Mend.io Blog

Poisoned axios: npm account takeover, 50 million downloads, and a rat that vanishes after install

Poisoned Axios: npm Account Takeover, 50 Million Downloads, and a RAT That Vanishes After Install

LATEST
Learn more

Filter & Search

White hat hacking – not what you expect - blog pic

White Hat Hacking – Not What You Expect

Discover the world of white hat hacking and the importance of ethical hackers in open source projects.

Read More Read More
White hat hacking – not what you expect - ahviptcynte0jmntzd1pdgvtzwrpdg9yaw1hz2umzmlszw5hbwu9axrlbwvkaxrvcmltywdlxzywmdazzdnmytq4mwmucg5njnzlcnnpb249mdawmczzawc9nddhm2y3ytk4nguynzdjodzmzjm2yjiynzzjmgmzn2e

How to Set Up an Open Source Strategy

Learn how to set up an open source strategy for your software development org. Understand the key considerations, and implementation steps..

Read More Read More
White hat hacking – not what you expect -

CVE (Common Vulnerabilities and Exposures) — What is it and how to understand it

What are CVEs and how are they published? What kind of information do CVEs offer about security vulnerabilities in publicly released software?

Read More Read More
White hat hacking – not what you expect - ahviptcynte0jmntzd1pdgvtzwrpdg9yaw1hz2umzmlszw5hbwu9axrlbwvkaxrvcmltywdlxzvmzjzkytaxnme5otuuanbnjnzlcnnpb249mdawmczzawc9nda0otg1mwq1ndu5odg5odhlmdy2mwrjzdkwmzdhyzq

The 10 Best Security Conferences to Attend in 2021

Discover the top 10 security conferences to attend in 2021, whether in-person or virtually.

Read More Read More
White hat hacking – not what you expect -

What You Need To Know About Application Security Testing Orchestration

Discover the importance of Appsec Testing Orchestration in the evolving security threat landscape. Learn how to manage tools effectively.

Read More Read More
White hat hacking – not what you expect - docker

Comparing Docker Images To Docker Containers

Learn the differences between Docker images and containers. Understand how Docker revolutionizes containerization technology.

Read More Read More
White hat hacking – not what you expect - ahviptcynte0jmntzd1pdgvtzwrpdg9yaw1hz2umzmlszw5hbwu9axrlbwvkaxrvcmltywdlxzvizju0mjhkm2q3ztiuanbnjnzlcnnpb249mdawmczzawc9zjjhodzkndnjotnlnde1ymu0ndnizjyzyje5mjkyogi

Apache Struts Vulnerabilities Pose ‘Stay or Go’ Question

Stay informed about the latest Apache Struts vulnerabilities and the ongoing debate of whether to continue using the framework or migrate off it.

Read More Read More
White hat hacking – not what you expect - merge confidence blog

Get to know Mend Merge Confidence Feature

Introducing Mend Merge Confidence, a feature to save time and reduce risk in updating dependencies. Learn how it works and more.

Read More Read More
White hat hacking – not what you expect - ahviptcynte0jmntzd1pdgvtzwrpdg9yaw1hz2umzmlszw5hbwu9axrlbwvkaxrvcmltywdlxzvky2q0owviyznjymyucg5njnzlcnnpb249mdawmczzawc9nzrjmdizmje1ogyzzwy2zja2ywm5yja5yzlizdzjzmi

What Is CVSS v3.1? Understanding The New CVSS

Learn about the Common Vulnerability Scoring System (CVSS) v3.1 & how it measures severity, not risk, in assessing security vulnerabilities.

Read More Read More
White hat hacking – not what you expect -

White Box Testing Guide

Learn about White Box Testing in software development with this comprehensive guide. Understand the types, techniques, tools, advantages.

Read More Read More
White hat hacking – not what you expect - bsd screen

Top 8 BSD License’s Questions Answered

Get answers to the top 8 BSD License questions in this blog. Learn about the terms, compatibility with GPL, copyleft status, and more.

Read More Read More
White hat hacking – not what you expect - ahviptcynte0jmntzd1pdgvtzwrpdg9yaw1hz2umzmlszw5hbwu9axrlbwvkaxrvcmltywdlxzvmotljm2jhyti3zjmucg5njnzlcnnpb249mdawmczzawc9mzvkywu4mje4yjiynmjknzi5ogjjmgfjymy2ztqzotg

SCA vs SBOM: Getting Started With Software Composition Analysis

Top tips for starting with a software composition analysis solution. Build a team, set goals beyond scanning, understand the data model, make policies work, start small.

Read More Read More
White hat hacking – not what you expect - top open source licenses

Open Source Copyleft Licenses: All You Need to Know

All you need to know about Open Source Copyleft Licenses. Learn about the history, benefits, and considerations of using copyleft licenses.

Read More Read More
White hat hacking – not what you expect - how to expose ports in docker post

How to Expose Ports in Docker

Learn how to expose ports in Docker with different networking rules. Understand the differences between EXPOSE, --expose, -P, and -p flags.

Read More Read More
White hat hacking – not what you expect - vulnerability prioritization image blog

Be Wise — Prioritize: Software Security Vulnerability Prioritization

Learn how to prioritize software security vulnerabilities effectively to ensure your team is addressing the most urgent threats first.

Read More Read More
White hat hacking – not what you expect -

Eclipse SW360: Main Features

Learn about the main features of Eclipse SW360, an open source tool to manage software components.

Read More Read More

Subscribe to our Blog

Never miss a post. Opt-out at any time.

Thank you

You’re all set to receive our latest posts.

AI Security & Compliance Assessment

Map your maturity against the global standards. Receive a personalized readiness report in under 5 minutes.