Popular Cryptocurrency Exchange dYdX Has Had Its NPM Account Hacked
dYdX, a popular cryptocurrency exchange, had its NPM account hacked in a supply chain attack. Learn how to protect against similar attacks.
Mend API Helps Make SBOMs Simple
Learn how Mend API simplifies the creation of SBOMs for better supply chain security. Stay ahead in DevSecOps with our automated tool.
Today’s Security Tidbit: An Encrypted JSON File Containing Malicious Code
Discover how encrypted JSON files are being used to hide malicious code. Learn about the latest security findings and how to protect your apps.
3 Critical Best Practices of Software Supply Chain Security
Learn about the 3 critical best practices of software supply chain security to protect your organization from malicious packages.
Introducing Mend Supply Chain Defender Integration with JFrog Artifactory
Discover how Mend Supply Chain Defender integrates with JFrog Artifactory to block malicious software threats in your code base.
WhiteSource is Now Mend: You Code, We Cure
Mend, formerly WhiteSource, focuses on automating application security with a remediation-first approach for open source and custom code.
What is the NIST Supply Chain Risk Management Program?
Discover the NIST Supply Chain Risk Management Program.. Learn how to manage cybersecurity risks in digital supply chains effectively.
Automated Software Supply Chain Attacks: Should You be Worried?
Learn why automated software supply chain attacks are a growing threat. Discover how to protecting your org from malicious NPM packages.
Best Practices For Managing Ruby Supply Chain Security Risks
Understand the types of Ruby supply chain attacks. Learn the best practices for preventing supply chain security risks in your Ruby projects.
A Guide To Implementing Software Supply Chain Risk Management
Learn how to implement software supply chain risk management to safeguard your critical assets. Discover best practices, & more.
Popular JavaScript Library ua-parser-js Compromised via Account Takeover
Popular JavaScript library ua-parser-js was compromised via account takeover, releasing malicious versions.
Using Zero Trust to Mitigate Supply Chain Risks
Discover how Zero Trust can help mitigate supply chain risks and enhance your software security.
Supply Chain Security Update: How Secure is Composer?
Stay updated on supply chain security with our blog post on the vulnerability in Composer. Learn how the issue was detected and fixed.
Securing Your Package Manager’s Lockfiles
Learn how to secure your package manager's lockfiles to protect your application from supply chain risks and ensure version consistency.
The Forrester Wave™ Software Composition Analysis, Q3 2021: Key Takeaways
Discover key takeaways from The Forrester Wave™ Software Composition Analysis, Q3 2021 report.
How Packages’ External Resources Threaten Your Supply Chain
Learn how external resources in packages can threaten your supply chain security, & discover ways to mitigate these risks to protect your org.