
MCP credential weakness raises red flags
More than half of Model Context Protocol servers were found to rely on static, long-lived credentials. With AI agents on the rise, that’s a problem.
Learn More about MCP credential weakness raises red flagsMore than half of Model Context Protocol servers were found to rely on static, long-lived credentials. With AI agents on the rise, that’s a problem.
Learn More about MCP credential weakness raises red flagsApplication security posture management is only as good as the technology it depends on. Here’s why modern software supply chain security tooling is key.
Learn More about Why modern AppSec is key to ASPMVibe-coded apps that make it to production can be a minefield for security teams. Here are key takeaways for your AppSec team.
Learn More about 5 vibe coding security lessonsMore than half of Model Context Protocol servers were found to rely on static, long-lived credentials. With AI agents on the rise, that’s a problem.
Read More about MCP credential weakness raises red flagsApplication security posture management is only as good as the technology it depends on. Here’s why modern software supply chain security tooling is key.
Read More about Why modern AppSec is key to ASPMLearn how the integration of the RL ICAP Server with the Kiteworks ICAP client can enhance your file security and threat detection.
Read More about Secure Your Data Exchange with RL & KiteworksVibe-coded apps that make it to production can be a minefield for security teams. Here are key takeaways for your AppSec team.
Read More about 5 vibe coding security lessonsRL researchers detected the first self-replicating worm that compromised npm packages with cloud token-stealing malware. Here's what you need to know.
Read More about Shai-hulud npm attack: What you need to knowBuilt-in security can play a role — and fits with the Secure by Design concept — but robust security controls remain essential.
Read More about Why 'security as by-product’ can't replace controlsAttack surface management (ASM) isn’t just another buzzword. It represents a fundamental shift in security strategy with risk on the rise.
Read More about ASM and the attack surface: 10 key risk factorsDiscover how Command Zero and ReversingLabs integrate to speed SOC investigations, cut false positives, and deliver high‑fidelity cyber intelligence.
Read More about Command Zero & RL: Accelerating SOC DefenseA malicious Model Context Protocol package was found in the wild last week. Here are lessons from the compromise of the AI interface tool.
Read More about The Postmark MCP server attack: 5 key takeawaysReversingLabs’ Advanced Search is a powerful feature that can gather related samples for threat hunting in your environment. Here's how.
Read More about Hunting SharpHounds with Spectra AnalyzeFunding of the OSS ecosystem has reached a crisis as threat actors increasingly target weaknesses in infrastructure.
Read More about The call for funding of open-source platformsHere's what you need to know about the discovery of the first self-replicating npm worm, which compromised packages with cloud token-stealing malware.
Read More about FAQ: The Shai-hulud npm worm attack explainedWhile security defenders welcomed the new vulnerability-validation tool, others stress it can be just as useful for would-be attackers.
Read More about CVE-Genie raises stakes in the vulnerability raceAs the development community chalks up the npm worm as just another bad day, bigger questions remain about the software supply chain ecosystem.
Read More about Shai-hulud attack: Don’t let worms eat DevOpsAI coding and other modern development practices mean flawed code will continue to ship. Here are key recommendations for managing software risk.
Read More about Deadlines vs. secure code: How AppSec can copeGet your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial