Mend.io Blog

Poisoned axios: npm account takeover, 50 million downloads, and a rat that vanishes after install

Poisoned Axios: npm Account Takeover, 50 Million Downloads, and a RAT That Vanishes After Install

LATEST
Learn more

Filter & Search

A brief guide to cloud-native applications, technology, and security  - a brief guide to cloud native applications technology and security 1

A Brief Guide to Cloud-Native Applications, Technology, and Security 

A comprehensive guide to cloud-native applications, technology, and security. Learn about containers, microservices, CI/CD, and more.

Read More Read More
A brief guide to cloud-native applications, technology, and security  - pride month blog blog image

Pride 2022: Supporting LGBTQ+ in Tech 

Celebrate Pride 2022 with Mend as we support LGBTQ+ in tech. Hear from employees on their experiences and advice for the tech workplace.

Read More Read More
A brief guide to cloud-native applications, technology, and security  - six steps to achieve zero trust in application security

Six Steps to Achieve Zero Trust in Application Security

Discover six key steps to achieve zero trust in application security. Learn how to protect your organization from cyberattacks.

Read More Read More
A brief guide to cloud-native applications, technology, and security  - npm massive dependency confusion attack

Single Author Uploaded 168 Packages to npm as Part of a Massive Dependency Confusion Attack

Discover how a single author uploaded 168 malicious npm packages in a dependency confusion attack. Learn how Mend blocked these threats.

Read More Read More
A brief guide to cloud-native applications, technology, and security  - blog blog image

3 Critical Best Practices of Software Supply Chain Security

Learn about the 3 critical best practices of software supply chain security to protect your organization from malicious packages.

Read More Read More
A brief guide to cloud-native applications, technology, and security  - 3 new github features to boost your security 1 1

3 New GitHub Features to Reinforce Your Code, Repo, and Dependency Security

Learn about the latest GitHub features to enhance your code security and dependency management. Stay ahead of vulnerabilities.

Read More Read More
A brief guide to cloud-native applications, technology, and security  - cloud architecture security

Cloud Security Architecture: A Practical Guide

Learn about Cloud Security Architecture. Understand the importance, core principles, and threats to secure your cloud environment effectively.

Read More Read More
A brief guide to cloud-native applications, technology, and security  - integration of diffend via artifactory plugin

Introducing Mend Supply Chain Defender Integration with JFrog Artifactory

Discover how Mend Supply Chain Defender integrates with JFrog Artifactory to block malicious software threats in your code base.

Read More Read More
A brief guide to cloud-native applications, technology, and security  - brand announce navy 1920 1080 scaled 1

From WhiteSource to Mend—A Rebrand Journey

From WhiteSource to Mend—A Rebrand Journey. Follow our evolution from open source to all code application security.

Read More Read More
A brief guide to cloud-native applications, technology, and security  - brand announce navy 1920 1080 scaled 1

WhiteSource is Now Mend: You Code, We Cure

Mend, formerly WhiteSource, focuses on automating application security with a remediation-first approach for open source and custom code.

Read More Read More
A brief guide to cloud-native applications, technology, and security  - vulnerability remediation a practical guide

Vulnerability Remediation: A Practical Guide

Practical guide to vulnerability remediation for developers & security teams. Learn how to detect, prioritize, fix, & monitor vulnerabilities.

Read More Read More
A brief guide to cloud-native applications, technology, and security  - blog

New Typosquatting Attack on npm Package ’colors’ Using Cross language Technique Explained

Discover the latest typosquatting attack on the npm package 'colors' using a cross-language technique.

Read More Read More
A brief guide to cloud-native applications, technology, and security  - rubygems critical cve 2022 29176

Impact Analysis: RubyGems Critical CVE-2022-29176 Unauthorized Package Takeover 

Impact Analysis of RubyGems Critical CVE-2022-29176 Unauthorized Package Takeover. Learn about the vulnerability, impact assessment, and more

Read More Read More
A brief guide to cloud-native applications, technology, and security  - what is the nist supply chain risk management program

What is the NIST Supply Chain Risk Management Program?

Discover the NIST Supply Chain Risk Management Program.. Learn how to manage cybersecurity risks in digital supply chains effectively.

Read More Read More
A brief guide to cloud-native applications, technology, and security  - blog why vulnerability management must go beyond cvss to priority scoring

Why Vulnerability Management Must Go Beyond CVSS to Priority Scoring

Learn why vulnerability management must go beyond CVSS to priority scoring for better open source security and remediation prioritization.

Read More Read More
A brief guide to cloud-native applications, technology, and security  - news aws target

AWS Targeted by a Package Backfill Attack

Discover how AWS was targeted by a malicious package backfill attack, the methods used by attackers, and how to protect against such attacks.

Read More Read More

Subscribe to our Blog

Never miss a post. Opt-out at any time.

Thank you

You’re all set to receive our latest posts.

AI Security & Compliance Assessment

Map your maturity against the global standards. Receive a personalized readiness report in under 5 minutes.