Sponsored by Intruder
Categories
What 5 Million Apps Revealed About Secrets in JavaScript
Leaked API keys are nothing new, but the scale of…
What an AI-Written Honeypot Taught Us About Trusting Machines
“Vibe coding” — using AI models to help write code…
The State of Exposure Management in 2025: Insights From 3,000+ Organizations
In 2025, AI is making it easier for attackers to…
Can We Trust AI To Write Vulnerability Checks? Here’s What We Found
Vulnerability management is always a race. Attackers move quickly, scans…
Shadow IT Is Expanding Your Attack Surface. Here’s Proof
Shadow IT - the systems your security team doesn’t know…