
Redis, Lua, and the Dangers In-Between
On October 3rd, Redis published an advisory for a critical vulnerability in its Lua engine that could lead from a memory leak to remote code execution. It was initially, and surprisingly, assigned a CVSS 3.1 score of 10.0. While the score has since been debated and adjusted, the core issue remains: an attacker with privileges […]

Upwind Expands Threat Detection with Native Azure Log Analytics Integration
Upwind is excited to announce a new integration that brings deeper visibility and faster threat detection to Microsoft Azure environments. With native support for Azure Log Analytics and Activity Logs, customers can now detect risks and respond to threats across Azure with greater precision, especially around administrative activity, access patterns, and configuration changes. This release […]

The Salesloft-Drift Breach: A Wake-Up Call for API Security
Attack Path: From Source Code to API Abuse The recent Salesloft-Drift breach that compromised hundreds of organizations represents a new category of cyber threat that every security team needs to understand. This wasn’t a traditional hack; it was a sophisticated attack that exploited the very foundation of modern SaaS integrations: OAuth tokens and API trust […]

Upwind Modernizes PCI-DSS for Cloud-Native Security
We’re introducing the Upwind Framework for PCI-DSS to help organizations meet one of the most widely adopted security standards. This release is part of Upwind’s broader mission to make compliance continuous and directly tied to runtime environments. In this blog, we will explain what PCI-DSS is and why it matters, highlight the growing challenges of […]

Streamline Compliance & Auditing with Upwind’s Configurations Dashboard
If you’re responsible for cloud security and compliance, you know the drill. Misconfigurations pile up across environments, frameworks keep updating, and leadership wants to see progress – all while your team is already stretched thin. The stakes are high. A single overlooked configuration can lead to major gaps in compliance, or worse, leave sensitive data […]

Harbor Shift Left: Bringing Runtime Intelligence to Container Security
Picture this: your development team is racing to deploy a critical update, but security scanning brings everything to a halt. The scanner reports 47 vulnerabilities, but which ones actually matter? Which are exploitable in production? And most importantly, should you block the deployment or proceed? This is the daily reality for most DevOps teams. Traditional […]

Upwind Now Supports CloudTrail Log Aggregation for More Accurate Detections
A security team at a large financial services company once spotted a troubling pattern: a low-privilege IAM role listed IAM users, created an inline policy, and then assumed a higher-privilege role. Each action looked routine on its own and slipped past their detection system, which analyzed events in isolation. Only later, during a manual review, […]

The Cloud Security Maturity Journey
Cloud adoption has redefined how organizations innovate and scale. But with agility comes complexity, and with complexity, risk. Security leaders are tasked not only with defending modern architectures but also with proving that security enables innovation rather than slowing it down. The Cloud Security Journey frames cloud security maturity as a progression through three stages: […]

Introducing Upwind’s New Threat Dashboard: Simplifying Complexity to Drive Action
Today, we’re excited to announce the release of the enhanced Upwind Threat Dashboard, part of our ongoing commitment to continuously improving how we help security teams protect their environments. Threat landscapes are evolving rapidly, and so are we. This upgrade builds on what customers already rely on, introducing powerful new capabilities that make it easier […]

npm Supply Chain Attack: Shai Hulud Worm Escalates August Nx Compromise
On September 16, 2025, a large-scale npm supply chain attack was discovered, which seems to be linked to the same threat actors behind the August 27 Nx compromise (under ongoing investigation). Dubbed Shai Hulud, this self-propagating worm has infected nearly 40 npm packages, including several from CrowdStrike, by harvesting secrets from CI/CD pipelines and cloud […]