News
Top threat intelligence platforms in 2026 | Wiz
6+ hour, 14+ min ago (832+ words) Threat intelligence platforms (TIPs) aggregate attacker data from OSINT, dark web sources, commercial feeds, and adversary infrastructure to highlight the threats most likely to be exploited. TIPs vary widely in data coverage, enrichment depth, prioritization logic, and integrations, so the…...
Claude Mythos: Preparing for the AI Vulnerability Wave | Wiz Blog
5+ day, 7+ hour ago (1171+ words) Anthropic's new model can autonomously discover zero-days and develop working exploits. While access is currently limited to responsible actors, now is the time to strengthen response playbooks, reduce exposure, and incorporate AI into security programs. This announcement signals the continuation…...
prt-scan: AI-Powered Git Hub Actions Supply Chain Attack | Wiz Blog
1+ week, 6+ day ago (989+ words) After hackerbot-claw, another AI-powered campaign exploiting pull_request_target confirms the threat is here to stay. We trace the attacker back to three weeks before anyone noticed. The campaign exploits a well-documented but still widespread misconfiguration: Git Hub's pull_request_target trigger. Unlike pull_request, this trigger runs…...
API management: Fundamentals for cloud security teams | Wiz
1+ week, 5+ day ago (1075+ words) API management is about how you actually govern and protect your cloud app's biggest attack surface'your APIs'from day one. A unified API management layer standardizes authentication and policy enforcement at core control points'your edge gateways and ingress controllers. It provides…...
Top Threat Intelligence Tools for 2026 and Beyond | Wiz
2+ week, 2+ day ago (1313+ words) Threat intelligence tools enable you to manage, analyze, and use threat information for effective risk mitigation strategies. Not all threat intelligence tools are equal. Feed quality, analytic depth, and integration maturity make or break their value. Threat data feed quality…...
Axios NPM Distribution Compromised in Supply Chain Attack | Wiz Blog
2+ week, 1+ day ago (279+ words) A compromised axios maintainer account led to malicious npm releases that propagated across environments. Learn how to assess impact, detect compromise, and secure your development workflows. The malicious package includes a dropper (setup. js) that downloads and executes platform-specific second-stage…...
Tracking Team PCP: Investigating Post-Compromise Attacks Seen in the Wild | Wiz Blog
2+ week, 1+ day ago (773+ words) How Team PCP are leveraging stolen secrets from the recent supply chain attacks to compromise cloud environments Following the recent supply chain attacks targeting the Trivy, KICKS, and Lite LLM projects, the Wiz Customer Incident Response Team (CIRT) and Wiz…...
The Top 28 Open-Source Security Tools: A 2026 Guide | Wiz
2+ week, 2+ day ago (1617+ words) Teams adopting OSS solutions should look for tools that embed seamlessly into CI/CD and pair well with cloud-native environments. Open-source tools frequently fail to identify whether a vulnerable function is truly reachable, exploitable, or exposed. Code security combines practices…...
Cloud Threats Retrospective 2026: Threat Actor Behavior in the Age of AI | Wiz
2+ week, 3+ day ago (181+ words) Cloud Threats Retrospective 2026: Threat Actor Behavior in the Age of AI'wiz. io Cloud Threats Retrospective 2026: Threat Actor Behavior in the Age of AI In 2025, cloud threat activity was driven less by novel exploits and more by the relentless weaponization of…...
What is AI Incident Response: A Practical Overview | Wiz
2+ week, 6+ day ago (710+ words) AI incident response refers to two related disciplines: using AI to accelerate how security teams detect, investigate, and contain threats, and responding to security incidents that specifically target AI systems like models, agents, and inference pipelines. The biggest bottleneck in…...