RSS for Slack
Azure Cloud
Product

Investigate Azure Threats Faster With Full Log Visibility

If you’re running workloads in Azure, chances are your security team has a solid handle on what’s configured. Resource settings, network rules, identity policies it’s all there in your posture management dashboard. But here’s the question that keeps security leaders up at night: do you know what’s actually happening? Configuration snapshots are great at telling […]

Blue hexagons on a white background with a prominent blue hexagon in the center featuring a white arrow. The word upwind is in the top left corner.
Product

Google Cloud Run Gets Direct Tracer Reporting for Scalable Runtime Security

Last year, we launched full security support for Google Cloud Run bringing posture management, real-time threat detection, vulnerability management, inventory discovery, and topology mapping to serverless container workloads. Teams using Cloud Run got the same Upwind coverage they already relied on for VMs and containers. Now we’re making that experience even simpler. With direct tracer […]

A New Way to Measure Cloud Security Posture
Product

Drive Remediation, Show Progress: A New Way to Measure Cloud Security Posture

You’ve invested in security tools and surfaced thousands of findings. Yet, when the board asks if the organization’s cloud risk is improving, the answer is a number without a story. When you need engineering to prioritize fixing issues, your request competes with every other item in an already-strained backlog. Finding issues isn’t the problem. The […]

AWS-Lambda-Runtime
Product

Beyond the Perimeter: Runtime Visibility for AWS Lambda

The industry has a snapshot problem. Static analysis and SCA tools tell you what might happen based on a manifest, but once a function is triggered, the execution environment becomes a black box. For most security teams, Lambda security is a “hope for the best” strategy. The “Old Way” relies on coarse-grained IAM policies and […]

Agentic Security is Here
Thought Leadership

Agentic Security Is Here — But Who Is Accountable When the AI Acts Alone?

TL;DR: Agentic security is the use of autonomous AI systems that detect, triage, and respond to threats without human intervention, which introduces a new category of operational risk. The most valuable security skill in 2026 is not prompt engineering or AI fluency. It’s consequence engineering: the ability to anticipate what happens when an autonomous system […]

From Notes to Snakes: NPM Supply Chain Attack
Research

From Nodes to Snakes: npm Supply Chain Attack Delivers Python Payload via axios

Executive Summary Our researchers and MDR team identified an npm supply chain attack involving malicious axios packages that leads to the execution of a Python-based payload on infected machines. The malware fingerprints the host, collects basic system and user environment data, and then communicates with attacker-controlled infrastructure to receive follow-on instructions. Rather than acting noisily, […]

exploitable-functions
Product

The Revolution in Cloud Security Prioritization

In the modern cloud landscape, security teams are drowning in a deluge of vulnerabilities. Thousands of Common Vulnerabilities and Exposures (CVEs) lurk within base images, open-source libraries, and operating systems. While today’s security infrastructure is doing better at detection—scanning images, generating Software Bills of Materials (SBOMs), and identifying exposures at scale—the real battle has shifted. […]

Add the Upwind RSS Feed to Slack

Connect the Upwind RSS Feed to your Slack.
Follow the how-to here.