.avif)
Welcome to our blog.

A deeper look into the threat actor behind the react-native-aria attack
We investigate the activity of the threat actor that compromised react-native-aria packages on npm, and how they are evolving their attacks.
.png)
Malicious crypto-theft package targets Web3 developers in North Korean operation
Aikido Security uncovers a North Korean-linked supply chain attack using the fake npm package web3-wrapper-ethers to steal private keys from Web3 developers. Linked to Void Dokkaebi, the threat actor mirrors past DPRK crypto theft operations. Learn how the attack worked and what to do if you're affected.

Active NPM Attack Escalates: 16 React Native Packages for GlueStack Backdoored Overnight
A sophisticated supply chain attack is actively compromising packages related to react-native-aria on NPM, deploying a stealthy Remote Access Trojan (RAT) hidden through obfuscation and spreading across modules with over a million weekly downloads.
Customer Stories
See how teams like yours are using Aikido to simplify security and ship with confidence.
Compliance
Stay ahead of audits with clear, dev-friendly guidance on SOC 2, ISO standards, GDPR, NIS, and more.
Guides & Best Practices
Actionable tips, security workflows, and how-to guides to help you ship safer code faster.
DevSec Tools & Comparisons
Deep dives and side-by-sides of the top tools in the AppSec and DevSecOps landscape.
Reducing Cybersecurity Debt with AI Autotriage
We dive into how AI can assist us in a meaningful way to triage vulnerabilities and get rid of our security debt.
XRP supply chain attack: Official NPM package infected with crypto stealing backdoor
The official XPRL (Ripple) NPM package was compromised by sophisticated attackers who put in a backdoor to steal cryptocurrency private keys and gain access to cryptocurrency wallets.
Top Container Scanning Tools in 2025
Discover the best Container Scanning tools in 2025. Compare features, pros, cons, and integrations to choose the right solution for your DevSecOps pipeline.
SAST vs DAST: What you need to know.
Get an overview of SAST vs DAST, what they are, how to use them together, and why they matter for your application security.
NIS2: Who is affected?
Who does NIS2 apply to? Who does it affect? What are essential and important sectors and company size thresholds? Aikido's app has a NIS2 report feature.
ISO 27001 certification: 8 things we learned
What we wished we'd known before starting the ISO 27001:2022 compliance process. Here are our tips for any SaaS company going for ISO 27001 certification.
Cronos Group chooses Aikido Security to strengthen security posture for its companies and customers
The Cronos Group chooses Aikido Security to strengthen its security posture. As a reseller, The Cronos Group will offer Aikido to its clients.
How Loctax uses Aikido Security to get rid of irrelevant security alerts & false positives
Loctax optimizes its security posture with Aikido Security to decrease false positives & irrelevant security alerts, harmonize workflows, and reduce costs.
Aikido Security raises €5m to offer a seamless security solution to growing SaaS businesses
Aikido Security, the developer-first software security app for SaaS companies, announces it has raised €5m in a Seed round co-led by Notion Capital.
Aikido Security achieves ISO 27001:2022 compliance
Aikido Security achieves ISO 27001:2022 compliance
How StoryChief’s CTO uses Aikido Security to sleep better at night
StoryChief optimizes its security posture with Aikido Security. Startup security that is affordable, reduces false positives and gives CTOs peace of mind.
What is a CVE?
What is a CVE? Common vulnerabilities and exposures database inform devs and security teams about past threats. CVSS scores report the severity of a CVE.
Best Tools for End-of-Life Detection: 2025 Rankings
Discover the best EOL detection tools for 2025 to manage outdated software, reduce security risks, and ensure compliance. Stay secure with the right solution
Top 3 web application security vulnerabilities in 2024
Learn about the most common and critical web application security vulnerabilities in 2024. Covers SAST, DAST, and CSPM vulnerabilities. And how to fix them.
Get secure for free
Secure your code, cloud, and runtime in one central system.
Find and fix vulnerabilities fast automatically.
.avif)
