Mend.io Blog

You can’t rely on open source for security — not even when ai is involved

You can’t rely on open source for security — not even when AI is involved

LATEST
Learn more

Filter & Search

Six golden rules for software and application security - the six golden rules for you to follow to improve your software and application security 2

Six Golden Rules for Software and Application Security

Learn the six golden rules for software and application security.. Stay safe during Cybersecurity Awareness Month 2022!

Read More Read More
Six golden rules for software and application security - npm massive dependency confusion attack

Cybercriminals targeted users of packages with a total of 1.5 billion weekly downloads on npm

Stay informed about the latest supply chain security incident targeting npm users. Learn about the malicious packages and more.

Read More Read More
Six golden rules for software and application security - npm massive dependency confusion attack

Popular Cryptocurrency Exchange dYdX Has Had Its NPM Account Hacked

dYdX, a popular cryptocurrency exchange, had its NPM account hacked in a supply chain attack. Learn how to protect against similar attacks.

Read More Read More
Six golden rules for software and application security - php 1

Typosquatting Malware Found in Composer Repository

Protect your PHP applications from typosquatting malware found in Composer Repository. Learn how attackers exploit vulnerabilities.

Read More Read More
Six golden rules for software and application security - 1000x650 2

Mend API Helps Make SBOMs Simple

Learn how Mend API simplifies the creation of SBOMs for better supply chain security. Stay ahead in DevSecOps with our automated tool.

Read More Read More
Six golden rules for software and application security - cloud native apps

Cloud-Native Applications and Managing Their Dependencies

Learn how to manage dependencies in cloud-native applications efficiently. Explore best practices & tools to ensure & up-to-date software

Read More Read More
Six golden rules for software and application security - todays security tidbit an encrypted json file containings malicious code

Today’s Security Tidbit: An Encrypted JSON File Containing Malicious Code

Discover how encrypted JSON files are being used to hide malicious code. Learn about the latest security findings and how to protect your apps.

Read More Read More
Six golden rules for software and application security - how to conquer remote code execution rce in npm

How to Conquer Remote Code Execution (RCE) in npm

Learn how to conquer Remote Code Execution (RCE) attacks in npm. Find out why npm is susceptible, the threats of RCE, and more.

Read More Read More
Six golden rules for software and application security - how to easily update node. Js to the latest version

How to Easily Update Node.js to the Latest Version

Learn how to easily update Node.js to the latest version on macOS, Linux, & Windows.

Read More Read More
Six golden rules for software and application security - learn how to update docker images containers easily and quickly

Update Docker Images & Containers To Latest Version

Learn how to efficiently update Docker images and containers to the latest version for improved security and performance.

Read More Read More
Six golden rules for software and application security - myths and facts of application testing with sast security tools blog image

Three Big Myths About Application Testing With SAST Tools

Discover the truth about Application Testing with SAST. Learn about common myths, integration, and reducing false positives for security.

Read More Read More
Six golden rules for software and application security - a brief guide to cloud native applications technology and security 1

A Brief Guide to Cloud-Native Applications, Technology, and Security 

A comprehensive guide to cloud-native applications, technology, and security. Learn about containers, microservices, CI/CD, and more.

Read More Read More
Six golden rules for software and application security - pride month blog blog image

Pride 2022: Supporting LGBTQ+ in Tech 

Celebrate Pride 2022 with Mend as we support LGBTQ+ in tech. Hear from employees on their experiences and advice for the tech workplace.

Read More Read More
Six golden rules for software and application security - six steps to achieve zero trust in application security

Six Steps to Achieve Zero Trust in Application Security

Discover six key steps to achieve zero trust in application security. Learn how to protect your organization from cyberattacks.

Read More Read More
Six golden rules for software and application security - npm massive dependency confusion attack

Single Author Uploaded 168 Packages to npm as Part of a Massive Dependency Confusion Attack

Discover how a single author uploaded 168 malicious npm packages in a dependency confusion attack. Learn how Mend blocked these threats.

Read More Read More
Six golden rules for software and application security - blog blog image

3 Critical Best Practices of Software Supply Chain Security

Learn about the 3 critical best practices of software supply chain security to protect your organization from malicious packages.

Read More Read More

Subscribe to our Blog

Never miss a post. Opt-out at any time.

Thank you

You’re all set to receive our latest posts.

AI Security & Compliance Assessment

Map your maturity against the global standards. Receive a personalized readiness report in under 5 minutes.