
The Unseen Risks of Open Source Dependencies: The Case of an Abandoned Name
The Unseen Risks of Open Source Dependencies: The Case of an Abandoned Name
Mend.io research discovered a threat actor takeover of the name ‘gemnasium-gitlab-service', a retired Ruby gem with two million+ downloads.
Read MoreYandex Data Leak Triggers Malicious Package Publication
Discover how the Yandex data leak triggered malicious package publication, leading to supply chain security risks.
Read MoreMalicious Code Deletes Directories If You Do Not Have a License
Discover how malicious code can delete directories if you don't have a license. Learn about supply chain security and license compliance.
Read MoreToday’s Security Tidbit: An Encrypted JSON File Containing Malicious Code
Discover how encrypted JSON files are being used to hide malicious code. Learn about the latest security findings and how to protect your apps.
Read MoreSingle Author Uploaded 168 Packages to npm as Part of a Massive Dependency Confusion Attack
Discover how a single author uploaded 168 malicious npm packages in a dependency confusion attack. Learn how Mend blocked these threats.
Read MoreNew Typosquatting Attack on npm Package ’colors’ Using Cross language Technique Explained
Discover the latest typosquatting attack on the npm package 'colors' using a cross-language technique.
Read MoreDiscover how AWS was targeted by a malicious package backfill attack, the methods used by attackers, and how to protect against such attacks.
Read MoreAutomated Software Supply Chain Attacks: Should You be Worried?
Learn why automated software supply chain attacks are a growing threat. Discover how to protecting your org from malicious NPM packages.
Read MoreJoin our subscriber list to get the latest news and updates
Thanks for signing up!