There’s a New Stealer Variant in Town, and It’s Using Electron to Stay Fully Undetected
Guides
Protect AI models, data, and systems
Test for behavioral risks in conversational AI
Mitigating risks and future trends
AppSec types, tools, and best practices
Automating dependency updates
Manage open source code
Keep source code safe
Improve transparency, security, and compliance
Pre-production scanning and runtime protection
Secure containerized applications
The Unseen Risks of Open Source Dependencies: The Case of an Abandoned Name
Mend.io research discovered a threat actor takeover of the name ‘gemnasium-gitlab-service', a retired Ruby gem with two million+ downloads.
Read MoreJoin our subscriber list to get the latest news and updates
Thanks for signing up!
Map your maturity against the global standards. Receive a personalized readiness report in under 5 minutes.