RSS for Slack
Apache Tika RCE
Research

Apache Tika XXE Vulnerability (CVE-2025-66516) – Critical PDF Parsing Exploit

A severe flaw has been discovered in Apache Tika, the widely adopted framework for document parsing and content extraction. Tracked as CVE-2025-66516 with a CVSS score of 10.0, the issue enables XML External Entity (XXE) attacks through specially crafted PDF files. This new advisory replaces CVE-2025-54988. Although the earlier notice pointed to the PDF parser […]

AWS-Lambda-Runtime-d
Product

Introducing The Upwind Tracer for AWS Lambda Functions: Deep Runtime Security for Serverless Workloads

Today, we’re excited to announce the private preview release of The Upwind Tracer for AWS Lambda Functions, bringing serverless-native runtime security and observability to your Lambda workloads. As teams continue to adopt and evaluate AWS Lambda for event-driven application architectures, it remains important to verify that its benefits – such as automatic scaling, minimal infrastructure […]

AWS-Fargate-runtime-b
Product

The First-Ever API Security Support for AWS Fargate with Deep Layer 7 Visibility for Serverless Compute

We’re excited to announce a major expansion of the Upwind Platform: API Security is now fully available for AWS Fargate workloads. With this update, customers gain the same deep API discovery, behavioral insight, and layer 7 visibility for Fargate that Upwind already delivers across Kubernetes, VMs, and other cloud compute environments. As organizations shift toward […]

Unauthenticated RCE in React-Next
Research

Critical Security Alert: Unauthenticated RCE in React CVE-2025-55182 & Next.js CVE-2025-66478

Two new critical vulnerabilities, CVE-2025-55182 (React) and CVE-2025-66478 (Next.js), were publicly disclosed today, impacting React and Next.js applications. These issues allow unauthenticated remote code execution under default framework configurations, requiring no special setup or developer mistakes. Testing confirms that even newly generated Next.js applications created with create-next-app and built for production are immediately vulnerable without […]

cloud-parity-b
Product

Expanding CSPM with Runtime Advantage: Deep Data Scanning & Multi-Cloud Parity

We are excited to announce a major expansion of the Upwind Runtime Attack Surface Management. This release extends support for GCP and Azure resources, bringing true multi-cloud parity while deepening AWS support with expanded support for AWS Lambda, SNS, Elasticache, and Redis. Beyond coverage, we are introducing Deep Data Scanning – a new ASM playbook […]

map improvements
Product

Introducing the Upwind Asset Map: Complete Visibility into Cloud Architecture, Exposure, and Risks

Cloud risks arise across multiple layers and dimensions: (1) infrastructure such as compute, networks, storage, and identities; (2) applications and their API or service-to-service communications; and (3) the dependencies that link them together, including vulnerabilities, secrets, and sensitive data flows.  Upwind’s Graph Inventory overlays cloud assets, configurations, SBOMs, runtime sensor & cloud activity logs signals, […]

photo_2025-12-02 05.52.41
Product

Upwind x NVIDIA: Securing the Next Generation of AI Infrastructure at Runtime

Artificial intelligence is rapidly transforming the enterprise landscape, powering everything from autonomous agents to large-scale LLM applications. However, as organizations adopt AI infrastructure at scale, they face an urgent challenge: ensuring the integrity, safety, and trustworthiness of their AI operations in the face of increasingly sophisticated cyber threats. Moreover, a new set of threats comes […]

ismg-top-right-1600x960__1_
Company News

2025 CNAPP Market Guide: Key Takeaways – And Why Upwind Is Positioned to Win

The newly released ISMG 2025 CNAPP Market Guide doesn’t just map the rapid evolution of cloud-native security – it highlights the vendors defining its future. Among the 19 platforms evaluated, Upwind stands out as one of the clearest examples of where the market is heading: runtime-powered, AI-driven, and built for the speed and complexity of […]

shai-hulud-2
Research

Shai Hulud 2.0: The NPM Supply Chain Attack Returns as an Aggressive Self-Propagating Worm

The newly uncovered “Shai Hulud 2.0”, also known as sha1-hulud, campaign is one of the most aggressive npm supply-chain attacks to date. Unlike the earlier, more contained incident, this wave introduces a fully automated worm that rapidly spreads across maintainers, repositories, and dependency graphs. More than 25,000 repositories tied to hundreds of developers have already […]

Add the Upwind RSS Feed to Slack

Connect the Upwind RSS Feed to your Slack.
Follow the how-to here.