Subscribe To Our Blog UpdatesThank you! Your submission has been received!Oops! Something went wrong while submitting the form.By submitting the form you are agreeing to our privacy policy.BlogSweet Enables High-Signal Cloud Security by Aligning Policies to Your EnvironmentCustom policies in Sweet align security rules to real cloud environments, cutting noise and surfacing only meaningful risksSweet team|3min readThought LeadershipStatic CNAPP Assumes Risk. Runtime CNAPP Proves It.Static scans show potential risk. Runtime context reveals what’s actually exploitable, so teams focus on what truly matters.Sweet team|7min readThought LeadershipThe Next Phase of Cybersecurity Has BegunAI is shifting the balance in cybersecurity, but only if it’s built into how security operates. Here’s what the next phase looks like.Dror Kashti|6min readAI SecurityWhen Prompts Go RogueA single malicious prompt can compromise an AI agent. Learn how jailbreak and prompt injection attacks work and how to stop them.Omer Kazo Cohen|3min readBreachInside the Axios Incident: Unpacking an npm Supply Chain BreachA recent compromise of the widely-used axios HTTP client library: npm supply chains can be leveraged to drop cross-platform RATsTomer Filiba|min readInside the Trivy Incident: Unpacking a CI/CD Supply Chain Breach?A deep dive into the Trivy supply chain attack and how CI/CD pipelines were exploited to steal credentials. Learn key indicators, risks, andSweet team|5min readConsolidated Remediation: How Sweet Security Turns Vulnerabilities Into Clear Engineering DecisionsTurn CVEs into clear engineering decisions. Learn how Sweet Security’s consolidated remediation prioritizes real risk and recommends the besNoam Raveh|2min readAI SecurityFinding the Sweet Spot: Where Cloud and AI Security ConvergeCloud security is one thing. AI security is another thing. Different tools. Different teams. Different risks. Right? But let’s look closer.Dror Kashti|3min readAI SecurityHow to Secure AI Agents When Prompts Become CodeAI security must shift from user governance to runtime control. Learn 3 signals to find shadow agents and secure the workload-LLM boundary.Sweet team|6min readBreachAlmost Everybody is Affected: Kubernetes Privilege Escalation Can Lead to RCEA standard Kubernetes permission has been identified as a direct path to a cluster-wide RCE.Tomer Filiba|3min read Security ResearchShai-Hulud 3.0: When a Supply-Chain Worm Evolves - and Makes MistakesWhat changed in Shai-Hulud 3.0, what went wrong for the attacker, and how Sweet Security can detect and stop this threat in real time. Omer Nissim|2min readSweet News2026 Prediction From the CEO's Desk: Security Didn’t Slow AI Down. Now What?Making predictions is very easy. Making good predictions is hard. The only way to get close is to start with a clear view of the present. Dror Kashti|min readCritical Alert: Unauthenticated RCE in React & Next.js Demands Immediate ActionOverview of the React & Next.js RCE (CVE-2025-55182 & CVE-2025-66478)|min read Security ResearchShai-Hulud 2.0: A Deeply Automated npm Supply-Chain WormThe npm ecosystem is once again at the center of a major supply-chain security incident.Omer Nissim|2min readSweet NewsRaising $75M to Build the Future of Runtime and AI SecurityDror Kashti|2min readFeature ReleaseSweet Security Extends Runtime CNAPP Coverage to Windows EnvironmentsSweet Security extended its runtime coverage to Windows environments. Tomer Filiba|4min readFeature ReleaseSweetX: Your New AI Agent for Cloud Security Meet SweetX: an AI agent built directly into the heart of your cloud.Hilit Yurman|3min readCloud SecurityFrom Code to Cloud: Vulnerability Management Across the Cloud Application LifecycleAt Sweet, we built a 360° vulnerability management framework to reduce backlog and alert fatigue. Noam Raveh|3min readCloud SecuritySweet Receives Cloud Security Leader and CADR Badge in the Cloud Security Report 2025 by Latio Tech