CloudDefense.AI Blog
- Anshu Bansal
- Security
With the need for speed in the application development process, developers are rapidly turning to AI-powered IDEs like Cursor. It has not only enhanced developer productivity but also enabled organizations to achieve faster release cycles. However, implementing AI-generated code into the codebase introduces new security risks
- Anshu Bansal
- Security
With applications being the backbone of modern enterprises and a constant threat from attackers, complete security of every application has become a necessity. Moreover, development cycles are accelerating with time, and the addition of dependencies and API is making applications more complex. Although standard application security
- Abhishek Arora
- Security
Modern software development commands speed and agility, fueled by AI-assisted coding and an advanced CI/CD pipeline. However, to cater to high-speed application development approaches, organizations need a shift in their application security approach. AI SAST, or AI-based Static Application Security Testing, serves as a proactive and
- Anshu Bansal
- Security
Application security in today’s world is constantly under threat from cyber attackers exploiting every possible vulnerability in the application source code. Organizations require advanced and AI security testing methodologies within the SDLC to identify and mitigate vulnerabilities, including zero-day attacks. Among all, AI SAST and AI
- Anshu Bansal
- Security
The OWASP Top 10 is one of the primary standards that enables organizations to set a baseline for their application security. It provides organizations with a foundational guide, outlines the vital and severe application security risks. However, as attackers are getting sophisticated with their attacks and
- Anshu Bansal
- Security
For the last several years, traditional SAST has been one of the primary pillars of the modern software development environment. It employs a white-box approach to thoroughly scan the application’s source code and identify any vulnerabilities. However, with evolving cyberthreats, fast-paced development, and increasing complexity in
- Abhishek Arora
- Security
Over the years, the software development approach has undergone significant evolution. Modern organizations are always in pursuit of achieving quicker and more secure software delivery, making the “shift-left” approach a primary pillar. However, with increasing demand for precision in shift-left security and rapid cloud-native CI/CD workflow,
- Abhishek Arora
- Security
Over the years, the software development approach has undergone significant evolution. Modern organizations are always in pursuit of achieving quicker and more secure software delivery, making the “shift-left” approach a primary pillar. However, with increasing demand for precision in shift-left security and rapid cloud-native CI/CD workflow,
- Anshu Bansal
- Security
The cloud-native application protection platform, or CNAPP, has revolutionized how developers and AppSec teams secure modern cloud-native applications. It has brought a major shift to the security aspect of cloud native applications. With containers and Kubernetes becoming a default for development and a high-speed dev cycle
- Anshu Bansal
- Press
On 15-16 September 2025 a novel self-replicating supply-chain worm, being tracked publicly as “Shai-Hulud” was discovered in routine npm packages (npm packages compromised by Shai hulud worm). The malware was first observed in compromised versions of @ctrl/tinycolor and quickly expanded to dozens, then hundreds, of packages
Cloud Security









Malware vs Ransomware: Key Differences, Risks, and Prevention Strategies
Security



CI/CD Pipeline Security: Practical Controls That Don’t Slow Dev

Building a “Shift-Left” Pipeline: Automated Security Testing with QINA Pulse


CIEM vs PAM: Key Differences, Benefits, and Use Cases in Modern Security



End-to-End AppSec Automation: From Detection to Remediation with QINA Pulse
Press

Major Identity Verification Firm AU10TIX Exposes User Data in Year-Long Security Lapse

Could the Ticketmaster Breach that Affected Over 560 Million Users Be Avoided?

Indian State Government Fixes Website Bugs Found by CloudDefense.AI

Okta Faces Major Cyberattack as Hackers Breach Its Customer Support System

CloudDefense.AI Uncovers Exposed Database of Bangladeshi Spy Agency

CloudDefense.AI Discovers Over 3.3 Millions of Chinese IDs Exposed Online

CloudDefense.AI is now on AWS Marketplace: Simplifying Access to Expert Cloud and App Security Solutions

Unsecured Server Exposes Sensitive US Military Emails Online – Discovered by CloudDefense.AI

Scrubs & Beyond Data Breach: CloudDefense.AI Discovers Alarming Vulnerability
Testing
Application Security








Security Operations Center (SOC) Roles and Responsibilities

CI/CD Security
Threats



What are Leaky Vessels’ Vulnerabilities? How Does It Affect Your Container Environments?






 
								 
								 
															 
															 
															