Impart Resources
Impart Product Update - Nov 2025
We’ve delivered a major round of upgrades across the Impart platform, introducing new AI Bot/MCP and LLM Protection dashboards, a refreshed and more intuitive App Experience, a high-performance Inspector v0.42.0 release, expanded Inspector Metrics for deeper operational visibility, and new SQLi and XSS version control, allowing teams to choose between Detection Version 1, Version 2, or always use the latest release. These updates make it easier than ever to understand AI-driven traffic, configure protections with clarity, manage detection behavior with precision, monitor system performance, and optimize your entire Impart deployment.
Filters

Impart Product Update - Oct 2025
This month, we’ve released major upgrades that give security teams tighter control over exception handling, better visibility into API data exposure, and smoother day-to-day navigation across Impart. These enhancements help teams reduce risk faster—without slowing down delivery.

Impart Product Update - Sep 2025
We’ve been busy building new ways to make the Inspector more powerful, flexible, and easy to use. In this update, you’ll find improvements to the Inspector itself, plus two brand-new apps that put more security controls at your fingertips. From streamlined updates in Inspector v0.40.0, to easier access to release notes in our docs site, to new apps for blocking attacks and protecting sensitive data—you now have more tools than ever to strengthen your security posture.

We've crossed the security singularity
We've crossed a threshold that fundamentally changes cybersecurity forever. Not with fanfare or headlines, but quietly, in the background of our AI-powered world. The expertise barrier that once separated script kiddies from sophisticated threat actors has simply... vanished.

I Used AI to Hack Like a Pro in 23 Minutes (And So Can Anyone Else)
A security research demonstration showing how the same AI-assisted methodology that compromised OWASP Juice Shop in 23 minutes can be directly applied to recreate sophisticated breaches like the Salesforce-Drift OAuth incident.




.avif)

.avif)



.png)





.avif)
