
.avif)

Sooraj Shah
Blog posts by Sooraj Shah
Reliable CVE sources in the age of NIST NVD cutbacks
NIST will no longer enrich most CVEs. Here's what changes, what breaks, and what comes next.
The cybersecurity doomerism around Mythos doesn't match what we see on the ground
Anthropic's leaked Mythos model has triggered panic about AI-powered cyberattacks. We ran 1,000 AI penetration tests. The results suggest the threat is more nuanced than the headlines claim.
Security testing is validating software that no longer exists
Modern teams ship faster than pentesting can keep up. Explore the growing speed gap in security testing—and why traditional approaches are falling behind.
What continuous pentesting actually requires
Continuous pentesting promises real-time security validation, but most implementations fall short. Here’s what continuous pentesting actually requires—from change-aware testing to exploit validation and remediation loops.
How Aikido secures AI pentesting agents by design
Learn how Aikido secures AI pentesting agents with architectural isolation, runtime scope enforcement, and network-level controls to prevent production drift and data leakage.
Aikido recognized as Platform Leader in Latio Tech's 2026 Application Security Report
Aikido Security recognized as Platform Leader, AI Pentesting Innovator, and Supply Chain Innovator in Latio Tech’s 2026 AppSec Report.
Introducing Upgrade Impact Analysis: When breaking changes actually matter to your code
Aikido automatically detects breaking changes in dependency upgrades and analyzes your codebase to show real impact, so teams can merge security fixes safely.
Claude Opus 4.6 found 500 vulnerabilities. What does this change for software security?
Anthropic claims Claude Opus 4.6 uncovered 500+ high-severity vulnerabilities in open source. Here’s what that means for vulnerability discovery, exploitability validation, and production security workflows.
AI Pentesting: Minimum Safety Requirements for Security Testing
AI pentesting systems act autonomously against live environments. Learn when AI pentesting is safe to use, the minimum technical safeguards required, and how to evaluate AI security testing tools responsibly.
The CISO Vibe Coding Checklist for Security
A practical security checklist for CISOs managing AI and vibe-coded applications. Covers technical guardrails, AI controls, and organizational policies.
Get secure now
Secure your code, cloud, and runtime in one central system.
Find and fix vulnerabilities fast automatically.

