RSS for Slack
New Frameworks - Compliance
Product

Expanding Compliance Coverage with New Industry Frameworks and Upwind’s Cloud Hygiene Framework

Cloud security teams are being asked to do more than ever. They need to prove compliance against growing regulatory demands, reduce configuration risk, and keep cloud environments lean, secure, and aligned with how they were actually designed to operate. That is why we are excited to introduce several new frameworks now available in Upwind’s Configurations […]

Upwind-Audit-Logs
Product

Upwind Audit Logs: Complete Traceability for Every Action in the Platform

When something changes in your cloud security platform, the first question is almost always the same: What happened and who did it? Upwind Audit Logs gives security and platform teams a centralized, searchable record of user-driven actions across the Upwind platform, including activity performed through the UI or Public API. The result is clearer accountability, […]

Azure Container Service Tracer
Product

Upwind Runtime Protection Now Supports Azure

Cloud teams are moving fast on Azure PaaS to reduce operational overhead—serverless containers with Azure Container Apps and managed web apps with Azure App Services. But that speed often comes with a tradeoff: security visibility and detection can lag behind because you don’t have the same host access or deployment patterns you’d expect in Kubernetes […]

custom dashboards
Product

Upwind Custom Dashboards

Personalize your view—without compromising RBAC, ownership, or auditability. We’re excited to share that Custom Dashboards are now available to all customers. This is an important step in Upwind’s Enterprise readiness, giving teams the ability to tailor how they consume insights based on role, responsibility, and priority—turning existing widgets into personalized, actionable dashboards. Overview Upwind’s Custom […]

hackerbot-claw Operation Review: Pull Requests as an Attack Vector in GitHub Actions
Research

hackerbot-claw Operation Review: Pull Requests as an Attack Vector in GitHub Actions

Executive Summary In February 2026, an autonomous bot named hackerbot-claw exploited insecure GitHub Actions configurations across multiple high-profile repositories. The campaign abused unsafe pull_request_target triggers, unsanitized inputs, dynamic shell execution, and overprivileged GITHUB_TOKEN permissions to achieve remote code execution (RCE) in GitHub-hosted runners. Across at least six repositories, the bot successfully executed arbitrary commands, and […]

upwindxAWS-Security-Hub-1600x960
Company News

The Next Wave Is Here: Upwind is now seamlessly accessible within the AWS security operating model

Upwind is now live inside AWS Security Hub Console. I’m incredibly excited to announce one of the biggest milestones in our company’s journey.  This tells us we’re on the right path to being the best cloud security company in the world. There isn’t any better validation.  Starting today, Upwind is one of roughly ten companies […]

image layers hero
Product

Image Layers are now in the Upwind Console

Upwind’s Image Layers capability gives you deep visibility into how container images are built—so you can assign vulnerability ownership correctly, find root cause faster, and remediate issues more effectively across teams. Most tools only show the final image state. Upwind breaks images down layer by layer, so you can see exactly where a vulnerability was […]

k8s admission controller
Product

Stop Misconfigurations Before They Ship with Upwind Kubernetes Admission Controller

Kubernetes environments move fast. Deployments happen constantly—through CI/CD pipelines, GitOps workflows, and direct kubectl commands. And when a misconfiguration slips in (a privileged pod, a missing required label, a deprecated API version), it can become a security incident in minutes. Until now, most teams have relied on post-deployment scanning to catch these issues. The problem: […]

Six CVEs in One Day: What’s Going On with n8n?
Research

Six CVEs in One Day: What’s Going On with n8n?

Executive Summary In a single day, six vulnerabilities were disclosed in n8n, spanning remote code execution, command injection, arbitrary file access, and cross-site scripting. All six issues affect authenticated functionality and repeatedly break isolation between workflows, configuration, and the underlying host. This is not random disclosure noise, it’s a clear signal of systemic security weaknesses […]

Add the Upwind RSS Feed to Slack

Connect the Upwind RSS Feed to your Slack.
Follow the how-to here.