Mend.io Supply Chain Security

Understanding the Anatomy of a Malicious Package Attack - understanding the anatomy of a malicious package attack

Understanding the Anatomy of a Malicious Package Attack

Learn to protect your applications from malicious packages with our guide. Understand the anatomy of attacks and how to prevent them.

Read More
Understanding the Anatomy of a Malicious Package Attack - whats driving the adoption of sboms and whats

What’s Driving the Adoption of SBOMs? What’s Next for Them?

Discover what's driving the adoption of SBOMs and what's next for them in terms of malicious packages and supply chain security.

Read More
Understanding the Anatomy of a Malicious Package Attack - unseen risks of open source dependencies case of an abandoned name e1685538190274

The Unseen Risks of Open Source Dependencies: The Case of an Abandoned Name

Mend.io research discovered a threat actor takeover of the name ‘gemnasium-gitlab-service', a retired Ruby gem with two million+ downloads.

Read More
Understanding the Anatomy of a Malicious Package Attack - blog pic

Mend.io + Jira Security: Doing DevSecOps Better Together

Discover how Mend.io & Jira Security are revolutionizing DevSecOps, improving application security, & streamlining workflows for dev teams.

Read More
Understanding the Anatomy of a Malicious Package Attack - what are malicious packages blog post

What are Malicious Packages? How Do They Work?

Learn about malicious packages and the growing threat they pose to software supply chains.

Read More
Understanding the Anatomy of a Malicious Package Attack - rsa view from the floor

RSA Conference 2023: Key Takeaways From Our Five Favorite Sessions

RSA 2023 takeaways, including sessions on supply chain security, translating security for the board, & the psychology of DevSecOps.

Read More
Understanding the Anatomy of a Malicious Package Attack - five key principles of modern application security e1678917349838

The Five Key Principles of Modern Application Security

Discover the key principles of modern application security. Learn how to secure your software and protect against evolving threats.

Read More
Understanding the Anatomy of a Malicious Package Attack - who should take responsibility for application security

Just Who Exactly Should Take Responsibility for Application Security?

Explore the complexities of application security responsibility in the age of DevSecOps and supply chain breaches. Who should take the lead?

Read More
Understanding the Anatomy of a Malicious Package Attack - securing the software supply chain mend open source risk report

Securing the Software Supply Chain: Key Findings from the Mend Open Source Risk Report

Discover key findings from the Mend Open Source Risk Report on securing the software supply chain. Watch the webinar for more insights.

Read More
Understanding the Anatomy of a Malicious Package Attack - Yandex Data Leak Triggers Malicious Package Publication 1

Yandex Data Leak Triggers Malicious Package Publication

Discover how the Yandex data leak triggered malicious package publication, leading to supply chain security risks.

Read More
Understanding the Anatomy of a Malicious Package Attack - blog image

Malicious Code Deletes Directories If You Do Not Have a License

Discover how malicious code can delete directories if you don't have a license. Learn about supply chain security and license compliance.

Read More
Understanding the Anatomy of a Malicious Package Attack - large Blog 1 3

Mend’s Trends for 2023

Stay ahead of cyber threats with Mend's Trends for 2023. Experts predict a rise in AI-driven cybercrime and open source vulnerabilities.

Read More
Understanding the Anatomy of a Malicious Package Attack - large Blog 1 2

Introducing the Mend Open Source Risk Report

Discover the latest insights on open source risk management in the Mend Open Source Risk Report.

Read More
Understanding the Anatomy of a Malicious Package Attack - DevSecOps A Comprehensive Guide to Securely Managing Your DevOps Workflow

DevSecOps: A Comprehensive Guide to Securely Managing Your DevOps Workflow

Get to know all about DevSecOps and the main tools and practices that organizations should adopt in order to implement a DevSecOps pipeline.

Read More
Understanding the Anatomy of a Malicious Package Attack - big blog post

Top Three User Priorities for Software Composition Analysis

Discover the top three user priorities for Software Composition Analysis including application security, DevSecOps, and license compliance.

Read More
Understanding the Anatomy of a Malicious Package Attack - openssl alert

Advisory: New OpenSSL Critical Security Vulnerability

Learn about the new OpenSSL critical security vulnerabilities CVE-2022-3786 and CVE-2022-3602. Discover their impact, and protect your systems.

Read More

AI Security & Compliance Assessment

Map your maturity against the global standards. Receive a personalized readiness report in under 5 minutes.