
.avif)
Welcome to our blog.
2026 State of AI in Security & Development
Our new report captures the voices of 450 security leaders (CISOs or equivalent), developers, and AppSec engineers across Europe and the US. Together, they reveal how AI-generated code is already breaking things, how tool sprawl is making security worse, and how developer experience is directly tied to incident rates. This is where speed and safety collide in 2025.

Vulnerabilities & Threats
Cut through the noise with real-world CVE breakdowns, malware analysis, exploits, and emerging risks.
Customer Stories
See how teams like yours are using Aikido to simplify security and ship with confidence.
Drata Integration - How to Automate Technical Vulnerability Management
How to become compliant without imposing a heavy workload on your dev team: Aikido and Drata integration automates technical vulnerability management. You'll better prepare for SOC 2 and ISO 27001:2022 while reducing false positives and saving time and money.
DIY guide: ‘Build vs buy’ your OSS code scanning and app security toolkit
Yes, you can enhance your app security posture by patching together open-source code and container scanning tools—if you can handle the infrastructure.
SOC 2 certification: 5 things we learned
What we learned about SOC 2 during our audit. ISO 27001 vs. SOC 2, why Type 2 makes sense, and how SOC 2 certification is essential for US customers.
Top 10 app security problems and how to protect yourself
As a developer, you don't have time for perfect app security. Let's give you the TL;DR on the biggest problems, whether you're at risk, and how to fix them.
We just raised our $17 million Series A
We've raised $17M to bring “no BS” security to devs. We’re happy to welcome Henri Tilloy from Singular.vc on board, who is again joined by Notion Capital and Connect Ventures. This round comes just 6 months after we raised $5.3M in seed funding. That’s fast.
Webhook security checklist: How to build secure webhooks
Building webhooks in your SaaS? Use this webhook security checklist to make sure you're taking the necessary steps to protect your app and user data.
The Cure For Security Alert Fatigue Syndrome
Aikido aims to cure Security Alert Fatigue Syndrome by reducing noise and false positives that waste developers' time. Learn how Aikido intelligently ignores irrelevant security alerts for you, adapts severity scores. This helps Aikido users to easily prioritize fixes for genuine threats. This win-win approach improves developer productivity and resolves security issues faster.
NIS2: Who is affected?
Is your B2B company in scope of the NIS2 Directive? Find out if you need to comply with NIS2 based on industry and size criteria. What are essential and important sectors and company size thresholds? Aikido's app has a NIS2 report feature.
ISO 27001 certification: 8 things we learned
We wished we'd known these tips before we started the ISO 27001:2022 compliance process. This is our advice to any SaaS company going for ISO 27001.
Cronos Group chooses Aikido Security to strengthen security posture for its companies and customers
The Cronos Group chooses Aikido Security to strengthen its security posture. Aikido's Partner Portal gives The Cronos Group a central overview of the companies in their group. Additionally, as a reseller, The Cronos Group will offer Aikido to its clients.
One year of Opengrep: What we built and what’s next
A year after forking Semgrep, Opengrep is faster, supports deeper taint analysis, and produces consistent, reproducible results.
Popular PyTorch Lightning Package Compromised by Mini Shai-Hulud
Malware found in popular PyTorch Lightning version 2.6.2 and 2.6.3, stealing credentials, crypto wallets, and VPN configs as part of the Mini Shai-Hulud campaign.
Mini Shai-Hulud Targets SAP npm Packages With a Bun-Based Secret Stealer
Compromised SAP npm packages use a Bun-based preinstall payload to steal GitHub, npm, cloud, and CI secrets, then spread via GitHub using OhNoWhatsGoingOnWithGitHub.
Someone published four versions of a fake "tanstack" package in 27 minutes to steal your .env files
A fake "tanstack" npm package published four malicious versions in 27 minutes today, exfiltrating .env files via a postinstall hook. Here's what happened, who was affected, and how to rotate your credentials.
Top 12 Dynamic Application Security Testing (DAST) Tools in 2026
Discover the 12 top best Dynamic Application Security Testing (DAST) tools in 2026. Compare features, pros, cons, and integrations to choose the right DAST solution for your DevSecOps pipeline.
A practical CTO security checklist to be Mythos-ready
A practical checklist for SaaS CTOs navigating a world with Mythos and agentic AI threats. Built around the defender's advantage: you have context attackers have to work to get. Covers the controls, practices, and operational habits that determine whether your team finds and fixes issues before someone else does.
Get secure now
Secure your code, cloud, and runtime in one central system.
Find and fix vulnerabilities fast automatically.




