Backslash Logo
Product
SCA
Mastering AppSec Risk Prioritization with Reachability Analysis
SAST
Leading the Way in Static Application Security Testing
Backslash vs. SCA
and SAST
Compare traditional SAST & SCA tools with Backslash
Backslash vs. Orchestration solutions
Compare Orchestrations tools with the distinctive features of Backslash.

WHAT'S NEW

Threat Research: Hundreds of MCP Servers Vulnerable to Abuse

WHAT'S NEW

Addressing The Risks of Vibe Coding

Download Whitepaper ->
Use Cases
Backslash Reachability Analysis
Dive into Backslash Reachability Analysis capabilities
Replace your SCA/SAST
Stop wasting time and resources on non-issues
ROI Calculator
Calculate your savings, maximize your AppSec investment
M&A Due Diligence
Gain visibility into the intricacies o the acquired company's code
SBOM and VEX
Code Transparency With Backslash SBOM & VEX
FedRAMP & FISMA
Simplify Compliance with Backslash

WHAT'S NEW

Threat Research: Hundreds of MCP Servers Vulnerable to Abuse

WHAT'S NEW

Addressing The Risks of Vibe Coding

Download Whitepaper ->
Customers
Resources
Blog
Read about the latest product updates and AppSec news
News
Backslash Press
Customer Story
Capital RX
eBook
The AppSec & R&D Playbook

WHAT'S NEW

Threat Research: Hundreds of MCP Servers Vulnerable to Abuse

WHAT'S NEW

Addressing The Risks of Vibe Coding

Download Whitepaper ->
Company
About Us
Empower AppSec by taking control of application risks
Careers
Come and work with us
Partners
Partner with Backslash

WHAT'S NEW

Threat Research: Hundreds of MCP Servers Vulnerable to Abuse

Request a demoStart Now
Meet us at Black Hat!Monday.com chooses BackslashRead More

AppSec Feed.

Post Main Image
Blog

Threat Research: Hundreds of MCP Servers Vulnerable to Abuse

Mustafa Naamnih and Jonathan Ginzburg | Backslash Research Team

-

June 25, 2025

June 25, 2025

News

Backslash Security Exposes Critical Flaws in Hundreds of Public MCP Servers

June 25, 2025

June 26, 2025

-

min read

News

Backslash Security Exposes Critical Flaws in Hundreds of Public MCP Servers

June 25, 2025

June 26, 2025

-

min read

News

Backslash Security Exposes Critical Flaws in Hundreds of Public MCP Servers

June 26, 2025

June 25, 2025

-

min read

News

Backslash Security Exposes Critical Flaws in Hundreds of Public MCP Servers

June 26, 2025

June 25, 2025

-

min read

News

Backslash Security Recognized in the 2024 Gartner® Hype Cycle™ for Application Security and Gartner Hype Cycle for Open-Source Software

October 1, 2024

October 7, 2024

-

min read

News

Backslash Security Recognized in the 2024 Gartner® Hype Cycle™ for Application Security and Gartner Hype Cycle for Open-Source Software

October 1, 2024

October 7, 2024

-

min read

News

Backslash Security Recognized in the 2024 Gartner® Hype Cycle™ for Application Security and Gartner Hype Cycle for Open-Source Software

October 7, 2024

October 1, 2024

-

min read

News

Backslash Security Recognized in the 2024 Gartner® Hype Cycle™ for Application Security and Gartner Hype Cycle for Open-Source Software

October 7, 2024

October 1, 2024

-

min read

News

Backslash Security Adds Simulation and Generative AI Tools to DevSecOps Platform

July 28, 2024

July 28, 2024

-

min read

News

Backslash Security Adds Simulation and Generative AI Tools to DevSecOps Platform

July 28, 2024

July 28, 2024

-

min read

News

Backslash Security Adds Simulation and Generative AI Tools to DevSecOps Platform

July 28, 2024

July 28, 2024

-

min read

News

Backslash Security Adds Simulation and Generative AI Tools to DevSecOps Platform

July 28, 2024

July 28, 2024

-

min read

News

Backslash was selected in the The 50 most promising Israeli startups - 2024

May 21, 2024

July 23, 2024

-

min read

News

Backslash was selected in the The 50 most promising Israeli startups - 2024

May 21, 2024

July 23, 2024

-

min read

News

Backslash was selected in the The 50 most promising Israeli startups - 2024

July 23, 2024

May 21, 2024

-

min read

News

Backslash was selected in the The 50 most promising Israeli startups - 2024

July 23, 2024

May 21, 2024

-

min read

News

Application Security Innovator Backslash Identifies AI-Generated Code Concerns via OSS Reachability Analysis, Phantom Package Visibility Capabilities

