What Breaks After You Think You’re Done: Lessons from the Follow-On React RSC CVEs
Jack Zarris
December 18, 2025
Read article
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Filter 1
Smarter, Clearer Rules: Now with Condition Groups, Reordering, Multi-line Descriptions & Numeric Operators
We’ve made it easier to build and manage rules with new features designed for clarity and control. You can now group conditions for more powerful logic, reorder them with ease, add multi-line descriptions for better documentation, and use numeric operators in CTX-based rules to support advanced comparisons.
Nick Soegono
June 25, 2025
Read article
Understanding EchoLeak: What This Vulnerability Teaches Us About Application Security
The recent disclosure of EchoLeak by Aim Labs marks a significant milestone in AI security research. As the first documented zero-click exploit targeting a production AI system, it offers valuable insights into the emerging threat landscape that security professionals need to understand and prepare for.
Brian Joe
June 19, 2025
Read article
Why We're Going All In on Application Protection
Brian Joe
June 9, 2025
Read article
Announcing our Series A
Today, we're announcing our $12 million Series A led by Madrona. This funding represents more than capital—it validates our solution to what I call the 'last mile problem' in application security.
Jonathan DiVincenzo
June 5, 2025
Read article
Introducing the runtime rule library
Instead of spending time writing and testing custom logic, detection and response teams can now tap into a curated set of rules tailored for modern cloud applications. These aren't your standard WAF rules — they're full-featured, deeply customizable, and built to align with your business logic. Even better, the rule library has rules of different types - including rule recipes (rule builder based) or rule scripts (code based)!
Brian Joe
May 27, 2025
Read article
Custom Client Identifiers: Smarter Client Tracking for Security Teams
Relying on IP addresses alone isn't enough to reliably track or distinguish clients—especially in modern, complex environments. That’s why we’ve introduced Custom Client Identifiers, giving your team the flexibility to define what a “client” really means based on your specific use case.Whether it’s IP + User-Agent, IP + API Key, or Token + Product Identifier, you can now tailor client identification to suit your architecture and security goals.
Brian Joe
May 20, 2025
Read article
Introducing Rule Builder: Powerful Protection Without Coding
Brian Joe
May 13, 2025
Read article
New Integration: Impart + Claude
Brian Joe
May 6, 2025
Read article
🚀 Agentic Runtime Protection Rules Makes Us the First Truly Self-Writing Security System
Jonathan DiVincenzo
April 29, 2025
Read article
Design, implement, and deploy application protection policies with Cursor Agent
Brian Joe
April 4, 2025
Read article
Introducing Agentic Risk Scoring
We're inviting forward-thinking security teams to experience an agentic approach to risk assessment. If you're ready to transform how you manage security risks, we want you in our beta program.
Brian Joe
March 25, 2025
Read article
Launching Enterprise-Grade Protection for Linkerd Applications
Today, we are excited to announce Enterprise-Grade Protection for Linkerd, the first security solution that seamlessly integrates with Linkerd to deliver next-gen WAF, API security, and LLM protection—all with a single integration.