CVE-2025-55182: A Deep Dive into the Critical React RCE Vulnerability
CVE-2025-55182 and its Next.js counterpart, CVE-2025-66478 are critical severity vulnerabilities allowing pre-authentication Remote Code Execution (RCE) in applications using React Server Components (RSC). This post will break down the vulnerability from a technical perspective, and explain how the exploit works. Executive Summary Background: Understanding the Component That Failed React Flight (a.k.a React Server Components transport […]
Critical Security Alert: Unauthenticated RCE in React CVE-2025-55182 & Next.js CVE-2025-66478
Two new critical vulnerabilities, CVE-2025-55182 (React) and CVE-2025-66478 (Next.js), were publicly disclosed today, impacting React and Next.js applications. These issues allow unauthenticated remote code execution under default framework configurations, requiring no special setup or developer mistakes. Testing confirms that even newly generated Next.js applications created with create-next-app and built for production are immediately vulnerable without […]
Expanding CSPM with Runtime Advantage: Deep Data Scanning & Multi-Cloud Parity
We are excited to announce a major expansion of the Upwind Runtime Attack Surface Management. This release extends support for GCP and Azure resources, bringing true multi-cloud parity while deepening AWS support with expanded support for AWS Lambda, SNS, Elasticache, and Redis. Beyond coverage, we are introducing Deep Data Scanning – a new ASM playbook […]
Introducing the Upwind Asset Map: Complete Visibility into Cloud Architecture, Exposure, and Risks
Cloud risks arise across multiple layers and dimensions: (1) infrastructure such as compute, networks, storage, and identities; (2) applications and their API or service-to-service communications; and (3) the dependencies that link them together, including vulnerabilities, secrets, and sensitive data flows. Upwind’s Graph Inventory overlays cloud assets, configurations, SBOMs, runtime sensor & cloud activity logs signals, […]
Upwind x NVIDIA: Securing the Next Generation of AI Infrastructure at Runtime
Artificial intelligence is rapidly transforming the enterprise landscape, powering everything from autonomous agents to large-scale LLM applications. However, as organizations adopt AI infrastructure at scale, they face an urgent challenge: ensuring the integrity, safety, and trustworthiness of their AI operations in the face of increasingly sophisticated cyber threats. Moreover, a new set of threats comes […]
Introducing Upwind’s Unified AI Protection, Built for Modern Cloud Environments
Today, we’re expanding the Upwind CNAPP with Upwind AI, a set of tightly integrated capabilities that take AI security far beyond configuration checks or endpoint monitoring. As AI becomes embedded in every layer of cloud infrastructure, security teams need a way to understand not just where AI is running, but how it behaves, what it […]
2025 CNAPP Market Guide: Key Takeaways – And Why Upwind Is Positioned to Win
The newly released ISMG 2025 CNAPP Market Guide doesn’t just map the rapid evolution of cloud-native security – it highlights the vendors defining its future. Among the 19 platforms evaluated, Upwind stands out as one of the clearest examples of where the market is heading: runtime-powered, AI-driven, and built for the speed and complexity of […]
Shai Hulud 2.0: The NPM Supply Chain Attack Returns as an Aggressive Self-Propagating Worm
The newly uncovered “Shai Hulud 2.0”, also known as sha1-hulud, campaign is one of the most aggressive npm supply-chain attacks to date. Unlike the earlier, more contained incident, this wave introduces a fully automated worm that rapidly spreads across maintainers, repositories, and dependency graphs. More than 25,000 repositories tied to hundreds of developers have already […]
Upwind Recognized as a Leader in the QKS Group 2025 SPARK Matrix™ for CNAPP
The QKS Group 2025 SPARK Matrix™: Cloud Native Application Protection Platform report captures a shift that many security engineering teams have been anticipating for years. Cloud environments have become too dynamic, too identity-driven, and too interconnected for configuration-centric CNAPP tools to keep pace. According to QKS Group, the vendors advancing most quickly are those that […]
The Hidden Costs of Agentless Cloud Scanning
A deep dive into architectures, trade-offs, and total cost of ownership Agentless cloud scanning has become a foundational capability for cloud-native security. By connecting directly to cloud provider APIs, organizations gain near-instant visibility into configurations, assets, and vulnerabilities without deploying agents or modifying workloads. The operational appeal is clear: agentless scanning reduces friction for DevOps, […]