
.avif)
Welcome to our blog.

The 'no nonsense' list of security acryonyms
We list the security acronyms, what they mean and whether AppSec developers should care.

A deeper look into the threat actor behind the react-native-aria attack
We investigate the activity of the threat actor that compromised react-native-aria packages on npm, and how they are evolving their attacks.
.png)
Malicious crypto-theft package targets Web3 developers in North Korean operation
Aikido Security uncovers a North Korean-linked supply chain attack using the fake npm package web3-wrapper-ethers to steal private keys from Web3 developers. Linked to Void Dokkaebi, the threat actor mirrors past DPRK crypto theft operations. Learn how the attack worked and what to do if you're affected.
Customer Stories
See how teams like yours are using Aikido to simplify security and ship with confidence.
Compliance
Stay ahead of audits with clear, dev-friendly guidance on SOC 2, ISO standards, GDPR, NIS, and more.
Guides & Best Practices
Actionable tips, security workflows, and how-to guides to help you ship safer code faster.
DevSec Tools & Comparisons
Deep dives and side-by-sides of the top tools in the AppSec and DevSecOps landscape.
Reducing Cybersecurity Debt with AI Autotriage
We dive into how AI can assist us in a meaningful way to triage vulnerabilities and get rid of our security debt.
XRP supply chain attack: Official NPM package infected with crypto stealing backdoor
The official XPRL (Ripple) NPM package was compromised by sophisticated attackers who put in a backdoor to steal cryptocurrency private keys and gain access to cryptocurrency wallets.
Top Container Scanning Tools in 2025
Discover the best Container Scanning tools in 2025. Compare features, pros, cons, and integrations to choose the right solution for your DevSecOps pipeline.
SAST vs DAST: What you need to know.
Get an overview of SAST vs DAST, what they are, how to use them together, and why they matter for your application security.
Get the TL;DR: tj-actions/changed-files Supply Chain Attack
Let’s get into the tj-actions/changed-files supply chain attack, what you should do, what happened, and more information.
Top AppSec Tools in 2025
Explore the top AppSec tools of 2025 for securing your applications from development to production. See which solutions align with your team’s needs.
Sensing and blocking JavaScript SQL injection attacks
Safeguard your apps from JavaScript SQL injection attacks by understanding common vulnerabilities and deploying embedded AppSec solutions like Firewall.
Prisma and PostgreSQL vulnerable to NoSQL injection? A surprising security risk explained
Discover how Prisma ORM and PostgreSQL can be vulnerable to operator injection, a form of NoSQL injection. Learn how attackers exploit this risk and get practical tips to secure your JavaScript applications with input validation and safe query practices.
Launching Opengrep | Why we forked Semgrep
Meet Opengrep, the open source SAST engine – a fork of Semgrep. We initiated Opengrep to advance and commoditize SAST across the appsec industry.
Your Client Requires NIS2 Vulnerability Patching. Now What?
Discover vulnerability requirements for NIS2 vulnerability patching compliance. Learn about critical timelines, proper documentation, and strategies to streamline your processes. Ensure your business meets EU cybersecurity standards efficiently.
Top 10 AI-powered SAST tools in 2025
AI has changed how many of the leading SAST tools work. This list breaks down the leaders in SAST tooling and how they are impementing AI.
Snyk vs Aikido Security | G2 Reviews Snyk Alternative
Looking for a Snyk alternative? Compare Aikido vs Snyk with verified user reviews, directly from G2.
Top 10 Software Composition Analysis (SCA) tools in 2025
SCA tools are our best line of defense for open-source security, this article explores the top 10 open-source dependency scanners for 2025
Get secure for free
Secure your code, cloud, and runtime in one central system.
Find and fix vulnerabilities fast automatically.
.avif)
