Shai-Hulud: a self-propagating npm worm hits @ctrl/tinycolor and dozens more packages

npm packages compromised by Shai hulud worm

On 15-16 September 2025 a novel self-replicating supply-chain worm, being tracked publicly as “Shai-Hulud”  was discovered in routine npm packages (npm packages compromised by Shai hulud worm). The malware was first observed in compromised versions of @ctrl/tinycolor and quickly expanded to dozens, then hundreds, of packages by abusing maintainer workflows and registry APIs. The payload […]

Code Security Scanning in 2025: A Practical Guide

Code Security Scanning in 2025_ A Practical Guide

In 2025, developers are always finding ways to speed up their development process. With the rapid adoption of AI code editors, organizations are achieving unprecedented development speed. However, it is also creating attack vectors in the development pipeline, and a vulnerability in the codebase can hamper the whole application.  Thus, securing the codebase is no […]

CI/CD Pipeline Security: Practical Controls That Don’t Slow Dev

CI/CD Pipeline Security_ Practical Controls That Don’t Slow Dev

Software development was once a team’s job. The advent of Continuous Integration and Continuous Delivery (CI/CD) completely transformed everything. It enables multiple dev teams to work together and boost the development through automation. For modern organizations, the CI/CD pipeline has become the backbone to cope with the modern trend of high-speed development.  However, with speed […]

Security Alert: Popular npm packages briefly compromised (chalk, debug, color family)

Security Alert Popular npm packages briefly compromised (chalk, debug, color family)

A maintainer’s npm account was phished, and malicious versions of several widely used packages—chalk, debug, and a set of color/ANSI utilities—were published. Community reports and maintainer issues confirmed the tampering and the compromised versions were rapidly pulled. The payload acted as a crypto-drainer primarily when code ran in a browser context.  Why it matters:These packages […]

CIEM vs PAM: Key Differences, Benefits, and Use Cases in Modern Security

CIEM vs PAM_ Key Differences, Benefits, and Use Cases in Modern Security

With the growing complexity of securing both cloud and on-premises environments, organizations face a challenging decision when choosing between security solutions like CIEM and PAM. CIEM vs PAM each address critical aspects of access control but focus on different areas. CIEM specializes in managing cloud identities and entitlements to secure cloud resources, while PAM focuses […]

Build-Time vs Run-Time Security: Learn Why You Need Both!

Build-Time vs Run-Time Security_ Learn Why You Need Both

Application security is a critical aspect of the software development lifecycle (SDLC), as vulnerabilities can emerge at any stage. Build-Time vs Run-Time Security highlights two essential layers of defense that work together to protect applications. Build-time security plays a key role by identifying and addressing potential flaws early in the development process, preventing them from […]

End-to-End AppSec Automation: From Detection to Remediation with QINA Pulse 

End-to-End AppSec Automation_ From Detection to Remediation with QINA Pulse

Every organization is adopting new development approaches to deliver its application as quickly as possible in the market. However, many of them still use traditional approaches for their application security, burdening analysts with high alert, inconsistency in policy deployment, and a huge workload. It also creates a gap between identifying security threats and remediating them, […]

QINA Pulse vs Traditional Tools: Which Security Automation Wins?

QINA Pulse vs Traditional Tools_ Which Security Automation Wins

In today’s evolving cybersecurity landscape, security teams are always engaged in a relentless battle against modern cyber threats. They are facing an increasing number of attacks along with complex and advanced issues. So, what are security professionals from top organizations doing to cope with it? They are gradually shifting from traditional security automation tools to […]

What is Pulse-Style Security Automation and Why It Matters

What is Pulse-Style Security Automation and Why It Matters

With evolving cyber threats and a fast-paced development cycle, it has become a necessity for every organisation to maintain a balance. Security automation enables your developer and AppSec team to automate security tasks while ensuring high-velocity development. Despite all the automation, organizations often lag in terms of intelligent automation and optimized processes.  This is where […]

6 Powerful Use Cases of AI in Security Automation 

6 Powerful Use Cases of AI in Security Automation

With time, modern technology is progressing in leaps and bounds, and so are the cybersecurity threats. Attackers are now using advanced methodologies to perform a variety of cybercrimes. Even though organizations are turning to security automation, it still lags behind the increasing and ever-evolving cyber threats.  To tackle this, organizations are rapidly adopting Artificial Intelligence-driven […]