News

wiz.io
wiz.io > academy > api-security > api-management

API management: Fundamentals for cloud security teams | Wiz

17+ hour, 21+ min ago  (1075+ words) API management is about how you actually govern and protect your cloud app's biggest attack surface'your APIs'from day one. A unified API management layer standardizes authentication and policy enforcement at core control points'your edge gateways and ingress controllers. It provides…...

wiz.io
wiz.io > academy > threat-intel > the-top-oss-threat-intelligence-tools

Top Threat Intelligence Tools for 2026 and Beyond | Wiz

4+ day, 16+ hour ago  (1313+ words) Threat intelligence tools enable you to manage, analyze, and use threat information for effective risk mitigation strategies. Not all threat intelligence tools are equal. Feed quality, analytic depth, and integration maturity make or break their value. Threat data feed quality…...

wiz.io
wiz.io > blog > axios-npm-compromised-in-supply-chain-attack

Axios NPM Distribution Compromised in Supply Chain Attack | Wiz Blog

4+ day, 4+ hour ago  (279+ words) A compromised axios maintainer account led to malicious npm releases that propagated across environments. Learn how to assess impact, detect compromise, and secure your development workflows. The malicious package includes a dropper (setup.js) that downloads and executes platform-specific second-stage…...

wiz.io
wiz.io > blog > tracking-teampcp-investigating-post-compromise-attacks-seen-in-the-wild

Tracking TeamPCP: Investigating Post-Compromise Attacks Seen in the Wild | Wiz Blog

4+ day, 13+ hour ago  (773+ words) How TeamPCP are leveraging stolen secrets from the recent supply chain attacks to compromise cloud environments Following the recent supply chain attacks targeting the Trivy, KICKS, and LiteLLM projects, the Wiz Customer Incident Response Team (CIRT) and Wiz Research have…...

wiz.io
wiz.io > academy > application-security > open-source-code-security-tools

The Top 28 Open-Source Security Tools: A 2026 Guide | Wiz

5+ day, 31+ min ago  (1617+ words) Teams adopting OSS solutions should look for tools that embed seamlessly into CI/CD and pair well with cloud-native environments. Open-source tools frequently fail to identify whether a vulnerable function is truly reachable, exploitable, or exposed. Code security combines practices…...

wiz.io
wiz.io > events > cloud-threats-retrospective-2026-threat-actor-behavior-in-the-age-of-ai

Cloud Threats Retrospective 2026: Threat Actor Behavior in the Age of AI | Wiz

5+ day, 19+ hour ago  (181+ words) Cloud Threats Retrospective 2026: Threat Actor Behavior in the Age of AI'wiz.io Cloud Threats Retrospective 2026: Threat Actor Behavior in the Age of AI In 2025, cloud threat activity was driven less by novel exploits and more by the relentless weaponization of…...

wiz.io
wiz.io > academy > detection-and-response > ai-for-incident-response

What is AI Incident Response: A Practical Overview | Wiz

1+ week, 1+ day ago  (710+ words) AI incident response refers to two related disciplines: using AI to accelerate how security teams detect, investigate, and contain threats, and responding to security incidents that specifically target AI systems like models, agents, and inference pipelines. The biggest bottleneck in…...

wiz.io
wiz.io > blog > introducing-the-wiz-red-agent

Introducing the Wiz Red Agent- AI-Powered Attacker | Wiz Blog

1+ week, 4+ day ago  (955+ words) Red Agent is an AI-powered, context-aware attacker that uncovers complex exploitable risks across your entire attack surface, continuously and at scale. In early testing with design partners, Red Agent has already identified critical vulnerabilities that remained undetected despite extensive manual…...

wiz.io
wiz.io > customers > teamsystem

TeamSystem Uses Wiz to Secure Hypergrowth | Wiz

1+ week, 4+ day ago  (415+ words) Europe's fastest-growing software company achieved full cloud visibility across continuous growth M&A activities while improving cloud security posture by 66% Continuous M&A integration: TeamSystem acquires a large amount of companies annually, each bringing its own infrastructure, cloud architectures, and…...

wiz.io
wiz.io > blog > threes-a-crowd-teampcp-trojanizes-litellm-in-continuation-of-campaign

LiteLLM TeamPCP Supply Chain Attack: Malicious PyPI Packages | Wiz Blog

1+ week, 3+ day ago  (334+ words) LiteLLM is the latest victim of TeamPCP's open-source attack spree. Malicious versions 1.82.7 and 1.82.8 abuse Python's .pth mechanism for stealthy persistence. The malware exfiltrates cloud credentials, CI/CD secrets, and keys to attacker-controlled domains. 1.82.7 drops the double base64 encoded payload to disk…...