Blog

Menu Button
Categories
All
Search ButtonClose Search Button
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Product

The Need For Runtime ADR: If Your App Is a Black Box, Your Security Strategy Is Too

Read more
Security

Next-Gen Phishing for Developers: The Rise of Supply Chain Attacks and Third-Party Exploits in Cloud Security

Phishing has evolved. Learn how attackers now exploit trusted developer tools, third-party integrations, and CI/CD pipelines to infiltrate cloud environments through sophisticated supply chain attacks.
Read more
Security

If It Doesn’t Execute, Ignore It

Discover how Kubernetes libraries transition through five distinct security stages—from repository definition to runtime execution—and learn how precise runtime analysis eliminates up to 99% of vulnerability noise.
Read more
Security

Why it's So Hard to Triage Application Vulnerabilities?

Cloud infrastructure CVE triaging has evolved, but AppSec teams still struggle with noisy, irrelevant alerts. Learn how Raven fixes that!
Read more
Security

Application Security vs. Product Security

Discover the crucial distinctions between application security and product security.
Read more
Security

Runtime Reachability vs. Static Reachability

Discover the critical differences between static reachability and Raven’s runtime reachability.
Read more
Security

Analyzing Python rpc.py RCE Exploit Using PANDA (Step-by-Step)

Learn to exploit and analyze a Python rpc.py RCE vulnerability using PANDA.
Read more

Alice in Java-land: An Adventure with Loaders, the Classpath, and Whimsical Wisdom

Java’s class loading is a Wonderland of its own! Explore dynamic loading, classpath mysteries, and custom ClassLoaders with a whimsical twist
Read more

Understanding the Relationship Between Vulnerabilities and Exploits?

Discover the relationship between vulnerabilities and exploits, how attackers leverage weaknesses, and why not all vulnerabilities are exploitable.
Read more
Security

eBPF Unleashed: The Future of Runtime Application Security

Discover how eBPF revolutionizes runtime application security.
Read more
Security

7 Reasons Why Attackers Shifted Towards Cloud Applications

Attackers are increasingly shifting their focus from infrastructure to applications, exploiting vulnerabilities that traditional security measures cannot protect.
Read more
Security

The Critical Need for Cloud Runtime Application Security

While shift left strategies are essential for building secure applications, they are not sufficient on their own. Cloud runtime application security, or protect right, is crucial especially as attackers are increasingly shifting their focus to applications.
Read more
Security

What are CVE-Less Threats?

What CVE-less threats are, why they are becoming more prevalent, and how organizations can protect themselves against these insidious risks.
Read more
Linex