News
Lovable Partners with Aikido to Bring Pentesting to Vibe-Coded Apps
3+ hour, 51+ min ago (1096+ words) Your Complete Security HQ Advanced AppSec suite, built for devs. in-app runtime defense and threat detection. Real-time malware & vuln threats You already know this feeling. You built something with Lovable. It works. People are loving it. And somewhere in the…...
GlassWorm RAT Delivered via Malicious Chrome Extension (Keylogger, Cookie Theft)
5+ day, 21+ hour ago (755+ words) Your Complete Security HQ Advanced AppSec suite, built for devs. in-app runtime defense and threat detection. Real-time malware & vuln threats GlassWorm gains its initial foothold through malicious packages published across npm, PyPI, GitHub, and the OpenVSX marketplace. The threat actor…...
Betterleaks: The Gitleaks Successor Built for Faster Secrets Scanning
1+ week, 5+ day ago (530+ words) Your Complete Security HQ Advanced AppSec suite, built for devs. in-app runtime defense and threat detection. Real-time malware & vuln threats TL;DR: Betterleaks is a new open source secrets scanner from the author of Gitleaks, sponsored by Aikido. It's a…...
How Security Teams Fight Back Against AI-Powered Hackers
1+ week, 5+ day ago (522+ words) Your Complete Security HQ Advanced AppSec suite, built for devs. in-app runtime defense and threat detection. Real-time malware & vuln threats Last month, the Mexican government was hacked. 150GB of government data was stolen, including 195 million taxpayer records. This attack exploited a…...
How does AI Pentesting Work with Compliance?
2+ week, 19+ hour ago (1261+ words) Your Complete Security HQ Advanced AppSec suite, built for devs. in-app runtime defense and threat detection. Real-time malware & vuln threats AI pentesting has been making waves and rivals the power of human hackers in ways we weren't expecting. But frequently,…...
Continuous pentesting: how it works and what it requires
2+ week, 4+ day ago (1044+ words) Your Complete Security HQ Advanced AppSec suite, built for devs. in-app runtime defense and threat detection. Real-time malware & vuln threats Software changes continuously, security validation doesn't. This is creating such a gap that in regulated industries such as banking, release…...
How Storybook's WebSocket Server Became a Supply Chain Attack Vector: CVE-2026-27148
3+ week, 9+ hour ago (603+ words) Your Complete Security HQ Advanced AppSec suite, built for devs. in-app runtime defense and threat detection. Real-time malware & vuln threats The problem: the WebSocket server has no access control whatsoever. There is no authentication, no session validation, and no Origin…...
Rare Not Random: Using Token Efficiency for Secrets Scanning
2+ week, 6+ day ago (1037+ words) Your Complete Security HQ Advanced AppSec suite, built for devs. in-app runtime defense and threat detection. Real-time malware & vuln threats Entropy does a decent job at filtering false positives but leaves a lot to be desired, especially when evaluating generic…...
Why Determinism Is Still a Necessity in Security
3+ week, 14+ hour ago (802+ words) Your Complete Security HQ Advanced AppSec suite, built for devs. in-app runtime defense and threat detection. Real-time malware & vuln threats Deterministic security tools, at this point, have become such a regular part of security that, for a long time, we…...
Aikido Infinite: Continuous AI Pentesting for Every Release
3+ week, 5+ day ago (1021+ words) Your Complete Security HQ Advanced AppSec suite, built for devs. in-app runtime defense and threat detection. Real-time malware & vuln threats You already know this problem, because you live it. If you're a growing company, you pentest once a year" maybe…...