April 24, 2024

July 23, 2024

-

3

min read

News

Application Security Innovator Backslash Identifies AI-Generated Code Concerns via OSS Reachability Analysis, Phantom Package Visibility Capabilities

April 24, 2024

July 23, 2024

-

3

min read

News

Application Security Innovator Backslash Identifies AI-Generated Code Concerns via OSS Reachability Analysis, Phantom Package Visibility Capabilities

July 23, 2024

April 24, 2024

-

3

min read

News

Application Security Innovator Backslash Identifies AI-Generated Code Concerns via OSS Reachability Analysis, Phantom Package Visibility Capabilities

July 23, 2024

April 24, 2024

-

3

min read

News

Uniting AppSec and Developers in The Age of Cloud-Native Applications

September 27, 2023

July 23, 2024

-

3

min read

News

Uniting AppSec and Developers in The Age of Cloud-Native Applications

September 27, 2023

July 23, 2024

-

3

min read

News

Uniting AppSec and Developers in The Age of Cloud-Native Applications

July 23, 2024

September 27, 2023

-

3

min read

News

Uniting AppSec and Developers in The Age of Cloud-Native Applications

July 23, 2024

September 27, 2023

-

3

min read

News

What AppSec and developers working in cloud-native environments need to know

September 24, 2023

July 23, 2024

-

5

min read

News

What AppSec and developers working in cloud-native environments need to know

September 24, 2023

July 23, 2024

-

5

min read

News

What AppSec and developers working in cloud-native environments need to know

July 23, 2024

September 24, 2023

-

5

min read

News

What AppSec and developers working in cloud-native environments need to know

July 23, 2024

September 24, 2023

-

5

min read

News

AppSec Teams Stuck in Catch-Up Cycle Due to Massive Cloud-Native Enablement Gap

May 25, 2023

July 23, 2024

-

3

min read

News

AppSec Teams Stuck in Catch-Up Cycle Due to Massive Cloud-Native Enablement Gap

May 25, 2023

July 23, 2024

-

3

min read

News

AppSec Teams Stuck in Catch-Up Cycle Due to Massive Cloud-Native Enablement Gap

July 23, 2024

May 25, 2023

-

3

min read

News

AppSec Teams Stuck in Catch-Up Cycle Due to Massive Cloud-Native Enablement Gap

July 23, 2024

May 25, 2023

-

3

min read

News

Backslash Security: How This Cloud-Native Company Is Redefining The $6 Billion AppSec Market

May 17, 2023

July 23, 2024

-

3

min read

News

Backslash Security: How This Cloud-Native Company Is Redefining The $6 Billion AppSec Market

May 17, 2023

July 23, 2024

-

3

min read

News

Backslash Security: How This Cloud-Native Company Is Redefining The $6 Billion AppSec Market

July 23, 2024

May 17, 2023

-

3

min read

News

Backslash Security: How This Cloud-Native Company Is Redefining The $6 Billion AppSec Market

July 23, 2024

May 17, 2023

-

3

min read

News

How Backslash Security is Revolutionizing AppSec with Unified Code and Cloud-native Security

May 16, 2023

July 23, 2024

-

min read

News

How Backslash Security is Revolutionizing AppSec with Unified Code and Cloud-native Security

May 16, 2023

July 23, 2024

-

min read

News

How Backslash Security is Revolutionizing AppSec with Unified Code and Cloud-native Security

July 23, 2024

May 16, 2023

-

min read

News

How Backslash Security is Revolutionizing AppSec with Unified Code and Cloud-native Security

