Mend.io Application Security

SAST vs. SCA: 7 Key Differences - SAST blogs banners blog image

SAST vs. SCA: 7 Key Differences

Discover the 7 key differences between SAST and SCA tools in application security. Learn how they integrate into the SDLC process.

Read More
SAST vs. SCA: 7 Key Differences - SAST blog hero

Mend SAST: The Next Generation of Application Security

Learn about our innovative approach to detecting and remediating custom code vulnerabilities for a more secure future.

Read More
SAST vs. SCA: 7 Key Differences - Five Critically Important Facts About npm Package Security

Five Critically Important Facts About npm Package Security

Learn about the five critical facts about npm package security, including how attackers exploit trust, default behaviors, and dependency hell.

Read More
SAST vs. SCA: 7 Key Differences - CVE 2021 44142 Vulnerability 2

CVE-2021-44142: Vulnerability in Samba Enables Bad Actors to Execute Arbitrary Code as Root

CVE-2021-44142 allows bad actors to execute arbitrary code as root on Samba. Learn about the vulnerability, exploit, and how to fix it.

Read More
SAST vs. SCA: 7 Key Differences - CVE 2021 4034 pwnkit

CVE-2021-4034: A Walkthrough of Pwnkit — the Latest Linux Privileges Escalation Vulnerability

Dive into CVE-2021-4034 PwnKit vulnerability: learn how a simple out-of-bounds access in Linux's pkexec can lead to root system privileges.

Read More
SAST vs. SCA: 7 Key Differences - Chief Scientists series featured

Best Practices for Dealing With Log4j

Learn best practices for dealing with Log4j vulnerabilities, prevent future risks by sanitizing user input, and secure your App with our tips.

Read More
SAST vs. SCA: 7 Key Differences - Log4j CVEs images 44832

CVE-2021-44832: A New Medium Severity Vulnerability Was Found in Log4j

Learn about CVE-2021-44832 in Log4j and how to protect your applications. Stay informed about the latest cybersecurity vulnerabilities.

Read More
SAST vs. SCA: 7 Key Differences - Log4j CVEs images renovate

Fixing the Log4j Vulnerability with Mend

Learn how to fix the Log4j vulnerability with Mend Renovate and Remediate. Keep your applications secure with automated dependency management.

Read More
SAST vs. SCA: 7 Key Differences - Log4j and Ruby

Log4Shell or LogThemAll: Log4Shell in Ruby Applications

Learn about the Log4Shell vulnerability in Ruby applications using Log4j jars in JRuby, exposing them to potential exploits.

Read More
SAST vs. SCA: 7 Key Differences - Log4j Vulnerability CVE 2021 45105 1

Log4j Vulnerability CVE-2021-45105: What You Need to Know

Stay informed about the latest Log4j vulnerability CVE-2021-45105 & how to protect your applications. Learn how to fix & prevent exploitation

Read More
SAST vs. SCA: 7 Key Differences - Log4j vulnerability 2021 45046

Log4j Vulnerability CVE-2021-45046 Now a Critical 9.0

What you need to know about Log4j Vulnerability CVE-2021-45046, and how to remediate it.

Read More
SAST vs. SCA: 7 Key Differences - Log4j blog post

New Log4j Vulnerability CVE-2021-44228: Info and Remediation

How to remediate the newly published critical vulnerability in Apache’s widely popular Log4j Java library, CVE-2021-44228.

Read More
SAST vs. SCA: 7 Key Differences - aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzViOWE0OGI3MWNmMWYuanBnJnZlcnNpb249MDAwMCZzaWc9OWI1ZmE1NjI4ZTRjMWFlNjU2MjlkOTU3OTA2OTRlMzc

How to Make Your Vulnerability Management Metrics Count

Learn how to make your vulnerability management metrics count. Discover key metrics to track and prioritize vulnerabilities effectively.

Read More
SAST vs. SCA: 7 Key Differences - Vulnerability Management What You Need To Know

Vulnerability Management — What You Need To Know

Understand the four stages, metrics, policy setup, and prioritization for effective security through Vulnerability Management.

Read More
SAST vs. SCA: 7 Key Differences - Fixing Vulnerable npm Packages Quickly and Painlessly

Mend Research: Fixing Vulnerable npm Packages Quickly and Painlessly

Learn how Mend Research is helping developers fix vulnerable npm packages quickly and painlessly.

Read More
SAST vs. SCA: 7 Key Differences - aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzViN2ViODliNzVhZjQuanBnJnZlcnNpb249MDAwMCZzaWc9NDljMzRlZjJjZjVhODE1NDAwN2EzZDc0ZDc3YzUwOWM

The Future of Vulnerability Management Programs

Discover the future of vulnerability management programs in the ever-changing digital world. Learn about detection, prioritization, & more.

Read More