

CVE-2026-33017: Langflow RCE Hits Exposed AI Pipelines

CVE-2026-33017: Langflow RCE Hits Exposed AI Pipelines | 2026 CVE-2026-33017 is a critical Langflow flaw that turns a public-flow convenience feature into unaut...

March 23, 2026
6 min read
Critical n8n Flaws Enable RCE and Credential Exposure

Critical n8n Flaws Enable RCE and Credential Exposure

Critical n8n flaws enable RCE and credential exposure | 2026 Executive Summary Two critical n8n flaws disclosed in March 2026 significantly raise risk for both...

March 12, 2026
6 min read
SolarWinds warns of critical Web Help Desk RCE, auth bypass flaws

SolarWinds warns of critical Web Help Desk RCE, auth bypass flaws

SolarWinds Web Help Desk: Five Critical Vulnerabilities, Patch Bypass History, and the Most Dangerous IT Service Management Flaw of 2026 Executive Summary On Ja...

February 14, 2026
14 min read

MaliciousCorgi: VSCode Supply Chain Attack on 1.5M Devs | 2026

Executive Summary Since January 2026, the sophisticated MaliciousCorgi supply chain attack has weaponized two malicious AI coding assistants on the official VSC...

February 2, 2026
6 min read