Mend.io Malicious Packages

What are Malicious Packages? How Do They Work? - what are malicious packages blog

What are Malicious Packages? How Do They Work?

Learn about malicious packages, how they work, and the growing threat they pose to software supply chains.

Read More
What are Malicious Packages? How Do They Work? - blog 2 1

Deceptive ‘Vibranced’ npm Package Discovered Masquerading as Popular ‘Colors’ Package

Discover the threat of the 'Vibranced' npm package masquerading as 'Colors'. Learn about its stages of execution, obfuscation techniques.

Read More
What are Malicious Packages? How Do They Work? - Yandex Data Leak Triggers Malicious Package Publication 1

Yandex Data Leak Triggers Malicious Package Publication

Discover how the Yandex data leak triggered malicious package publication, leading to supply chain security risks.

Read More
What are Malicious Packages? How Do They Work? - blog image

Malicious Code Deletes Directories If You Do Not Have a License

Discover how malicious code can delete directories if you don't have a license. Learn about supply chain security and license compliance.

Read More
What are Malicious Packages? How Do They Work? - blog RubyGems vulnerabilities

To use rest_client, or to use rest-client, that is the question

Discover the risks of using rest_client versus rest-client in RubyGems. Learn how a recent attack was thwarted.

Read More
What are Malicious Packages? How Do They Work? - npm Massive Dependency Confusion Attack

Cybercriminals targeted users of packages with a total of 1.5 billion weekly downloads on npm

Stay informed about the latest supply chain security incident targeting npm users. Learn about the malicious packages and more.

Read More
What are Malicious Packages? How Do They Work? - npm Massive Dependency Confusion Attack

Popular Cryptocurrency Exchange dYdX Has Had Its NPM Account Hacked

dYdX, a popular cryptocurrency exchange, had its NPM account hacked in a supply chain attack. Learn how to protect against similar attacks.

Read More
What are Malicious Packages? How Do They Work? - Todays Security Tidbit An Encrypted JSON File Containings Malicious Code

Today’s Security Tidbit: An Encrypted JSON File Containing Malicious Code

Discover how encrypted JSON files are being used to hide malicious code. Learn about the latest security findings and how to protect your apps.

Read More
What are Malicious Packages? How Do They Work? - How to Conquer Remote Code Execution RCE in npm

How to Conquer Remote Code Execution (RCE) in npm

Learn how to conquer Remote Code Execution (RCE) attacks in npm. Find out why npm is susceptible, the threats of RCE, and more.

Read More
What are Malicious Packages? How Do They Work? - blog blog image

3 Critical Best Practices of Software Supply Chain Security

Learn about the 3 critical best practices of software supply chain security to protect your organization from malicious packages.

Read More
What are Malicious Packages? How Do They Work? - Blog

New Typosquatting Attack on npm Package ’colors’ Using Cross language Technique Explained

Discover the latest typosquatting attack on the npm package 'colors' using a cross-language technique.

Read More
What are Malicious Packages? How Do They Work? - RubyGems Critical CVE 2022 29176

Impact Analysis: RubyGems Critical CVE-2022-29176 Unauthorized Package Takeover 

Impact Analysis of RubyGems Critical CVE-2022-29176 Unauthorized Package Takeover. Learn about the vulnerability, impact assessment, and more

Read More
What are Malicious Packages? How Do They Work? - malicious package npm

A Malicious Package Found Stealing AWS AIM data on npm has Similarities To Capital One Hack

Discover how a malicious package found stealing AWS AIM data on npm has similarities to the Capital One hack. Learn about the threat.

Read More
What are Malicious Packages? How Do They Work? - diffend

Welcome to Mend, Diffend!

Mend welcomes Diffend, an innovative software supply chain security service, to improve open source risk management.

Read More