Unpacking the Security Risks of Model Context Protocol (MCP) Servers

Blue and red gradient lines curve upward against a light blue background, intersected by orange circles. The word upwind with an underlined u appears in the upper left corner.

Modern AI systems, especially large language models (LLMs), are no longer isolated engines responding to static inputs. They’re evolving into intelligent agents, copilots, and autonomous systems that interact with their environment, reason over external data, and adapt in real time. But there’s a fundamental problem: LLMs are powerful, but they don’t know anything outside of […]

CVE-2025-32433: Critical Erlang/OTP SSH Vulnerability (CVSS 10)

A white warning icon with an exclamation mark is centered on a bright pink, patterned background. Below it, text reads: CVE-2025-32433: Critical Erlang/OTP SSH Vulnerability (CVSS 10).

On April 16, 2025, a critical remote code execution (RCE) vulnerability in Erlang’s SSH library was publicly disclosed. Tracked as CVE-2025-32433, this vulnerability received the maximum possible CVSS score of 10.0, signaling how severe and exploitable it is, especially in environments relying on Erlang/OTP for SSH access. Overview What is CVE-2025-32433? Discovered by researchers at […]

Achieve Deeper Runtime Threat Investigation with Upwind Detection Logs 

A graphic with the Upwind logo in the top left corner shows rows of rounded rectangles in shades of blue and purple. A bright pink bar with a warning symbol appears in the center.

Imagine a threat appears, vanishes, and then reappears two days later – same process, slightly different path. Without the right visibility, you’d treat it like a new incident each time. But with Upwind Detection Logs, you get the historical context to see the full picture. Upwind provides deep runtime visibility and security across all environments, […]

Seamlessly Protect Google Cloud Infrastructure with Upwind’s Agentless Cloud Scanners

A pattern of hexagons in pastel colors with a cloud symbol inside a central blue hexagon. The word Upwind appears in black text in the top left corner.

Securing a modern Google Cloud environment demands both breadth and depth: broad visibility across services, and deep insight into workload behavior. However, gaining this level of coverage without introducing operational overhead is often a challenge—especially in environments where deploying runtime agents is difficult or impractical. While there are other ways to get started quickly with […]

Automatically Secure Google Cloud Run Serverless Functions with Upwind

Blue hexagons on a white background with a prominent blue hexagon in the center featuring a white arrow. The word upwind is in the top left corner.

We are excited to announce that Upwind now supports Google Cloud Run. This addition reflects our commitment to delivering comprehensive, modern cloud security – no matter where or how your applications run. With this update, all core capabilities within the Upwind Platform are now available for workloads deployed on Google Cloud Run.  What is Google […]

Automatically Visualize Kubernetes Ingress Traffic in the Upwind Topology Map

Illustration of a stylized Earth with blue continents and green oceans, surrounded by overlapping blue ovals radiating outward. The word upwind is in the top-left corner on a light gray background.

We are excited to announce a new capability in the Upwind platform, providing organizations with deep visibility into Kubernetes’ ingress traffic to identify exposures and risks. Traditional security systems often fall short in providing comprehensive visibility into how Kubernetes ingress services distribute incoming internet traffic within a cluster, leaving potential blind spots that malicious actors […]

CADR Webinar with James Berthoty and Joshua Burgin

Redefining Cloud Security with Cloud Application Detection & Response (CADR) Traditional cloud security approaches struggle to keep up with today’s evolving threats. Cloud Application Detection & Response (CADR) is changing the game—leveraging real-time insights to enhance protection and response capabilities. Join Analyst James Berthoty and Upwind CPO Joshua Burgin for an exclusive discussion on how CADR is transforming cloud security and what it means for your organization. […]

From Maui to Medals: Why We’re Backing Israeli Olympian Tom Reuveny

Text on a gradient background reads: Why Upwind is Sponsoring Olympic Gold Medalist Tom Reuveny. The word Upwind is in the companys logo style at the top.

It’s not every day that a surf session in Maui turns into a sponsorship. But that’s exactly how we met Tom Reuveny—Israel’s first-ever Olympic gold medalist in iQFoil windsurfing and now, the newest member of the Upwind family. After his historic win at the 2024 Paris Olympics, Tom did what any world-class athlete might do: […]

Detect and Respond to API Threats With Upwind 

A diagram with a blue circle in the center containing two gear icons. Multiple blue arrows converge into the circle from the left, with pink arrows diverging to the right. The Upwind logo is in the top left corner.

We are thrilled to introduce the future of API security with real-time, advanced API threat detection. As API-driven architectures continue to evolve, organizations need proactive, intelligent defenses that move beyond traditional detection methods. Upwind’s latest innovation represents a shift toward real-time, runtime security – ensuring threats are identified and mitigated before they can impact critical […]

Proactive Protect GenAI Workloads with Upwind GenAI Security

Image showing six logos in circular frames on a wavy blue and white background. Logos include a whale, a geometric shape, a cat silhouette, a circuit design, a star-like shape, and a four-pointed structure. Upwind text is in the top left corner.

We are thrilled to announce a major breakthrough in AI security with the release of Upwind GenAI Security.​ AI is transforming industries at an unprecedented pace, but without the right security measures, it becomes an ungoverned risk. Organizations need purpose-built protections that evolve with the complexity of AI workloads. This is a first-of-its-kind solution that […]