July 23, 2024

May 16, 2023

-

min read

Press Release

‘Vibe coding’ using LLMs susceptible to most common security flaws

April 24, 2025

May 19, 2025

-

3

min read

Press Release

‘Vibe coding’ using LLMs susceptible to most common security flaws

May 19, 2025

April 24, 2025

-

3

min read

Press Release

‘Vibe coding’ using LLMs susceptible to most common security flaws

April 24, 2025

May 19, 2025

-

3

min read

Press Release

‘Vibe coding’ using LLMs susceptible to most common security flaws

May 19, 2025

April 24, 2025

-

3

min read

Press Release

Popular LLMs Found to Produce Vulnerable Code by Default

April 25, 2025

May 19, 2025

-

3

min read

Press Release

Popular LLMs Found to Produce Vulnerable Code by Default

May 19, 2025

April 25, 2025

-

3

min read

Press Release

Popular LLMs Found to Produce Vulnerable Code by Default

April 25, 2025

May 19, 2025

-

3

min read

Press Release

Popular LLMs Found to Produce Vulnerable Code by Default

May 19, 2025

April 25, 2025

-

3

min read

Press Release

'Digital Twins' Bring Simulated Security to the Real World

April 25, 2025

May 19, 2025

-

4

min read

Press Release

'Digital Twins' Bring Simulated Security to the Real World

May 19, 2025

April 25, 2025

-

4

min read

Press Release

'Digital Twins' Bring Simulated Security to the Real World

April 25, 2025

May 19, 2025

-

4

min read

Press Release

'Digital Twins' Bring Simulated Security to the Real World

May 19, 2025

April 25, 2025

-

4

min read

Press Release

Backslash Security Reveals in New Research that GPT-4.1, Other Popular LLMs Generate Insecure Code Unless Explicitly Prompted

April 24, 2025

April 24, 2025

-

3

min read

Press Release

Backslash Security Reveals in New Research that GPT-4.1, Other Popular LLMs Generate Insecure Code Unless Explicitly Prompted

April 24, 2025

April 24, 2025

-

3

min read

Press Release

Backslash Security Reveals in New Research that GPT-4.1, Other Popular LLMs Generate Insecure Code Unless Explicitly Prompted

April 24, 2025

April 24, 2025

-

3

min read

Press Release

Backslash Security Reveals in New Research that GPT-4.1, Other Popular LLMs Generate Insecure Code Unless Explicitly Prompted

April 24, 2025

April 24, 2025

-

3

min read

Press Release

Backslash Security’s Digital Twin Approach to Application Security Gains Traction as Legacy Tools Fall Short

April 9, 2025

April 24, 2025

-

3

min read

Press Release

Backslash Security’s Digital Twin Approach to Application Security Gains Traction as Legacy Tools Fall Short

April 24, 2025

April 9, 2025

-

3

min read

Press Release

Backslash Security’s Digital Twin Approach to Application Security Gains Traction as Legacy Tools Fall Short

April 9, 2025

April 24, 2025

-

3

min read

Press Release

Backslash Security’s Digital Twin Approach to Application Security Gains Traction as Legacy Tools Fall Short

April 24, 2025

April 9, 2025

-

3

min read

Press Release

Backslash Security Emerges from Stealth

August 1, 2023

July 23, 2024

-

3

min read

Press Release

Backslash Security Emerges from Stealth

July 23, 2024

August 1, 2023

-

3

min read

Press Release

Backslash Security Emerges from Stealth

August 1, 2023

July 23, 2024

-

3

min read

Press Release

Backslash Security Emerges from Stealth

July 23, 2024

August 1, 2023

-

3

min read

Press Release

Backslash Security Named Winner of the Coveted Global InfoSec Awards During RSA Conference 2023

August 2, 2023

July 23, 2024

-

2

min read

Press Release

Backslash Security Named Winner of the Coveted Global InfoSec Awards During RSA Conference 2023

July 23, 2024

August 2, 2023

-

2

min read

Press Release

Backslash Security Named Winner of the Coveted Global InfoSec Awards During RSA Conference 2023

August 2, 2023

July 23, 2024

-

2

min read

Press Release

Backslash Security Named Winner of the Coveted Global InfoSec Awards During RSA Conference 2023

July 23, 2024

August 2, 2023

-

2

min read

Press Release

Report: AppSec Teams Stuck in Catch-up Cycle Due to Massive Cloud-Native Enablement Gap, Unable to Keep Up with Agile Developer Pace

August 2, 2023

July 23, 2024

-

min read

Press Release

Report: AppSec Teams Stuck in Catch-up Cycle Due to Massive Cloud-Native Enablement Gap, Unable to Keep Up with Agile Developer Pace

July 23, 2024

August 2, 2023

-

min read

Press Release

Report: AppSec Teams Stuck in Catch-up Cycle Due to Massive Cloud-Native Enablement Gap, Unable to Keep Up with Agile Developer Pace

