Most recent posts
Shadow IT: Tiering the Unseen to Manage Vendor Risk
Invisible apps become riskier with time. Use real-time user signals to categorize every vendor in your ecosystem based on its true risk profile.
Read more
AI GitHub Agents: How One Issue Leaked Private Repos
Uncover how indirect prompt injection and tool poisoning allow attackers to exfiltrate private data via AI agents—all without stealing a single credential.
Read more
1 in 15 MCP Servers are Lookalikes: Is Your Org at Risk?
For every official MCP server, up to 15 lookalikes exist. Learn to identify these registry-layer threats and discover methods to protect your organization.
Read more
The Shadow Supply Chain: A Pivot To Usage-Based Discovery
Pivot from "purchase-based" to usage-based discovery. See how browser telemetry and identity logs work together to secure your true vendor footprint.
Read more
Sign up for our newsletter
UpGuard's monthly newsletter cuts through the noise and brings you what matters most: our breaking research, in-depth analysis of emerging threats, and actionable strategic insights.
Free instant security score
How secure is your organization?
Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
- Instant insights you can act on immediately
- Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities