Mend.io Malicious Packages

8 Considerations for Thwarting Malicious Packages - eight considerations for thwarting malicious packages

8 Considerations for Thwarting Malicious Packages

Learn how to protect your code from malicious packages with these eight considerations. Stay ahead of supply chain security threats.

Read More
8 Considerations for Thwarting Malicious Packages - what you can do to stop software supply chain attacks post

What You Can Do to Stop Software Supply Chain Attacks

Learn how to stop software supply chain attacks with SBOMs, best practices, and prioritizing known vulnerabilities. Protect your software.

Read More
8 Considerations for Thwarting Malicious Packages - theres a new stealer variant in town and its using electron to stay fully undetected

There’s a New Stealer Variant in Town, and It’s Using Electron to Stay Fully Undetected

Discover the latest threat in town - a new info-stealer variant using Electron to remain undetected. Learn about its attack flow.

Read More
8 Considerations for Thwarting Malicious Packages - brandjacking

What Risks Do You Run from Brandjacking, and How Do You Overcome Them?

Learn about the risks of brandjacking & how to overcome them with application security tools & practices. Protect your org from cyber threats.

Read More
8 Considerations for Thwarting Malicious Packages - cybersecurity risks posed by typosquatting and how you can beat them

What Cybersecurity Risks Does Typosquatting Pose, and How Can You Beat Them?

Find out what typosquatting is, why it is such a threat, and what you can do to stop it.

Read More
8 Considerations for Thwarting Malicious Packages - how does slsa help strengthen software supply chain security

How Does SLSA Help Strengthen Software Supply Chain Security?

Learn how SLSA enhances software supply chain security with levels of protection. Understand the risks, benefits, and best practices.

Read More
8 Considerations for Thwarting Malicious Packages - understanding the anatomy of a malicious package attack

Understanding the Anatomy of a Malicious Package Attack

Learn to protect your applications from malicious packages with our guide. Understand the anatomy of attacks and how to prevent them.

Read More
8 Considerations for Thwarting Malicious Packages - whats driving the adoption of sboms and whats

What’s Driving the Adoption of SBOMs? What’s Next for Them?

Discover what's driving the adoption of SBOMs and what's next for them in terms of malicious packages and supply chain security.

Read More
8 Considerations for Thwarting Malicious Packages - unseen risks of open source dependencies case of an abandoned name e1685538190274

The Unseen Risks of Open Source Dependencies: The Case of an Abandoned Name

Mend.io research discovered a threat actor takeover of the name ‘gemnasium-gitlab-service', a retired Ruby gem with two million+ downloads.

Read More
8 Considerations for Thwarting Malicious Packages - what are malicious packages blog post

What are Malicious Packages? How Do They Work?

Learn about malicious packages and the growing threat they pose to software supply chains.

Read More
8 Considerations for Thwarting Malicious Packages - blog 2 1

Deceptive ‘Vibranced’ npm Package Discovered Masquerading as Popular ‘Colors’ Package

Discover the threat of the 'Vibranced' npm package masquerading as 'Colors'. Learn about its stages of execution, obfuscation techniques.

Read More
8 Considerations for Thwarting Malicious Packages - Yandex Data Leak Triggers Malicious Package Publication 1

Yandex Data Leak Triggers Malicious Package Publication

Discover how the Yandex data leak triggered malicious package publication, leading to supply chain security risks.

Read More
8 Considerations for Thwarting Malicious Packages - blog image

Malicious Code Deletes Directories If You Do Not Have a License

Discover how malicious code can delete directories if you don't have a license. Learn about supply chain security and license compliance.

Read More
8 Considerations for Thwarting Malicious Packages - blog RubyGems vulnerabilities

To use rest_client, or to use rest-client, that is the question

Discover the risks of using rest_client versus rest-client in RubyGems. Learn how a recent attack was thwarted.

Read More
8 Considerations for Thwarting Malicious Packages - npm Massive Dependency Confusion Attack

Cybercriminals targeted users of packages with a total of 1.5 billion weekly downloads on npm

Stay informed about the latest supply chain security incident targeting npm users. Learn about the malicious packages and more.

Read More
8 Considerations for Thwarting Malicious Packages - npm Massive Dependency Confusion Attack

Popular Cryptocurrency Exchange dYdX Has Had Its NPM Account Hacked

dYdX, a popular cryptocurrency exchange, had its NPM account hacked in a supply chain attack. Learn how to protect against similar attacks.

Read More

AI Security & Compliance Assessment

Map your maturity against the global standards. Receive a personalized readiness report in under 5 minutes.