Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The UK Government's Open Letter on AI Cyber Threats Underscores the Need for Measurable Security

A recent open letter from the UK government on AI-driven cyber threats highlights a clear shift in the threat landscape. Cyberattacks are no longer constrained in the same way by human expertise, as advanced AI models can now help identify vulnerabilities, generate exploit code, and increase the speed and scale of attacks.

6 Best Practices for Application Risk Assessments

For years, the annual penetration test or quarterly security scan served as the cornerstone of application risk assessments and application risk management. Teams would run the assessment, triage the findings, hand the report to developers, and wait for the next cycle. It felt like progress. It wasn’t.

How to Map AI Risk to Existing Compliance Frameworks

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Is your TPRM program an engine or an anchor?

In 2026, a slow assessment is a security risk. Every day spent in manual handoffs is a day of exposure for your organization. Join us at UpGuard Summit to see how our new Risk Automations engine transforms TPRM from a static checklist into an autonomous system. We will show you how to automate everything from vendor follow-ups to instant Jira routing for IT and Legal.

Critical Vulnerability Alert: CVE-2026-41940 in cPanel, WHM, and WP Squared

A critical vulnerability CVE-2026-41940 has been identified in cPanel, WHM, and WP Squared, affecting cPanel & WHM versions after 11.40, as well as WP Squared. These web hosting control panels are commonly used to manage websites, email, databases, and server configurations, making unauthorized access a serious security concern.

How to Protect Your Enterprise from High-Stakes Business Litigation

High-stakes litigation can drain a company's resources and focus. Protecting an enterprise requires a proactive approach to risk. Leaders must look ahead to spot potential legal traps before they cause damage. Safeguarding a brand is about building a wall against future threats. It allows for steady growth without constant fear of lawsuits. Small steps taken today prevent massive headaches tomorrow.

1 in 15 MCP Servers are Lookalikes: Is Your Org at Risk?

Researchers recently analyzed 18,000 Claude Code configuration files pulled from public GitHub repositories. What they found was straightforward and alarming: developers are already installing mistyped, misconfigured, and near-identical MCP server names — often without realizing it. The human-error condition that makes typosquatting work was already present at scale before any attacker needed to exploit it.

The Shadow Supply Chain: A Pivot To Usage-Based Discovery

We’ve established the new forensic reality: a massive 72.9% inventory gap exists between the vendors you monitor and those invisible to your security. We have seen the shortcomings of SSO and its inability to holistically monitor all the vendor applications your users engage with, along with a Shadow AI explosion that is compounding both issues. The era of procurement-only discovery is over. To secure the modern cyber workforce, we must pivot from "buying-based" to usage-based discovery.