Sweet Security was recognized as a Cloud Security Leader Leader and a Cloud Application Detection & Response (CADR) Leader. Sarah Elkaim|2min readFeature ReleaseIntroducing Data Security at Sweet: Protecting Data in MotionIntroducing Data Security at Sweet — a centralized place for all sensitive data detections across your organization. Hilit Yurman|4min readSweet PeopleThe ROI of AI: Why Security Must Be Rebuilt from the Inside OutIn cloud security, the future will belong to platforms that are AI-native from the inside out.Dror Kashti|2min readFeature ReleaseHardening the CI/CD Pipeline: Catching Vulnerabilities Before They Hit ProductionSweet extends its security coverage further left in the development process, directly into CI builds, so risks are caught before production.Noam Raveh|3min readBreachShai-Hulud: The Self-Replicating npm Worm Stealing Secrets and Hijacking PipelinesA massive supply-chain attack is affecting npm packages. Tomer Filiba|3min readFeature ReleaseKickstarting Vulnerability Investigations with Code Owner Context for GitLab + GitHubSecOps can now instantly see which developer last updated an image where a vulnerability was found.Noam Raveh|2min read Security ResearchLargest npm Supply-Chain Attack to Date Targets Billions of DownloadsThe npm ecosystem has suffered an unprecedented supply-chain attack.Tomer Filiba|2min readSweet NewsBridging Runtime Visibility and Secrets Management in Kubernetes with Sweet Security and CyberArkBridging Runtime Visibility and Secrets Management in Kubernetes with Sweet Security and CyberArkSarah Elkaim|3min read Security ResearchECScape: Understanding IAM Privilege Boundaries in Amazon ECS Part 2 of our educational series on Amazon ECS securityNaor Haziz|min read Security ResearchUnder the Hood of Amazon ECS on EC2: Agents, IAM Roles, and Task IsolationWhen running containers on Amazon ECS using EC2 instances, there’s a lot happening under the hood on each host.Naor Haziz|min readFeature ReleaseEvery Breach Starts with an Attempt. Are You Watching?As CISOs, we tend to measure security effectiveness by one thing: whether or not a breach occurred. Hilit Yurman|3min read Security ResearchUnderstanding Elastic Index Mappings and Field LimitsMappings help Elasticsearch store and search data efficiently. Lior Pollak|4min read Security ResearchPython Tar-File Vulnerability (CVE-2024-12718): What You Need to KnowA critical vulnerability in Python's tarfile module (versions ≥ 3.12) allows attackers to modify metadata or permissions on files. Tomer Filiba|2min readCloud SecurityA CISO's Guide to Reporting on Cloud SecurityLet’s be honest; reporting isn't the most glamorous part of the job as CISOs.Sarah Elkaim|2min readCloud SecurityBreaking the Cloud Security Illusion: Putting the App Back in CNAPPWe all know that CNAPP stands for Cloud Native Application Protection Platform. Yet, the application part is what is most neglected. Lea Edelstein|4min read Security ResearchCVSS 10.0: Unauthenticated RCE - One Malformed SSH Handshake is All it Takes On April 16, 2025, CVE-2025-32433 was disclosed—a critical remote code execution (RCE) vulnerability. Lea Edelstein|2min readFeature ReleaseThe Sweet Spot of CVE Prioritization: Solving the Biggest Challenge in AppSec with Sweet’s LLMAt Sweet Security, we believe that vulnerability management needs to shift. That’s why we’re introducing a new approach powered by runtime. Sarah Elkaim|4min read Security ResearchNextJS Authorization Bypass (CVE-2025-29927) Highlights the Need for Stronger Runtime SecurityTwo researchers have recently discovered an authorization-bypass bug in the popular NextJS framework by Vercel. Tracked as CVE-2025-29927Tomer Filiba|2min read Security ResearchIngressNightmare: How Runtime Changes the Game for Ingress-NGINX Kubernetes-Critical VulnerabilitiesA new set of high-severity vulnerabilities, collectively dubbed IngressNightmare, has been discovered by Wiz. Sweet