News

Aikido Security
aikido. dev > blog > glassworm-zig-dropper-infects-every-ide-on-your-machine

Glass Worm goes native: New Zig dropper infects every IDE on your machine

22+ hour, 30+ min ago  (313+ words) Your Complete Security HQ Advanced App Sec suite, built for devs. in-app runtime defense and threat detection. Real-time malware & vuln threats Once loaded, the binary's first job is to find every IDE installed on the machine that supports the VS…...

Aikido Security
aikido. dev > blog > anthropic-mythos-cybersecurity-risks-overblown

Anthropic Mythos Cybersecurity Risks: What 1, 000 AI Pentests Actually Show

2+ day, 22+ hour ago  (489+ words) Your Complete Security HQ Advanced App Sec suite, built for devs. in-app runtime defense and threat detection. Real-time malware & vuln threats What followed was predictable: headlines about" "AI's looming cyber nightmare, cybersecurity vendors warning about the democratization of cyber attacks,…...

Aikido Security
aikido. dev > blog > lovable-aikido-pentesting

Lovable Partners with Aikido to Bring Pentesting to Vibe-Coded Apps

2+ week, 1+ day ago  (1096+ words) Your Complete Security HQ Advanced App Sec suite, built for devs. in-app runtime defense and threat detection. Real-time malware & vuln threats You already know this feeling. You built something with Lovable. It works. People are loving it. And somewhere in…...

Aikido Security
aikido. dev > blog > glassworm-chrome-extension-rat

Glass Worm RAT Delivered via Malicious Chrome Extension (Keylogger, Cookie Theft)

3+ week, 16+ hour ago  (755+ words) Your Complete Security HQ Advanced App Sec suite, built for devs. in-app runtime defense and threat detection. Real-time malware & vuln threats Glass Worm gains its initial foothold through malicious packages published across npm, Py PI, Git Hub, and the Open…...

Aikido Security
aikido. dev > blog > betterleaks-gitleaks-successor

Betterleaks: The Gitleaks Successor Built for Faster Secrets Scanning

3+ week, 6+ day ago  (530+ words) Your Complete Security HQ Advanced App Sec suite, built for devs. in-app runtime defense and threat detection. Real-time malware & vuln threats TL; DR: Betterleaks is a new open source secrets scanner from the author of Gitleaks, sponsored by Aikido. It's…...

Aikido Security
aikido. dev > blog > hacker-superpower-ai

How Security Teams Fight Back Against AI-Powered Hackers

3+ week, 6+ day ago  (522+ words) Your Complete Security HQ Advanced App Sec suite, built for devs. in-app runtime defense and threat detection. Real-time malware & vuln threats Last month, the Mexican government was hacked. 150 GB of government data was stolen, including 195 million taxpayer records. This attack…...

Aikido Security
aikido. dev > blog > ai-pentesting-compliance

How does AI Pentesting Work with Compliance?

4+ week, 2+ day ago  (1261+ words) Your Complete Security HQ Advanced App Sec suite, built for devs. in-app runtime defense and threat detection. Real-time malware & vuln threats AI pentesting has been making waves and rivals the power of human hackers in ways we weren't expecting. But…...

Aikido Security
aikido. dev > blog > trump-cybersecurity-strategy-2026

Trump's 2026 Cybersecurity Strategy: From Compliance to Consequence

1+ mon, 2+ hour ago  (508+ words) Your Complete Security HQ Advanced App Sec suite, built for devs. in-app runtime defense and threat detection. Real-time malware & vuln threats The Trump administration's March 2026 cyber actions include an Executive Order targeting cyber-enabled crime and a National Cyber Strategy built…...

Aikido Security
aikido. dev > blog > continuous-pentesting-requirements

Continuous pentesting: how it works and what it requires

1+ mon, 3+ day ago  (1044+ words) Your Complete Security HQ Advanced App Sec suite, built for devs. in-app runtime defense and threat detection. Real-time malware & vuln threats Software changes continuously, security validation doesn't. This is creating such a gap that in regulated industries such as banking,…...

Aikido Security
aikido. dev > blog > storybooks-websockets-attack

How Storybook's Web Socket Server Became a Supply Chain Attack Vector: CVE-2026-27148

1+ mon, 6+ day ago  (603+ words) Your Complete Security HQ Advanced App Sec suite, built for devs. in-app runtime defense and threat detection. Real-time malware & vuln threats The problem: the Web Socket server has no access control whatsoever. There is no authentication, no session validation, and…...