Mend.io Blog

Introducing mend. Io’s ai security dashboard: a clear view into ai risk

Introducing Mend.io’s AI Security Dashboard: A Clear View into AI Risk

LATEST
Learn more

Filter & Search

Top three user priorities for software composition analysis - big blog post

Top Three User Priorities for Software Composition Analysis

Discover the top three user priorities for Software Composition Analysis including application security, DevSecOps, and license compliance.

Read More Read More
Top three user priorities for software composition analysis - openssl alert

Advisory: New OpenSSL Critical Security Vulnerability

Learn about the new OpenSSL critical security vulnerabilities CVE-2022-3786 and CVE-2022-3602. Discover their impact, and protect your systems.

Read More Read More
Top three user priorities for software composition analysis - blog post

A Rash of Recent CVEs in Go

Discover the recent CVEs affecting Go programming language and their impact on popular applications like Docker and Kubernetes.

Read More Read More
Top three user priorities for software composition analysis - blog image 1000x650 1

Modern AppSec Moves Beyond Shift Left to Shift Smart

Discover how modern AppSec is moving beyond just shifting left to shifting smart. Learn key principles for securing applications.

Read More Read More
Top three user priorities for software composition analysis - blog rubygems vulnerabilities

To use rest_client, or to use rest-client, that is the question

Discover the risks of using rest_client versus rest-client in RubyGems. Learn how a recent attack was thwarted.

Read More Read More
Top three user priorities for software composition analysis - 1000x650 blog image

Vulnerability Research: Here’s How it Works at Mend.io 

Discover how vulnerability research works at Mend, a focus on open source vulnerabilities and different methods to protect against threats.

Read More Read More
Top three user priorities for software composition analysis - the six golden rules for you to follow to improve your software and application security 2

Six Golden Rules for Software and Application Security

Learn the six golden rules for software and application security.. Stay safe during Cybersecurity Awareness Month 2022!

Read More Read More
Top three user priorities for software composition analysis - npm massive dependency confusion attack

Cybercriminals targeted users of packages with a total of 1.5 billion weekly downloads on npm

Stay informed about the latest supply chain security incident targeting npm users. Learn about the malicious packages and more.

Read More Read More
Top three user priorities for software composition analysis - npm massive dependency confusion attack

Popular Cryptocurrency Exchange dYdX Has Had Its NPM Account Hacked

dYdX, a popular cryptocurrency exchange, had its NPM account hacked in a supply chain attack. Learn how to protect against similar attacks.

Read More Read More
Top three user priorities for software composition analysis - php 1

Typosquatting Malware Found in Composer Repository

Protect your PHP applications from typosquatting malware found in Composer Repository. Learn how attackers exploit vulnerabilities.

Read More Read More
Top three user priorities for software composition analysis - 1000x650 2

Mend API Helps Make SBOMs Simple

Learn how Mend API simplifies the creation of SBOMs for better supply chain security. Stay ahead in DevSecOps with our automated tool.

Read More Read More
Top three user priorities for software composition analysis - cloud native apps

Cloud-Native Applications and Managing Their Dependencies

Learn how to manage dependencies in cloud-native applications efficiently. Explore best practices & tools to ensure & up-to-date software

Read More Read More
Top three user priorities for software composition analysis - todays security tidbit an encrypted json file containings malicious code

Today’s Security Tidbit: An Encrypted JSON File Containing Malicious Code

Discover how encrypted JSON files are being used to hide malicious code. Learn about the latest security findings and how to protect your apps.

Read More Read More
Top three user priorities for software composition analysis - how to conquer remote code execution rce in npm

How to Conquer Remote Code Execution (RCE) in npm

Learn how to conquer Remote Code Execution (RCE) attacks in npm. Find out why npm is susceptible, the threats of RCE, and more.

Read More Read More
Top three user priorities for software composition analysis - how to easily update node. Js to the latest version

How to Easily Update Node.js to the Latest Version

Learn how to easily update Node.js to the latest version on macOS, Linux, & Windows.

Read More Read More
Top three user priorities for software composition analysis - learn how to update docker images containers easily and quickly

Update Docker Images & Containers To Latest Version

Learn how to efficiently update Docker images and containers to the latest version for improved security and performance.

Read More Read More

Subscribe to our Newsletter

Join our subscriber list to get the latest news and updates

Thanks for signing up!