August 2, 2023

July 23, 2024

-

min read

Press Release

Report: AppSec Teams Stuck in Catch-up Cycle Due to Massive Cloud-Native Enablement Gap, Unable to Keep Up with Agile Developer Pace

July 23, 2024

August 2, 2023

-

min read

Press Release

Backslash Security Launches Application Security Posture Management (ASPM) Platform to Fuse In-Depth Reachability Analysis with Cloud-Native Context

November 1, 2023

July 23, 2024

-

3

min read

Press Release

Backslash Security Launches Application Security Posture Management (ASPM) Platform to Fuse In-Depth Reachability Analysis with Cloud-Native Context

July 23, 2024

November 1, 2023

-

3

min read

Press Release

Backslash Security Launches Application Security Posture Management (ASPM) Platform to Fuse In-Depth Reachability Analysis with Cloud-Native Context

November 1, 2023

July 23, 2024

-

3

min read

Press Release

Backslash Security Launches Application Security Posture Management (ASPM) Platform to Fuse In-Depth Reachability Analysis with Cloud-Native Context

July 23, 2024

November 1, 2023

-

3

min read

Press Release

Backslash Unveils Extensive Enterprise-Grade Capabilities to its Reachability-Based AppSec Platform

June 6, 2024

July 23, 2024

-

min read

Press Release

Backslash Unveils Extensive Enterprise-Grade Capabilities to its Reachability-Based AppSec Platform

July 23, 2024

June 6, 2024

-

min read

Press Release

Backslash Unveils Extensive Enterprise-Grade Capabilities to its Reachability-Based AppSec Platform

June 6, 2024

July 23, 2024

-

min read

Press Release

Backslash Unveils Extensive Enterprise-Grade Capabilities to its Reachability-Based AppSec Platform

July 23, 2024

June 6, 2024

-

min read

Resources

Self-Assessment of Your Vibe Coding Security Posture

June 16, 2025

June 26, 2025

-

min read

Resources

Self-Assessment of Your Vibe Coding Security Posture

June 16, 2025

June 26, 2025

-

min read

Resources

Self-Assessment of Your Vibe Coding Security Posture

June 16, 2025

June 26, 2025

-

min read

Resources

Self-Assessment of Your Vibe Coding Security Posture

June 16, 2025

June 26, 2025

-

min read

Resources

The Path to AppSec-Developer Bliss

June 10, 2025

June 10, 2025

-

min read

Resources

The Path to AppSec-Developer Bliss

June 10, 2025

June 10, 2025

-

min read

Resources

The Path to AppSec-Developer Bliss

June 10, 2025

June 10, 2025

-

min read

Resources

The Path to AppSec-Developer Bliss

June 10, 2025

June 10, 2025

-

min read

Resources

Securing AI-Generated Code and Vibe Coding IDEs Whitepaper

May 28, 2025

June 12, 2025

-

min read

Resources

Securing AI-Generated Code and Vibe Coding IDEs Whitepaper

May 28, 2025

June 12, 2025

-

min read

Resources

Securing AI-Generated Code and Vibe Coding IDEs Whitepaper

May 28, 2025

June 12, 2025

-

min read

Resources

Securing AI-Generated Code and Vibe Coding IDEs Whitepaper

May 28, 2025

June 12, 2025

-

min read

Resources

How Reachability Analysis Can Transform Your Business Vulnerability Prioritization

October 15, 2023

May 28, 2025

-

min read

Resources

How Reachability Analysis Can Transform Your Business Vulnerability Prioritization

October 15, 2023

May 28, 2025

-

min read

Resources

How Reachability Analysis Can Transform Your Business Vulnerability Prioritization

October 15, 2023

May 28, 2025

-

min read

Resources

How Reachability Analysis Can Transform Your Business Vulnerability Prioritization

October 15, 2023

May 28, 2025

-

min read

Resources

Navigating The New Frontier: The Makings of Application Security Posture Management (ASPM)

August 22, 2023

May 28, 2025

-

min read

Resources

Navigating The New Frontier: The Makings of Application Security Posture Management (ASPM)

August 22, 2023

May 28, 2025

-

min read

Resources

Navigating The New Frontier: The Makings of Application Security Posture Management (ASPM)

August 22, 2023

May 28, 2025

-

min read

Resources

Navigating The New Frontier: The Makings of Application Security Posture Management (ASPM)

