CloudDefense.AI Blog
- Abhishek Arora
- Security
Over the years, the software development approach has undergone significant evolution. Modern organizations are always in pursuit of achieving quicker and more secure software delivery, making the “shift-left” approach a primary pillar. However, with increasing demand for precision in shift-left security and rapid cloud-native CI/CD workflow,
- Abhishek Arora
- Security
Over the years, the software development approach has undergone significant evolution. Modern organizations are always in pursuit of achieving quicker and more secure software delivery, making the “shift-left” approach a primary pillar. However, with increasing demand for precision in shift-left security and rapid cloud-native CI/CD workflow,
- Anshu Bansal
- Security
The cloud-native application protection platform, or CNAPP, has revolutionized how developers and AppSec teams secure modern cloud-native applications. It has brought a major shift to the security aspect of cloud native applications. With containers and Kubernetes becoming a default for development and a high-speed dev cycle
- Anshu Bansal
- Press
On 15-16 September 2025 a novel self-replicating supply-chain worm, being tracked publicly as “Shai-Hulud” was discovered in routine npm packages (npm packages compromised by Shai hulud worm). The malware was first observed in compromised versions of @ctrl/tinycolor and quickly expanded to dozens, then hundreds, of packages
- Abhishek Arora
- Security
In 2025, developers are always finding ways to speed up their development process. With the rapid adoption of AI code editors, organizations are achieving unprecedented development speed. However, it is also creating attack vectors in the development pipeline, and a vulnerability in the codebase can hamper
- Anshu Bansal
- Security
In 2025, developers are always finding ways to speed up their development process. With the rapid adoption of AI code editors, organizations are achieving unprecedented development speed. However, it is also creating attack vectors in the development pipeline, and a vulnerability in the codebase can hamper
- Anshu Bansal
- Security
Software development was once a team’s job. The advent of Continuous Integration and Continuous Delivery (CI/CD) completely transformed everything. It enables multiple dev teams to work together and boost the development through automation. For modern organizations, the CI/CD pipeline has become the backbone to cope with
- Anshu Bansal
- Press
A maintainer’s npm account was phished, and malicious versions of several widely used packages—chalk, debug, and a set of color/ANSI utilities—were published. Community reports and maintainer issues confirmed the tampering and the compromised versions were rapidly pulled. The payload acted as a crypto-drainer primarily when code
- Abhishek Arora
- Security
Shift-left security has become a necessity in today’s high-speed application development to protect the application and data from evolving cyber threats. As organizations gradually move towards more Agile methodologies, security can no longer remain an afterthought. Shift-left as a proactive approach helps in integrating security checks
- Abhishek Arora
- Security
Securing today’s cloud-driven businesses is a challenge, and choosing the right approach can be overwhelming. Two popular frameworks – SASE and CASB which often come up in the conversation. SASE redefines network security with a unified edge approach, while CASB focuses on protecting cloud apps and
Cloud Security


Cloud Security vs Traditional Security: Key Differences and Cost-Effectiveness




What is Cloud Native? Explaining Cloud Native Applications



Security




How to Secure Your Source Code Before Production with QINA Clarity (AI SAST)

QINA Clarity AI: Next-Gen SAST for Code, Package & API Security




Press


DPDP Bill 2023 Passed by Rajya Sabha: A Game-Changer for Data Protection in India

CloudDefense.AI Discovered Major Data Breach of Falkensteiner, Thousands of Customers’ Data Exposed

CloudDefense.AI Uncovers Internshala’s Security Breach Exposes Users’ Data

CloudDefense.AI Secures Slick’s Database Containing 153,000 Users

CloudDefense.AI exposes security flaw in breast pump company’s data storage, leaving millions of documents at risk

CloudDefense.AI Discovered Yes Madam’s Security Breach, Exposing Sensitive Data of 900,000 Customers and Gig Workers

CloudDefense.AI Discovers Unsecured Database of a Higher Education Social Platform, Exposing Sensitive Personal Data of Millions

CloudDefense.AI Uncovers Misconfigured Database Leaking Personal Data of Over 700,000 Users
Testing
Application Security








Security Operations Center (SOC) Roles and Responsibilities
