Solutions
Platform
Checkmarx One Platform
SAST
SCA
AI Security
API Security
ASPM
Codebashing
Container Security
DAST
IaC Security
Malicious Package Protection
SBOM
SSCS
Solutions
Code to Cloud
Developer Experience
DevSecOps
Supply Chain
Services
Support
Services
Maturity Assessment
Pricing
Plans & Packages
Partners
Partners
Our Partner Programs
Find a Partner
Programs
Channel Partners
GSI
Tech Partners
Existing Partners
Partner Portal
Academy
Partner Hub
Company
Checkmarx
About Us
Customers
Leadership
Awards & Recognition
News
Events
People
Careers at Checkmarx
Research
Checkmarx Zero
Get In Touch
Contact Us
Support Portal
Resources
Engage
Documentation
Packaging
Discover
Blog
Knowledge Hub
Case Studies
Events
News
Press Releases
E-books
White Papers
More resources
Checklist
Infographics & Interactives
Research & Reports
Solution Briefs
Videos
Webinars
Glossary
All Resources
Contact Us
Get a demo
Get a Demo
Technical Blog
March 30, 2023
CVE-2022-37734: graphql-java Denial-of-Service
Read More
March 17, 2023
From Zero to AppSec Anti-Hero: How AI Brings More Security Issues Than It Fixes
Read More
March 2, 2023
CocoaPods Subdomain Hijacked: This is How
Read More
February 21, 2023
How NPM Packages Were Used to Spread Phishing Links
Read More
February 14, 2023
Securing Open-Source Solutions: A Study of osTicket Vulnerabilities
Read More
February 1, 2023
Open Source vs Commercial AppSec Tools: Considerations for Enterprise
Read More
January 3, 2023
Exploiting GraphQL Query Depth
Read More
December 28, 2022
Alias and Directive Overloading in GraphQL
Read More
December 21, 2022
Didn’t Notice Your Rate Limiting: GraphQL Batching Attack
Read More
December 14, 2022
How 140k NuGet, NPM, and PyPi Packages Were Used to Spread Phishing Links
Read More
December 7, 2022
Move Over Verbose Error Messages, GraphQL APIs are Here
Read More
November 28, 2022
Attacker Uses a Popular TikTok Challenge to Lure Users Into Installing Malicious Package
Read More
November 28, 2022
What’s Old Becomes New Again: CSRF Attacks on GraphQL APIs
Read More
November 1, 2022
Analysis of OpenSSL CVE-2022-3786 and CVE-2022-3602
Read More
October 26, 2022
Attacking the Software Supply Chain with a Simple Rename
Read More
October 20, 2022
CVE-2022-42889: Text4shell Vulnerability Breakdown
Read More
October 7, 2022
LofyGang – Software Supply Chain Attackers; Organized, Persistent, and Operating for Over a Year
Read More
September 28, 2022
How We Created an API Security CTF
Read More
August 31, 2022
First Known Phishing Attack Against PyPi Users
Read More
August 26, 2022
Automatic Execution of Code Upon Package Download on Python Package Manager
Read More
August 22, 2022
Most Dangerous CWEs of 2021
Read More
August 18, 2022
Amazon Quickly Fixed a Vulnerability in Ring Android App That Could Expose Users’ Camera Recordings
Read More
August 17, 2022
Malicious PyPi User Strikes Again with Typosquatting, StarJacking and Unpacks Tailor-made Malware written in C#
Read More
August 14, 2022
Typosquatting Campaign Targeting Python’s Top Packages, Dropping GitHub Hosted Malware with DGA Capabilities
Read More
August 3, 2022
Large Scale Campaign Created Fake GitHub Projects Clones with Fake Commit Added Malware
Read More
July 15, 2022
Unverified Commits: Are You Unknowingly Trusting Attackers’ Code?
Read More
July 6, 2022
“CuteBoi” Detected Preparing a Large-Scale Crypto Mining Campaign on NPM Users
Read More
June 29, 2022
Amazon Confirmed and Fixed a High Severity Vulnerability of Broken Authentication in Amazon Photos Android App
Read More
June 27, 2022
Spring Function Cloud DoS (CVE-2022-22979) and Unintended Function Invocation
Read More
June 14, 2022
CVE-2021-33420: NPM Replicator Remote Code Execution Deserialization
Read More
June 8, 2022
New Technique Used by Attackers in NPM to Avoid Detection
Read More
May 27, 2022
GitHub RepoJacking Weakness Exploited in the Wild by Attackers
Read More
May 25, 2022
Attacker Caught Hijacking Packages Using Multiple Techniques to Steal AWS Credentials
Read More
April 26, 2022
Attacker Adds Evasive Technique to Their Ongoing Attacks on NPM
Read More
April 19, 2022
StarJacking – Making Your New Open Source Package Popular in a Snap
Read More
March 31, 2022
All You Need to Know about Spring Framework Vulnerabilities
Read More
March 31, 2022
New Protestware Found Lurking in Highly Popular NPM Package
Read More
March 31, 2022
SpringShell – Remote Code Execution via Spring Web
Read More
March 28, 2022
A Beautiful Factory for Malicious Packages
Read More
March 17, 2022
Protestware, Politics, and Open Source Software
Read More
March 7, 2022
Webhook Party – Malicious packages caught exfiltrating data via legit webhook services
Read More
February 24, 2022
Zenly Fixes User Data Exposure and Account Takeover Risks
Read More
February 8, 2022
Our Response to NPM Account Takeover Attacks – ChainAlert, a Community-Backed Open Source Tool
Read More
December 29, 2021
APACHE LOG4J RCE – Variants and Updates
Read More
December 28, 2021
CVE-2021-44832 – Apache Log4j 2.17.0 Arbitrary Code Execution via JDBCAppender DataSource Element
Read More
December 12, 2021
Apache Log4j Remote Code Execution – CVE-2021-44228
Read More
December 9, 2021
Recently Discovered Supply-chain Worm
Read More
November 16, 2021
A New Type of Supply Chain Attack Could Put Popular Admin Tools at Risk
Read More
November 4, 2021
Attackers Write Bugs as Well!
Read More
October 25, 2021
UAParser.js – Attack & Preparations
Read More
September 23, 2021
CVE-2021-37794: XSS to One-Click RCE in FileBrowser
Read More
August 19, 2021
CTparental Vulnerabilities Enabled Filter Bypassing
Read More
July 29, 2021
Chained RaspAP Vulnerabilities Grant Root Level Access
Read More
July 8, 2021
API Crash Course: Broken Object Level Authorization Found in Coursera
Read More
July 6, 2021
Rewriting Your History Using a Historical Vulnerability
Read More
June 16, 2021
CVE-2021-31800: How We Used Impacket to Hack Itself
Read More
June 14, 2021
CVE-2021-33829: Stored XSS Vulnerability Discovered in CKEditor4 Affects Widely-Used CMS
Read More
June 4, 2021
The 0xDABB of Doom: CVE-2021-25641
Read More
February 11, 2021
Assistance Required: XSS Vulnerability Discovered in Helpdesk Software Solution Deskpro
Read More
February 3, 2021
Exploitable Path – How to Solve a Static Analysis Nightmare
Read More
January 20, 2021
Software Composition Analysis: Why Exploitable Path Is Imperative
Read More
December 2, 2020
Drupal Core: Behind the Vulnerability
Read More
November 19, 2020
Drupal Core: Behind the Vulnerability
Read More
November 17, 2020
Apache Unomi CVE-2020-13942: RCE Vulnerabilities Discovered
Read More
August 24, 2020
Integrating Checkmarx Security Results within GitLab
Read More
August 19, 2020
Race Conditions Can Exist in Go
Read More
August 18, 2020
You Better Get Going with Go
Read More
July 8, 2020
Mutation Cross-Site Scripting (mXSS) Vulnerabilities Discovered in Mozilla-Bleach
Read More
June 18, 2020
It’s Time to Update Your Drupal Now!
Read More
May 13, 2020
Solidity Top 10 Common Issues
Read More
February 26, 2020
Checkmarx Research: Smart Vacuum Security Flaws May Leave Users Exposed
Read More
February 19, 2020
Checkmarx Research: Apache Dubbo 2.7.3 – Unauthenticated RCE via Deserialization of Untrusted Data (CVE-2019-17564)
Read More
February 5, 2020
Checkmarx Research: A Race Condition in Kubernetes
Read More
January 15, 2020
Checkmarx Research: Solidity and Smart Contracts from a Security Standpoint
Read More
January 6, 2020
Breaking Down the OWASP API Security Top 10 (Part 2)
Read More
November 6, 2019
Breaking Down the OWASP API Security Top 10 (Part 1)
Read More
October 24, 2019
NFC False Tag Vulnerability – CVE-2019-9295
Read More
August 7, 2019
LeapFrog LeapPad Ultimate Security Vulnerabilities
Read More
February 12, 2019
Your Lenovo Watch X Is Watching You & Sharing What It Learns
Read More
February 4, 2019
Your Smart Scale is Leaking More than Your Weight: Privacy Issues in IoT
Read More
December 20, 2018
Android WebView: Are Secure Coding Practices Being Followed?
Read More
May 7, 2018
Diving Deep into Regular Expression Denial of Service (ReDoS) in Go
Read More