Mend.io Supply Chain Security

Poisoned Axios: npm Account Takeover, 50 Million Downloads, and a RAT That Vanishes After Install - Blog cover Poisoned Axios

Poisoned Axios: npm Account Takeover, 50 Million Downloads, and a RAT That Vanishes After Install

See how the attack works, what to look for, and how to remediate.

Read More
Poisoned Axios: npm Account Takeover, 50 Million Downloads, and a RAT That Vanishes After Install - Blog cover TEAM PCP part 3

Famous Telnyx Pypi Package compromised by TeamPCP

See how the attack works, what to look for, and how to remediate.

Read More
Poisoned Axios: npm Account Takeover, 50 Million Downloads, and a RAT That Vanishes After Install - Blog cover TEAM PCP attack V2

TeamPCP Supply Chain Attack Part 2: LiteLLM PyPI Credential Stealer

Check and fix your install for the new LiteLLM PyPI compromise.

Read More
Poisoned Axios: npm Account Takeover, 50 Million Downloads, and a RAT That Vanishes After Install - Blog cover CanisterWorm

CanisterWorm: The Self-Spreading npm Attack That Uses a Decentralized Server to Stay Alive

Deep dive into the self-spreading CanisterWorm.

Read More
Poisoned Axios: npm Account Takeover, 50 Million Downloads, and a RAT That Vanishes After Install - Blog best software composition analysis providers

Best Software Composition Analysis Providers: Top 5 in 2026

Explore key features of leading SCA providers.

Read More
Poisoned Axios: npm Account Takeover, 50 Million Downloads, and a RAT That Vanishes After Install - Blog best software composition analysis enterprise

Best Software Composition Analysis for Enterprise: Top 8 in 2026

Explore this guide to the best software composition analysis tools for large teams.

Read More
Poisoned Axios: npm Account Takeover, 50 Million Downloads, and a RAT That Vanishes After Install - Top Tools for Automating SBOMs

Top Tools for Automating SBOMs

Discover the top tools for automating SBOMs and how to create SBOMs effortlessly.

Read More
Poisoned Axios: npm Account Takeover, 50 Million Downloads, and a RAT That Vanishes After Install - Blog image SCA tools 1

Best Software Composition Analysis (SCA) Tools: Top 6 Solutions in 2025

Learn what SCA tools do and how they help secure your open source dependencies.

Read More
Poisoned Axios: npm Account Takeover, 50 Million Downloads, and a RAT That Vanishes After Install - Solana Supply Chain Security Blog graphic

The @Solana/web3.js Incident: Another Wake-Up Call for Supply Chain Security

This post covers the attack flow, how it happened, and the importance of supply chain security.

Read More
Poisoned Axios: npm Account Takeover, 50 Million Downloads, and a RAT That Vanishes After Install - polyfill supply chain attack post

More than 100K sites impacted by Polyfill supply chain attack

The new Chinese owner tampers with the code of cdn.polyfill.io to inject malware targeting mobile devices.

Read More
Poisoned Axios: npm Account Takeover, 50 Million Downloads, and a RAT That Vanishes After Install - threat hunting report img

Threat Hunting 101: Five Common Threats to Look For

Learn more about supply chain threats and where to find them.

Read More
Poisoned Axios: npm Account Takeover, 50 Million Downloads, and a RAT That Vanishes After Install - shrinking security debt with dependency management white paper

Critical Backdoor Found in XZ Utils (CVE-2024-3094) Enables SSH Compromise 1

Discover how CVE-2024-3094 affects XZ Utils and enables SSH compromise. Get insights on detection, mitigation, and system security.

Read More
Poisoned Axios: npm Account Takeover, 50 Million Downloads, and a RAT That Vanishes After Install - 6 more top tips for holistic appsec and software supply chain security

Six More Top Tips For Holistic AppSec and Software Supply Chain Security

Learn how to strengthen your security posture with holistic approaches to application security and software supply chain security.

Read More
Poisoned Axios: npm Account Takeover, 50 Million Downloads, and a RAT That Vanishes After Install - 6 top tips for holistic appsec and software supply chain security

Six Top Tips For Holistic AppSec and Software Supply Chain Security

Discover six top tips for holistic application security and software supply chain security for long-term success.

Read More
Poisoned Axios: npm Account Takeover, 50 Million Downloads, and a RAT That Vanishes After Install - turnover relationships and tools in cybersecurity

Turnover, Relationships, and Tools in Cybersecurity

Discover effective strategies for handling security team turnover, maintaining tool efficiency, and fostering strong developer relationships.

Read More
Poisoned Axios: npm Account Takeover, 50 Million Downloads, and a RAT That Vanishes After Install - what new security threats arise from the boom in ai and llms

What New Security Threats Arise from The Boom in AI and LLMs?

Explore the security threats arising from the boom in AI and LLMs, including data privacy, misinformation, and resource exhaustion.

Read More

AI Security & Compliance Assessment

Map your maturity against the global standards. Receive a personalized readiness report in under 5 minutes.