Blog Tiffany Jennings

Tiffany Jennings Head of Content

Tiffany Jennings is Head of Content at Mend.io. She oversees editorial strategy and thought leadership across Mend.io’s digital channels, bringing complex AppSec topics to life through creative storytelling, expert insights, and helping technology find its human voice.
CVE-2021-4034: A Walkthrough of Pwnkit β€” the Latest Linux Privileges Escalation Vulnerability - CVE 2021 4034 pwnkit

CVE-2021-4034: A Walkthrough of Pwnkit β€” the Latest Linux Privileges Escalation Vulnerability

Dive into CVE-2021-4034 PwnKit vulnerability: learn how a simple out-of-bounds access in Linux's pkexec can lead to root system privileges.

Read More
CVE-2021-4034: A Walkthrough of Pwnkit β€” the Latest Linux Privileges Escalation Vulnerability - top open source licenses explained post

Open Source Licenses Trends and Predictions

Open source licenses in 2022. Permissive licenses are on the rise, while copyleft licenses like GPL are decreasing in popularity.

Read More
CVE-2021-4034: A Walkthrough of Pwnkit β€” the Latest Linux Privileges Escalation Vulnerability - Chief Scientists series featured

Best Practices for Dealing With Log4j

Learn best practices for dealing with Log4j vulnerabilities, prevent future risks by sanitizing user input, and secure your App with our tips.

Read More
CVE-2021-4034: A Walkthrough of Pwnkit β€” the Latest Linux Privileges Escalation Vulnerability - Log4j CVEs images 44832

CVE-2021-44832: A New Medium Severity Vulnerability Was Found in Log4j

Learn about CVE-2021-44832 in Log4j and how to protect your applications. Stay informed about the latest cybersecurity vulnerabilities.

Read More
CVE-2021-4034: A Walkthrough of Pwnkit β€” the Latest Linux Privileges Escalation Vulnerability - Log4j and Ruby

Log4Shell or LogThemAll: Log4Shell in Ruby Applications

Learn about the Log4Shell vulnerability in Ruby applications using Log4j jars in JRuby, exposing them to potential exploits.

Read More
CVE-2021-4034: A Walkthrough of Pwnkit β€” the Latest Linux Privileges Escalation Vulnerability - Log4j Vulnerability CVE 2021 45105 1

Log4j Vulnerability CVE-2021-45105: What You Need to Know

Stay informed about the latest Log4j vulnerability CVE-2021-45105 & how to protect your applications. Learn how to fix & prevent exploitation

Read More
CVE-2021-4034: A Walkthrough of Pwnkit β€” the Latest Linux Privileges Escalation Vulnerability - Log4j blog post

New Log4j Vulnerability CVE-2021-44228: Info and Remediation

How to remediate the newly published critical vulnerability in Apache’s widely popular Log4j Java library, CVE-2021-44228.

Read More
CVE-2021-4034: A Walkthrough of Pwnkit β€” the Latest Linux Privileges Escalation Vulnerability - aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzViOWE0OGI3MWNmMWYuanBnJnZlcnNpb249MDAwMCZzaWc9OWI1ZmE1NjI4ZTRjMWFlNjU2MjlkOTU3OTA2OTRlMzc

How to Make Your Vulnerability Management Metrics Count

Learn how to make your vulnerability management metrics count. Discover key metrics to track and prioritize vulnerabilities effectively.

Read More
CVE-2021-4034: A Walkthrough of Pwnkit β€” the Latest Linux Privileges Escalation Vulnerability - Vulnerability Management What You Need To Know

Vulnerability Management β€” What You Need To Know

Understand the four stages, metrics, policy setup, and prioritization for effective security through Vulnerability Management.

Read More
CVE-2021-4034: A Walkthrough of Pwnkit β€” the Latest Linux Privileges Escalation Vulnerability - Fixing Vulnerable npm Packages Quickly and Painlessly

Mend Research: Fixing Vulnerable npm Packages Quickly and Painlessly

Learn how Mend Research is helping developers fix vulnerable npm packages quickly and painlessly.

Read More
CVE-2021-4034: A Walkthrough of Pwnkit β€” the Latest Linux Privileges Escalation Vulnerability - aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzViN2ViODliNzVhZjQuanBnJnZlcnNpb249MDAwMCZzaWc9NDljMzRlZjJjZjVhODE1NDAwN2EzZDc0ZDc3YzUwOWM

The Future of Vulnerability Management Programs

Discover the future of vulnerability management programs in the ever-changing digital world. Learn about detection, prioritization, & more.

Read More
CVE-2021-4034: A Walkthrough of Pwnkit β€” the Latest Linux Privileges Escalation Vulnerability - Code Risk Management

What You Need to Know About Code Risk Management

Learn about code risk management and how it can help minimize technical debt and prevent errors in your development process.

Read More
CVE-2021-4034: A Walkthrough of Pwnkit β€” the Latest Linux Privileges Escalation Vulnerability - 1000x650 Why Adopting Zero Trust Security Is Necessary For.21 10 21

Why Adopting Zero Trust Security Is Necessary For DevSecOps

Discover why adopting Zero Trust security is essential for DevSecOps in the ever-evolving world of digital assets.

Read More
CVE-2021-4034: A Walkthrough of Pwnkit β€” the Latest Linux Privileges Escalation Vulnerability - Ws cure blog 1

Mend Cure: Automated Remediation for Developers

Mend Cure provides automated remediation for developers to address AppSec risks, saving time and promoting secure coding.

Read More
CVE-2021-4034: A Walkthrough of Pwnkit β€” the Latest Linux Privileges Escalation Vulnerability - Supply Chain Security Update How Secure is Composer

Supply Chain Security Update: How Secure is Composer?

Stay updated on supply chain security with our blog post on the vulnerability in Composer. Learn how the issue was detected and fixed.

Read More
CVE-2021-4034: A Walkthrough of Pwnkit β€” the Latest Linux Privileges Escalation Vulnerability - open source risk management in financial sector hero

Open Source Risk Management in the Financial Sector

Explore how financial institutions manage open source risks to innovate securely, including adopting Software Composition Analysis (SCA).

Read More

Subscribe to our Newsletter

Join our subscriber list to get the latest news and updates

Thanks for signing up!Β 

AI Security & Compliance Assessment

Map your maturity against the global standards. Receive a personalized readiness report in under 5 minutes.