
.avif)
Welcome to our blog.

Secure Code in Your IDE, Now Free.
Aikido’s IDE extensions are now free for VSCode, Cursor, and Windsurf — with real-time SAST and secrets scanning for JavaScript, TypeScript, and Python. Ship secure code without leaving your editor (or paying for it).

A deeper look into the threat actor behind the react-native-aria attack
We investigate the activity of the threat actor that compromised react-native-aria packages on npm, and how they are evolving their attacks.
.png)
Malicious crypto-theft package targets Web3 developers in North Korean operation
Aikido Security uncovers a North Korean-linked supply chain attack using the fake npm package web3-wrapper-ethers to steal private keys from Web3 developers. Linked to Void Dokkaebi, the threat actor mirrors past DPRK crypto theft operations. Learn how the attack worked and what to do if you're affected.
Customer Stories
See how teams like yours are using Aikido to simplify security and ship with confidence.
Compliance
Stay ahead of audits with clear, dev-friendly guidance on SOC 2, ISO standards, GDPR, NIS, and more.
Guides & Best Practices
Actionable tips, security workflows, and how-to guides to help you ship safer code faster.
DevSec Tools & Comparisons
Deep dives and side-by-sides of the top tools in the AppSec and DevSecOps landscape.
Harden Your Containers with Aikido x Root
Fix container vulnerabilities without risky upgrades. Learn how Aikido x Root.io hardened images let you stay on your current base image while keeping your containers secure and stable.
Securing Legacy Dependencies with Aikido and TuxCare
The Aikido and TuxCare partnership brings automated patching and hardened support, letting teams secure open-source dependencies without rewrites or upgrades.
The 'no nonsense' list of security acronyms
We list the security acronyms, what they mean and whether AppSec developers should care.
Best Tools to Scan Open Source Dependencies in 2025
Scan open source components with the best dependency scanners available in 2025.
Top Automated Pentesting Tools Every DevSecOps Team Should Know
Find the best automated penetration testing tools for securing modern applications in 2025.
Top Devsecops Tools in 2025
Dive into the best DevSecOps tools in 2025. Choose from integrated platforms that shift security left and keep your deployments safe without slowing down dev velocity.
Top Container Scanning Tools in 2025
Discover the best Container Scanning tools in 2025. Compare features, pros, cons, and integrations to choose the right solution for your DevSecOps pipeline.
Veracode vs Checkmarx vs Fortify
Compare Veracode Vs Checkmarx Vs Fortify across key features like ease of use, integration, scanning speed, and coverage. Find out which tool fits your security needs best.
Reducing Cybersecurity Debt with AI Autotriage
We dive into how AI can assist us in a meaningful way to triage vulnerabilities and get rid of our security debt.
Reducing Cybersecurity Debt with AI Autotriage
We dive into how AI can assist us in a meaningful way to triage vulnerabilities and get rid of our security debt.
XRP supply chain attack: Official NPM package infected with crypto stealing backdoor
The official XPRL (Ripple) NPM package was compromised by sophisticated attackers who put in a backdoor to steal cryptocurrency private keys and gain access to cryptocurrency wallets.
Top Container Scanning Tools in 2025
Discover the best Container Scanning tools in 2025. Compare features, pros, cons, and integrations to choose the right solution for your DevSecOps pipeline.
SAST vs DAST: What you need to know.
Get an overview of SAST vs DAST, what they are, how to use them together, and why they matter for your application security.
Get secure for free
Secure your code, cloud, and runtime in one central system.
Find and fix vulnerabilities fast automatically.
.avif)
