Platform
Platform Overview →
Latest Innovations →
Modules
DSPM →
Access Trail →
AI Guardian →
Identity →
Data Loss Prevention →
Data Subject Requests →
Services
Data Risk Assessment →
DataWatcher →
AI Security Readiness Assessment →
Solutions
Platform Overview →
Industries
Financial Services →
Healthcare →
Manufacturing →
Retail & Travel →
Tech Services →
Use Cases
Use Case Overview →
Compliance Readiness →
M&A and Divestitures →
Securely Enable AI →
Assess Data Risk →
Reduce M365 Attack Surface →
On-Prem Support →
Data Visibility →
Data Minimization →
Data Sprawl →
Public Exposure →
Remediation →
Data Privacy →
Democratize Data Security →
Why Cyera
Resources
Resource Center →
Blog →
Webinars →
Glossary →
Events →
Research Labs →
Certified DSPM Architect →
Certified DSPM Fundamentals →
Certified Security for AI Fundamentals →
DataSecAI Portal →
AI Data Security Assessment →
DataWatcher Avatar →
Company
About us →
Office of CSO →
Careers →
Careers IL →
Trust Center →
Newsroom →
Contact us →
Partnerships & Integrations →
AWS →
Microsoft →
Google Cloud →
Snowflake →
Cohesity →
Pricing
Global
English (US)
French
German
Spanish
Portugese
Get a demo →
Get a demo →
Back to Research Labs
Research Blogs
DESTRUCTURED - Critical Vulnerability in Unstructured.io (CVE-2025–64712)
Research Blog
Detection Is Fast. Understanding Is Not. Why File-Access Incidents Stall - and How Impact Clarity Changes the Outcome
Research Blog
The OpenClaw Security Saga: How AI Adoption Outpaced Security Boundaries
Research Blog
Cellbreak: Grist’s Pyodide Sandbox Escape and the Data-at-Risk Blast Radius
Research Blog
N8Scape (Pyodide sandbox escape): 9.9 Critical Post-Auth RCE in n8n (CVE-2025-68668)
Research Blog
Ni8mare - Unauthenticated Remote Code Execution in n8n (CVE-2026-21858)
Research Blog
The End of Classification as We Know It: Data Awareness Over Data Labels
Research Blog
Escaping the Guest: How Custom LLM Workflows Uncovered Critical VMSVGA Vulnerabilities
Research Blog
Why DSPM Has Moved From Buzzword to Board‑Level Mandate - and How Our New Guide Can Help
Research Blog
Assessing the Top Data Security Risks in AWS Environments
Research Blog
The One Account That Breaks Everything: How Identity Outliers Create Explosive Risk
Research Blog
Access Is the New Exposure: Why Knowing Who Can Reach Your Data Matters More Than Where It Lives
Research Blog
Load more