
Xiid Blog
5 Ways Hackers Target CI/CD Pipelines (and How to Stop Them)
CI/CD pipelines are the backbone of modern software delivery, but they've become prime targets for attackers seeking to compromise entire software supply chains.
Strengthening Cybersecurity in Financial Institutions with Xiid's Zero Knowledge Networking
In an era where digital transactions dominate the financial landscape, cybersecurity has become a paramount concern for financial institutions.
Securing GitLab from XSS and Account Takeover Attacks
Gitlab’s XSS vulnerability allows attackers to inject malicious scripts into legitimate web pages, potentially stealing sensitive user or corporate data.
Are critical ZTNA mistakes compromising your network?
Zero Trust Network Access (ZTNA) is often hailed as a “magic bullet” for network security. Unfortunately, ZTNA deployments commonly suffer from some major, yet easy-to-overlook vulnerabilities.
The internet is not secure by design. What can we do?
The internet is, at its core, a collection of software jammed together over time, vulnerable to the same ever-changing security challenges that plague other applications. The internet was not created to be “secure by design”.
Solving the OpenSSH Zero Day Vulnerability’s Root Cause
The recent discovery of critical vulnerabilities in OpenSSH (CVE-2024–6387and CVE-2024–6409) has sent shockwaves through the cybersecurity community.
What on earth is going on in device security?
Just in the last few weeks, there have been an avalanche of disclosed, show-stopper (or even deadly!) vulnerabilities.