keeps you secure.Tomer Filiba|1min read Security ResearchCVE-2025-30066: tj-actions Supply Chain AttackOn Friday, a supply chain attack compromised the widely used GitHub Action tj-actions/changed-files, exposing secrets from numerous repos. Tomer Filiba|2min readFeature ReleaseDetection Meets API Security: The Missing Layer for Your Cloud App Protection Sweet provides a comprehensive and structured view of all API activity, helping security and engineering teams quickly identify risks. Hilit Yurman|4min readFeature ReleasePrioritize CVEs with Jit and Sweet Security’s Runtime Reachability Analysis Sweet Security and Jit are partnering to bring application security teams the best way to prioritize CVEs. Sarah Elkaim|2min readFeature ReleaseThe Power of a Story: Turning Cloud Incidents into Actionable NarrativesSweet Security’s LLM-powered storytelling capability is setting a new standard by reducing investigation times by up to 90%. Sarah Elkaim|3min readSweet NewsAutomate the Entire Response Lifecycle with the Sweet Security & Torq IntegrationHarness the Power of Sweet and Torq: Real Time Detection and Response Meets Seamless Automation Sarah Elkaim|4min readFeature ReleaseHit <1% False Positive Rate with Sweet’s Patent-Pending LLM Cloud Detection EngineSweet Security Introduces LLM-Powered Cloud Detection Engine to Reduce False Positives & Detect Unknown Unknowns Or Harel|3min readFeature ReleaseStrengthening Open Source Security with Sweet’s Package Reputation ChecksSweet Security’s new Package Reputation feature enables zero-day detection for open-source software. Sarah Elkaim|3min readFeature ReleaseStart Your Day with Confidence: Introducing Cloud Issues Hub at Sweet Sweet Security’s new Issues Hub takes the guesswork out of prioritization, helping cloud security teams focus on the most critical problems.Sarah Elkaim|4min readCloud SecurityUnified Detections with Sweet: Detecting Cross-Account Role Assumptions In this blog, we’ll explore an attack recently seen in a customer’s environment involving cross-account role assumptions.Lea Edelstein|5min readFeature ReleaseFrom Cloud Migration to Cloud Security with Sweet’s Runtime-Powered CSPMSweet Security’s runtime-powered CSPM is an excellent starting point for those looking to kickstart their cloud security journey.Sarah Elkaim|4min readFeature ReleaseModern Problems, Unified Solutions: Sweet Releases the First Unified Detection & Response Platform Cloud security is no longer an afterthought; it’s a frontline defense. Dror Kashti|2min readCloud SecurityUnlocking a New Layer of Serverless Security with Sweet’s Sensor for AWS LambdaSweet is excited to expand its support into serverless environments, launching a new sensor for AWS Lambda, adding critical runtime...Lea Edelstein|4min readSweet NewsSweet Security is Now Available on the AWS MarketplaceSweet Security is proud to announce its comprehensive Cloud Native Detection and Response platform is now available on the AWS...Sarah Elkaim|2min readFeature ReleaseDefending Against SSRF Attacks in Cloud Native ApplicationsA Server-Side Request Forgery (SSRF) attack occurs when an attacker tricks a server into making requests to other internal or external...Sarah Elkaim|5min readCloud SecurityUnderstanding the New Vulnerabilities on Linux’s CUPS: What You Should KnowYesterday, a new set of vulnerabilities (CVE-2024-47076, CVE-2024-47175/6/7) was discovered on Linux’s Common UNIX Printing System...Tomer Filiba|3min readFeature ReleaseSpotlight on Sweet Security’s Advanced Identity Threat Detection and ResponseManaging secrets and identities is crucial to maintaining a secure environment as attackers are leveraging credentials to exploit cloud...Lea Edelstein|6min readSweet ProductSweet Security’s Vulnerabilities Hub: End-to-End Vulnerability Lifecycle ManagementIn recent months, Sweet has expanded its features within the realm of Cloud Vulnerability Management to include the following...Or