Hannes Ullman Hannes Ullman

The Hidden Risks of AI-Coding: Hallucinated Dependencies

Hallucinated dependencies become a vulnerability when attackers exploit common package names generated by AI models. This is called slopsquatting, and it is a new hacking technique that takes advantage of the fact that many hallucinated package names are often repeated across similar prompts.

Read More
Hannes Ullman Hannes Ullman

☔️ When Alert Fatigue Becomes the Real Threat

Alerts are pouring in. Your team’s stretched. And the critical signal is buried in noise.

Bifrost flips the model: we understand each service’s legit runtime behavior, prevent out-of-policy actions, and cut alert spam—so you focus on what’s truly risky. Use your existing channels for the few alerts that matter.

Read More
Hannes Ullman Hannes Ullman

✂️Cut costs, not security ✂️

Here’s how your company can cut costs without compromising on security by using bifrost:

⚙️Automate manual processes

⚠️Prevent costly breaches

🗣️Protect the company’s reputation

Read More
Hannes Ullman Hannes Ullman

❗️Staying ahead of NIS2❗️

The EU’s NIS2 Directive is raising the bar for cybersecurity across Europe. From digital infrastructure to SaaS platforms, companies now face strict expectations around incident detection, risk management, and supply chain security. The problem? Most tools flood teams with alerts but fail to deliver real-world protection. At bifrost, we approach this differently.

Read More
Hannes Ullman Hannes Ullman

1 minute about AppArmor

AppArmor is a mandatory access control (MAC) Security Module that restricts the capabilities and permissions of a containerized workload. The permissions are controlled through individual security profiles, which allow or disallow syscall actions. Restrictions could include network access, writing, loading, and reading files, as well as other fine-grained capabilities.

Read More
Hannes Ullman Hannes Ullman

⚠️The vulnerabilities you didn’t know you inherited ⚠️

Are you confident that every dependency in your codebase is secure? That quick-fix plugin four years ago that somehow became permanent? As the usage of third-party code continues to grow, so do the risks. Today, as much as 70% of the applications have security issues in third-party code. 

Read More