Blog
Wiz Recognized as a 2025 Customers’ Choice in the Gartner® Peer Insights™ Voice of the Customer for CNAPP
Wiz is proud to be the only vendor recognized as a Customers’ Choice for two consecutive years.
Expanding the Zero Critical Club to set a new standard for AppSec and SecOps teams
We are introducing Zero Code Criticals and Zero Time to Respond clubs to give every team a clear north star for secure development and rapid response
Snipping the Long Tail of Shai-Hulud 2.0
Wiz Research reveals the data behind Shai-Hulud's 2.0 long tail, the massive gap in cloud credential rotation, a potential link to the Trust Wallet incident, and how we finally "snipped the tail" on a month of ongoing infections.
Protecting Against Zero-Day Vulnerabilities with SOC-Level ASM Alert
Outpacing React2Shell using pre-breach alerts from Wiz ASM to eliminate exploitable risk before attackers find them
MongoBleed (CVE-2025-14847) exploited in the wild: everything you need to know
Detect and mitigate CVE-2025-14847, an unauthenticated information leak vulnerability in MongoDB. Exploitation has been observed in the wild. Organizations should patch urgently.
The Kenna Transition: Your Strategic Shift to Exposure Management
How the Kenna sunset is giving security leaders the opportunity to outgrow vulnerability silos and adopt a unified exposure management model.
From MCP to Vibe Coding: Full Endpoint Visibility in Wiz AI Security
How Wiz AI-SPM delivers a complete view of exposed AI application endpoints — from Vibe Coding to MCP — and why that visibility matters.
Bringing Oracle Cloud Identity to Wiz
Unified visibility into OCI identities, permissions, and policies — mapped into Wiz’s Security Graph.
Zero‑Days in the Age of AI: Behind the Scenes of ZeroDay.cloud 2025, with a Record High of CVEs in Critical Cloud Infra
ZDC awarded hackers $320,000 and uncovered a record‑breaking tally of critical CVEs for core cloud infrastructure, underscoring the scale and urgency of securing the open‑source software that underpins the modern cloud.
Gogs 0-Day Exploited in the Wild
Wiz Threat Research has observed exploitation in-the-wild of CVE-2025-8110
Code to Cloud Attacks: From Github PAT to Cloud Control Plane
How attackers are leveraging compromised employee GitHub Personal Access Tokens to compromise cloud environments.
Top AWS re:Invent Announcements for Security Teams in 2025
The re:Invent announcements that are most impactful to security teams.
React2Shell: Technical Deep-Dive & In-the-Wild Exploitation of CVE-2025-55182
We break down the exploit mechanics and detail active in-the-wild attacks observed by our team, from credential harvesting to sophisticated cloud backdoors.
React2Shell (CVE-2025-55182): Everything You Need to Know About the Critical React Vulnerability
Detect and mitigate React2Shell (CVE-2025-55182), critical RCE vulnerability in React and Next.js exploited in the wild. Organizations should patch urgently.
Wiz Product Announcements at re:Invent 2025: Expanding Visibility from Code to Cloud
Check out new product releases that help security and engineers work together to keep cloud environments secure
Introducing Wiz SAST: Where Code Risk Meets Cloud Context
Modern code runs in complex and distributed cloud environments. Wiz SAST meets this complexity by correlating code flaws with real cloud context–including where workloads run, what they can access, and how exposed they are.
Wiz Becomes Fastest Security ISV to Reach $1 Billion in AWS Marketplace Lifetime Sales
A milestone fueled by customer trust and a partnership built for scale.
It's Here! Wiz Exposure Management is Now GA
Moving beyond CVE counts to true exposure management everywhere with new UVM and ASM capabilities, now GA
Shai-Hulud 2.0 Aftermath: Trends, Victimology and Impact
A deeper look at the Shai-Hulud 2.0 supply chain attack: reviewing the infection spread, victimology, leaked secrets distribution, and community response so far.
Service Catalog is Here: Expand Risk Visibility for Your Service and Its Dependencies, Simplify Issue Ownership
Give security and developers a shared view of cloud risk, aligned to the way applications are built and maintained.
WizOS: Powering Secured Image Adoption with AI
WizOS is now GA to help every organization reduce CVEs and build on a trusted foundation.
3 OAuth TTPs Seen This Month — and How to Detect Them with Entra ID Logs
How OAuth tokens, JWT fields and Entra sign-in logs reveal attacker behavior, and how to turn those signals into reliable detections.
Mastering Software Governance with Hosted Technologies Inventory
Gain visibility into every technology in your environment and eliminate governance gaps.
Shai-Hulud 2.0 Supply Chain Attack: 25K+ Repos Exposing Secrets
Detect and mitigate malicious npm packages linked to the recent Shai-Hulud-style campaign. Over 25,000 affected repositories across ~350 unique users.