Apache Tika XXE Vulnerability (CVE-2025-66516) – Critical PDF Parsing Exploit
A severe flaw has been discovered in Apache Tika, the widely adopted framework for document parsing and content extraction. Tracked as CVE-2025-66516 with a CVSS score of 10.0, the issue enables XML External Entity (XXE) attacks through specially crafted PDF files. This new advisory replaces CVE-2025-54988. Although the earlier notice pointed to the PDF parser […]
Introducing The Upwind Tracer for AWS Lambda Functions: Deep Runtime Security for Serverless Workloads
Today, we’re excited to announce the private preview release of The Upwind Tracer for AWS Lambda Functions, bringing serverless-native runtime security and observability to your Lambda workloads. As teams continue to adopt and evaluate AWS Lambda for event-driven application architectures, it remains important to verify that its benefits – such as automatic scaling, minimal infrastructure […]
The First-Ever API Security Support for AWS Fargate with Deep Layer 7 Visibility for Serverless Compute
We’re excited to announce a major expansion of the Upwind Platform: API Security is now fully available for AWS Fargate workloads. With this update, customers gain the same deep API discovery, behavioral insight, and layer 7 visibility for Fargate that Upwind already delivers across Kubernetes, VMs, and other cloud compute environments. As organizations shift toward […]
Critical Security Alert: Unauthenticated RCE in React CVE-2025-55182 & Next.js CVE-2025-66478
Two new critical vulnerabilities, CVE-2025-55182 (React) and CVE-2025-66478 (Next.js), were publicly disclosed today, impacting React and Next.js applications. These issues allow unauthenticated remote code execution under default framework configurations, requiring no special setup or developer mistakes. Testing confirms that even newly generated Next.js applications created with create-next-app and built for production are immediately vulnerable without […]
Expanding CSPM with Runtime Advantage: Deep Data Scanning & Multi-Cloud Parity
We are excited to announce a major expansion of the Upwind Runtime Attack Surface Management. This release extends support for GCP and Azure resources, bringing true multi-cloud parity while deepening AWS support with expanded support for AWS Lambda, SNS, Elasticache, and Redis. Beyond coverage, we are introducing Deep Data Scanning – a new ASM playbook […]
Introducing the Upwind Asset Map: Complete Visibility into Cloud Architecture, Exposure, and Risks
Cloud risks arise across multiple layers and dimensions: (1) infrastructure such as compute, networks, storage, and identities; (2) applications and their API or service-to-service communications; and (3) the dependencies that link them together, including vulnerabilities, secrets, and sensitive data flows. Upwind’s Graph Inventory overlays cloud assets, configurations, SBOMs, runtime sensor & cloud activity logs signals, […]
Upwind x NVIDIA: Securing the Next Generation of AI Infrastructure at Runtime
Artificial intelligence is rapidly transforming the enterprise landscape, powering everything from autonomous agents to large-scale LLM applications. However, as organizations adopt AI infrastructure at scale, they face an urgent challenge: ensuring the integrity, safety, and trustworthiness of their AI operations in the face of increasingly sophisticated cyber threats. Moreover, a new set of threats comes […]
Introducing Upwind’s Unified AI Protection, Built for Modern Cloud Environments
Today, we’re expanding the Upwind CNAPP with Upwind AI, a set of tightly integrated capabilities that take AI security far beyond configuration checks or endpoint monitoring. As AI becomes embedded in every layer of cloud infrastructure, security teams need a way to understand not just where AI is running, but how it behaves, what it […]
2025 CNAPP Market Guide: Key Takeaways – And Why Upwind Is Positioned to Win
The newly released ISMG 2025 CNAPP Market Guide doesn’t just map the rapid evolution of cloud-native security – it highlights the vendors defining its future. Among the 19 platforms evaluated, Upwind stands out as one of the clearest examples of where the market is heading: runtime-powered, AI-driven, and built for the speed and complexity of […]
Shai Hulud 2.0: The NPM Supply Chain Attack Returns as an Aggressive Self-Propagating Worm
The newly uncovered “Shai Hulud 2.0”, also known as sha1-hulud, campaign is one of the most aggressive npm supply-chain attacks to date. Unlike the earlier, more contained incident, this wave introduces a fully automated worm that rapidly spreads across maintainers, repositories, and dependency graphs. More than 25,000 repositories tied to hundreds of developers have already […]