August 22, 2023

May 28, 2025

-

min read

Resources

Survey Report: Breaking the Catch-up Cycle: The New Cloud-Native AppSec Paradigm

June 13, 2023

May 28, 2025

-

min read

Resources

Survey Report: Breaking the Catch-up Cycle: The New Cloud-Native AppSec Paradigm

June 13, 2023

May 28, 2025

-

min read

Resources

Survey Report: Breaking the Catch-up Cycle: The New Cloud-Native AppSec Paradigm

June 13, 2023

May 28, 2025

-

min read

Resources

Survey Report: Breaking the Catch-up Cycle: The New Cloud-Native AppSec Paradigm

June 13, 2023

May 28, 2025

-

min read

Blog

Simulating a Context-Poisoning Vulnerable MCP Server: A POC

Micah Gold | Backslash Security Research Team

June 24, 2025

-

min read

Blog

Simulating a Context-Poisoning Vulnerable MCP Server: A POC

Micah Gold | Backslash Security Research Team

June 24, 2025

-

min read

Blog

Introducing The Backslash MCP Server Security Hub

June 16, 2025

-

4

min read

Blog

Introducing The Backslash MCP Server Security Hub

June 16, 2025

-

4

min read

Blog

Harnessing Prompt Rules for Secure Code Generation

Yossi Pik

June 11, 2025

-

5

min read

Blog

Harnessing Prompt Rules for Secure Code Generation

Yossi Pik

June 11, 2025

-

5

min read

Blog

Guilty, Innocent, or Just Risky? Why MCP Server Security Verdicts Are Hard

Yossi Pik

June 6, 2025

-

5

min read

Blog

Guilty, Innocent, or Just Risky? Why MCP Server Security Verdicts Are Hard

Yossi Pik

June 6, 2025

-

5

min read

Blog

Top 10 Risks of Using MCP Servers in IDEs

Rani Osnat

June 4, 2025

-

4

min read

Blog

Top 10 Risks of Using MCP Servers in IDEs

Rani Osnat

June 4, 2025

-

4

min read

Blog

Can AI “Vibe Coding” Be Trusted? It Depends…

April 24, 2025

-

5

min read

Blog

Can AI “Vibe Coding” Be Trusted? It Depends…

April 24, 2025

-

5

min read

Blog

Vibe-Securing: 4+1 Pillars of AppSec for Vibe Coding

Yossi Pik

April 14, 2025

-

5

min read

Blog

Vibe-Securing: 4+1 Pillars of AppSec for Vibe Coding

Yossi Pik

April 14, 2025

-

5

min read

Blog

AppSec Game-Changer #2: Business Process Impact View

Amit Bismut

February 5, 2025

-

3

min read

Blog

AppSec Game-Changer #2: Business Process Impact View

Amit Bismut

February 5, 2025

-

3

min read

Blog

AppSec Game-Changer #1: Triggerability™

Amit Bismut

January 29, 2025

-

3

min read

Blog

AppSec Game-Changer #1: Triggerability™

Amit Bismut

January 29, 2025

-

3

min read

Blog

“Code is Code”: Redefining SAST and SCA in Application Security

Eric Gold

January 22, 2025

-

4

min read

Blog

“Code is Code”: Redefining SAST and SCA in Application Security

Eric Gold

January 22, 2025

-

4

min read

Blog

Triggerable Vulnerabilities: The Star Trek "Triggles" of AppSec

Eric Gold

January 15, 2025

-

3

min read

Blog

Triggerable Vulnerabilities: The Star Trek "Triggles" of AppSec

Eric Gold

January 15, 2025

-

3

min read

Blog

The Top 5 AppSec Trends of 2025: Essential Insights

Backslash Team

January 14, 2025

-

3

min read

Blog

The Top 5 AppSec Trends of 2025: Essential Insights

Backslash Team

January 14, 2025

-

3

min read

Next
Backslash Logo
Product
  • How It Works
  • Backslash Reachability Analysis
  • Backslash vs. SCA and SAST
  • Backslash vs. Orchestration Solutions
Use Cases
  • Replace your SCA / SAST
  • M&A Due Diligence
  • ROI Calculator
Resources
  • Blog
  • News
Company
  • About Us
  • Careers
  • Customers
CWE Database
    GIA Award 2023OWASP Logo
    ©2025 Backslash. 28 HaArba'a St., Tel‑Aviv
     Privacy Policy   |   Terms of Use