
.avif)
Welcome to our blog.

Allseek and Haicker are joining Aikido: Building Autonomous AI Pentesting
Allseek and Haicker join Aikido to launch Aikido Attack, autonomous pentests that think like hackers and run in hours instead of weeks.
Customer Stories
See how teams like yours are using Aikido to simplify security and ship with confidence.
Compliance
Stay ahead of audits with clear, dev-friendly guidance on SOC 2, ISO standards, GDPR, NIS, and more.
Guides & Best Practices
Actionable tips, security workflows, and how-to guides to help you ship safer code faster.
DevSec Tools & Comparisons
Deep dives and side-by-sides of the top tools in the AppSec and DevSecOps landscape.
RATatouille: A Malicious Recipe Hidden in rand-user-agent (Supply Chain Compromise)
RATatouille: A Malicious Recipe Hidden in rand-user-agent (Supply Chain Compromise)
A Guide to Container Privilege Escalation Vulnerabilities
Learn how container privilege escalation vulnerabilities work, the risks they pose, and steps to prevent attackers from gaining unauthorized access.
Cloud Security Assessment: How to Evaluate Your Cloud Posture
Learn how to run a cloud security assessment to evaluate risks, detect misconfigurations, and improve your security posture.
Docker & Kubernetes Container Security Explained
Learn how to secure Docker containers and Kubernetes clusters. Best practices, risks, and tools every DevOps team should know.
XRP supply chain attack: Official NPM package infected with crypto stealing backdoor
The official XPRL (Ripple) NPM package was compromised by sophisticated attackers who put in a backdoor to steal cryptocurrency private keys and gain access to cryptocurrency wallets.
Web & REST API Security Explained
Understand the fundamentals of web and REST API security — risks, attack vectors, and protection strategies developers must know.
The malware dating guide: Understanding the types of malware on NPM
A breakdown of real-world malicious npm packages and the techniques they use to exploit the JavaScript supply chain.
Cloud Container Security: Protecting Kubernetes and Beyond
Find out how to secure containers and Kubernetes environments with the latest tools, practices, and security strategies.
Top 9 Docker Container Security Vulnerabilities
Discover the top Docker container security vulnerabilities, their risks, and best practices to secure your applications against modern container threats
Continuous Pentesting in CI/CD
Understand how to integrate continuous pentesting into CI/CD pipelines to secure software at scale.
Reducing Cybersecurity Debt with AI Autotriage
We dive into how AI can assist us in a meaningful way to triage vulnerabilities and get rid of our security debt.
Bugs in Shai-Hulud: Debugging the Desert
The Shai Hulud worm had some bugs of its own, and required patching by the attackers. We also look at a timeline of events, to see how it unfolded.
Top 12 Dynamic Application Security Testing (DAST) Tools in 2026
Discover the 12 top best Dynamic Application Security Testing (DAST) tools in 2026. Compare features, pros, cons, and integrations to choose the right DAST solution for your DevSecOps pipeline.
SAST vs DAST: What you need to know.
Get an overview of SAST vs DAST, what they are, how to use them together, and why they matter for your application security.
Get secure for free
Secure your code, cloud, and runtime in one central system.
Find and fix vulnerabilities fast automatically.
.avif)
