Second wave of Shai-Hulud npm worm compromises the global software supply chain
Shadow AI: The hidden risk inside your enterprise (and how to manage it)
Web LLM attacks: Securing AI-powered applications
Sensorless (agentless) API discovery explained
AppSec in the age of AI-powered attacks: Are your apps ready?
API discovery and visibility: The foundations of modern application security
Shadow and zombie APIs: Find them with discovery, test them through scanning
OWASP Top 10 risks for LLMs (2025 update)
Shadow vs. zombie vs. rogue APIs: Understanding the risks