Mend.io Supply Chain Security

Popular JavaScript Library ua-parser-js Compromised via Account Takeover - The Source series

Popular JavaScript Library ua-parser-js Compromised via Account Takeover

Popular JavaScript library ua-parser-js was compromised via account takeover, releasing malicious versions.

Read More
Popular JavaScript Library ua-parser-js Compromised via Account Takeover - Supply Chain zero trust blog

Using Zero Trust to Mitigate Supply Chain Risks

Discover how Zero Trust can help mitigate supply chain risks and enhance your software security.

Read More
Popular JavaScript Library ua-parser-js Compromised via Account Takeover - Supply Chain Security Update How Secure is Composer

Supply Chain Security Update: How Secure is Composer?

Stay updated on supply chain security with our blog post on the vulnerability in Composer. Learn how the issue was detected and fixed.

Read More
Popular JavaScript Library ua-parser-js Compromised via Account Takeover - The Source series

Securing Your Package Manager’s Lockfiles

Learn how to secure your package manager's lockfiles to protect your application from supply chain risks and ensure version consistency.

Read More
Popular JavaScript Library ua-parser-js Compromised via Account Takeover - forrester key takeaway blog

The Forrester Wave™ Software Composition Analysis, Q3 2021: Key Takeaways

Discover key takeaways from The Forrester Wave™ Software Composition Analysis, Q3 2021 report.

Read More
Popular JavaScript Library ua-parser-js Compromised via Account Takeover - The Source series

How Packages’ External Resources Threaten Your Supply Chain

Learn how external resources in packages can threaten your supply chain security, & discover ways to mitigate these risks to protect your org.

Read More
Popular JavaScript Library ua-parser-js Compromised via Account Takeover - Pride Blog 01 1

Celebrating Pride: LGBTQ+ Open Source Projects and Programs We Love

Celebrate Pride with Mend's favorite LGBTQ+ open source projects and programs. Join the movement for equality & inclusivity in tech comunity

Read More
Popular JavaScript Library ua-parser-js Compromised via Account Takeover - Maven Vulnerability blog 1

Research Shows Over 100,000 Libraries Affected By Maven Vulnerability CVE-2021-26291

Research reveals over 100,000 libraries affected by Maven vulnerability CVE-2021-26291. Learn about the risks, fixes, and implications.

Read More
Popular JavaScript Library ua-parser-js Compromised via Account Takeover - The Source series

Supply Chain Security — 10 Tips That Won’t Slow Development Down

Learn how to protect your software development process from supply chain attacks with these 10 tips that won't slow down your development.

Read More
Popular JavaScript Library ua-parser-js Compromised via Account Takeover - Supply chian executive order

Biden’s Cybersecurity Executive Order Focuses on Supply Chain Attacks

Learn about Biden's Cybersecurity Executive Order focused on supply chain attacks & how Mend can help developers create more secure software.

Read More
Popular JavaScript Library ua-parser-js Compromised via Account Takeover - The Source series

Three New Supply Chain Attack Methods You Should Be Aware Of

Learn about Imposter Library, Brandjacking, and Security Research Smokescreen methods. Stay informed on the latest supply chain attack methods.

Read More
Popular JavaScript Library ua-parser-js Compromised via Account Takeover - supply chain management1 1

Overcoming Software Supply Chain Risk

Discover how to overcome software supply chain risk in the development landscape. Gain control and visibility over your software components.

Read More
Popular JavaScript Library ua-parser-js Compromised via Account Takeover - diffend

Welcome to Mend, Diffend!

Mend welcomes Diffend, an innovative software supply chain security service, to improve open source risk management.

Read More
Popular JavaScript Library ua-parser-js Compromised via Account Takeover - aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzYwMmU1Njg5MzE4MGMucG5nJnZlcnNpb249MDAwMCZzaWc9ODc0ZGYzNmEwYTI0MmJjY2Y2OGRkZGY1ZTQ0ZjEyZGU

Software Supply Chain Attacks

Discover the dangers of software supply chain. Learn how they work, why they are so dangerous, and how to strengthen them.

Read More

AI Security & Compliance Assessment

Map your maturity against the global standards. Receive a personalized readiness report in under 5 minutes.