Harel|4min readSweet ProductSweet Security Introduces AI Response PlaybooksSweet is thrilled to announce a new feature: AI Response Playbooks. This groundbreaking capability is now available on the Sweet Security...Or Harel|3min read Security ResearchWelcome to CandyStore: Sweet Security’s Open Source Key-Value StorageWe’re excited to announce that Sweet Security has officially released CandyStore – an extremely fast open source key-value storeTomer Filiba|2min readFeature ReleaseManage CIS Compliance Across Your Workloads and ClustersSweet Security has added a CIS Compliance feature to its Cloud Native Detection and Response Platform. Lea Edelstein|min readFeature ReleaseIntroducing Connection Analysis: Unveiling Hidden Network InsightsAs cloud environments grow in complexity, having a clear view of the intricate relationships between cloud assets across your infrastructureLea Edelstein|min readCloud SecurityThe Need for Runtime Protection in Cloud SecurityThe benefits of rich cloud environments are widely known, but their complexity has blurred the lines between infrastructure and application Sarah Elkaim|5min readFeature ReleaseEnhance SBOMs with Runtime Security Context We are excited to introduce the latest addition to Sweet's security platform: the Runtime SBOM (Software Bill of Materials). Sarah Elkaim|min readRuntime SecurityPractical Ways to Thwart Non-Human Identity AttacksManaging non-human identities (NHIs) has become a paramount challenge for security teams. These identities, ranging from automated scripts..Sarah Elkaim|4min read Security ResearchDefending Against the Latest Ghostscript Vulnerability (CVE-2024-29510)Bleeping Computer has recently reported on a new vulnerability within Ghostscipt, a widely used library for handling PostScript and PDF fileTomer Filiba|min readFeature ReleaseCustomized Rules for Enhanced Threat Detection and ResponseSweet is excited to announce our new custom rules detection capability for CDR and ADR, which allows users to build customized rules...Or Harel|5min read Security ResearchResponding to the CVE-2024-6387 (RegreSSHion) VulnerabilityQualys research has discovered a critical Remote Code Execution (RCE) vulnerability, CVE-2024-6387, that has resurfaced in OpenSSH.Sarah Elkaim|2min readFeature ReleaseIntroducing Sweet Security for Hybrid Environments Sweet Security is thrilled to announce comprehensive support for on-premises environments. Lea Edelstein|4min read Security ResearchFrom a Snowflake to a Snowball: How to Detect and Stop Impersonation AttacksAs reported, Snowflake, the data cloud company, is currently under fire for an account hacks campaign...Sarah Elkaim|5min readRuntime SecurityWhat is Runtime SecurityRuntime security refers to the measures and practices employed to protect an application and workload while it is executing or running.Sweet team|10min read Security ResearchOf XZ and Unknown UnknownsThe recent XZ (liblzma) supply-chain attack is a marvel of social engineering and a great example of evading detection under the many-eyes..Tomer Filiba|2min readSweet NewsHow Transitioning from Military CISO to Startup CEO Made me a Better LeaderI spent more than 25 years in the Israel’s Defense Forces (IDF), moving up the ranks of Unit 8200 to lead a Cyber Department...Dror Kashti|2min readCloud SecurityThe Cloud Security Alphabet SoupOne complaint I often hear from stakeholders across the cloud security ecosystem is that there are way too many overlapping acronyms...Dror Kashti|2min readCloud SecurityCloud Security Predictions – 2024Just like New Year’s resolutions, predictions are a rite of passage, an opportunity for us to take stock of our hopes and concerns for...Eyal Fisher|2min readCloud SecuritySecure Cloud Migration – Lift, Adapt, and Shift… Right!A common misconception about moving to the cloud is that it’s a “lift and shift” type effort, when really, it’s more like lift, ADAPT, and..Dror Kashti|2min read