Mend.io Blog

Poisoned axios: npm account takeover, 50 million downloads, and a rat that vanishes after install

Poisoned Axios: npm Account Takeover, 50 Million Downloads, and a RAT That Vanishes After Install

LATEST
Learn more

Filter & Search

5 vulnerability assessment scanning tools: 5 solutions compared - blog image 2 assessment tools

5 Vulnerability Assessment Scanning Tools: 5 Solutions Compared

Discover the top 5 vulnerability assessment scanning tools and learn how to prioritize and remediate vulnerabilities to secure your org.

Read More Read More
5 vulnerability assessment scanning tools: 5 solutions compared - spring4shell best practices

Get the Response to Spring4Shell Right: Best Practices for Immediate Remediation

Learn best practices for immediate remediation of the Spring4Shell vulnerability, including detection, and prioritization.

Read More Read More
5 vulnerability assessment scanning tools: 5 solutions compared - spring4shell fdt blog

Spring4Shell: What to Expect and How to Prepare

Learn about the Spring4Shell vulnerability (CVE-2022-22965), its potential impact, and how to prepare your Java applications.

Read More Read More
5 vulnerability assessment scanning tools: 5 solutions compared - automated software supply chain attacks

Automated Software Supply Chain Attacks: Should You be Worried?

Learn why automated software supply chain attacks are a growing threat. Discover how to protecting your org from malicious NPM packages.

Read More Read More
5 vulnerability assessment scanning tools: 5 solutions compared -

Spring4Shell Zero-Day Vulnerability: Information and Remediation for CVE-2022-22965

Learn about the Spring4Shell Zero-Day Vulnerability CVE-2022-22965 with information, updates, mitigation guidance, and more.

Read More Read More
5 vulnerability assessment scanning tools: 5 solutions compared - set a benchmark of false positives with sast tools

How To Set A Benchmark Of False Positives With SAST Tools

Learn how to set benchmarks for false positives in SAST tools to enhance application security and improve developer efficiency.

Read More Read More
5 vulnerability assessment scanning tools: 5 solutions compared - blog how to address sast false positives in application security testing

How To Address SAST False Positives In Application Security Testing

Address SAST false positives in your application security testing. Explore causes, preventive measures, and the benefits of using Mend SAST.

Read More Read More
5 vulnerability assessment scanning tools: 5 solutions compared - how to mitigate ruby supply chain security risks

Best Practices For Managing Ruby Supply Chain Security Risks

Understand the types of Ruby supply chain attacks. Learn the best practices for preventing supply chain security risks in your Ruby projects.

Read More Read More
5 vulnerability assessment scanning tools: 5 solutions compared - supply chain risk managment guide

A Guide To Implementing Software Supply Chain Risk Management

Learn how to implement software supply chain risk management to safeguard your critical assets. Discover best practices, & more.

Read More Read More
5 vulnerability assessment scanning tools: 5 solutions compared - sast blogs banners blog image

SAST vs. SCA: 7 Key Differences

Discover the 7 key differences between SAST and SCA tools in application security. Learn how they integrate into the SDLC process.

Read More Read More
5 vulnerability assessment scanning tools: 5 solutions compared - sast blog hero

Mend SAST: The Next Generation of Application Security

Learn about our innovative approach to detecting and remediating custom code vulnerabilities for a more secure future.

Read More Read More
5 vulnerability assessment scanning tools: 5 solutions compared - five critically important facts about npm package security

Five Critically Important Facts About npm Package Security

Learn about the five critical facts about npm package security, including how attackers exploit trust, default behaviors, and dependency hell.

Read More Read More
5 vulnerability assessment scanning tools: 5 solutions compared - malicious package npm

A Malicious Package Found Stealing AWS AIM data on npm has Similarities To Capital One Hack

Discover how a malicious package found stealing AWS AIM data on npm has similarities to the Capital One hack. Learn about the threat.

Read More Read More
5 vulnerability assessment scanning tools: 5 solutions compared - cve 2021 44142 vulnerability 2

CVE-2021-44142: Vulnerability in Samba Enables Bad Actors to Execute Arbitrary Code as Root

CVE-2021-44142 allows bad actors to execute arbitrary code as root on Samba. Learn about the vulnerability, exploit, and how to fix it.

Read More Read More
5 vulnerability assessment scanning tools: 5 solutions compared - cve 2021 4034 pwnkit

CVE-2021-4034: A Walkthrough of Pwnkit — the Latest Linux Privileges Escalation Vulnerability

Dive into CVE-2021-4034 PwnKit vulnerability: learn how a simple out-of-bounds access in Linux's pkexec can lead to root system privileges.

Read More Read More
5 vulnerability assessment scanning tools: 5 solutions compared - top open source licenses explained post

Open Source Licenses Trends and Predictions

Open source licenses in 2022. Permissive licenses are on the rise, while copyleft licenses like GPL are decreasing in popularity.

Read More Read More

Subscribe to our Blog

Never miss a post. Opt-out at any time.

Thank you

You’re all set to receive our latest posts.

AI Security & Compliance Assessment

Map your maturity against the global standards. Receive a personalized readiness report in under 5 minutes.