Mend.io Blog

Poisoned axios: npm account takeover, 50 million downloads, and a rat that vanishes after install

Poisoned Axios: npm Account Takeover, 50 Million Downloads, and a RAT That Vanishes After Install

LATEST
Learn more

Filter & Search

The growing challenge of shadow mcp: unauthorized ai connectivity in your codebase - shadow mcp blog graphic

The Growing Challenge of Shadow MCP: Unauthorized AI Connectivity in Your Codebase

MCP adoption is surging across industries, fundamentally reshaping how systems connect to AI models.

Read More Read More
The growing challenge of shadow mcp: unauthorized ai connectivity in your codebase - application security — the complete guide

Security Testing in 2025: Testing Apps, AI, Cloud Native, and More

Learn about key trends in modern security and the OWASP Top 10.

Read More Read More
The growing challenge of shadow mcp: unauthorized ai connectivity in your codebase - top 10 questions about the gpl license answered post

The Top 10 Questions about the GPL License – Answered!

Learn about the GPL License and its compliance requirements.

Read More Read More
The growing challenge of shadow mcp: unauthorized ai connectivity in your codebase - the 2021 owasp top 10 post

What Are OWASP Top 10 Threats & When Will the Top 10 Be Updated?

Stay updated on the latest in application security with the OWASP Top 10 vulnerabilities.

Read More Read More
The growing challenge of shadow mcp: unauthorized ai connectivity in your codebase - red teaming blog graphic

Why AI Red Teaming Is the Next Must-Have in Enterprise Security

Learn why red teaming is key to securing today’s enterprise AI systems.

Read More Read More
The growing challenge of shadow mcp: unauthorized ai connectivity in your codebase - ast security scanning blog post

Application Security Testing: Security Scanning and Runtime Protection Tools

Learn about the differences between security scanning and runtime protection in application security testing. Explore tools and tech.

Read More Read More
The growing challenge of shadow mcp: unauthorized ai connectivity in your codebase - blog image red teaming providers 1

Best AI Red Teaming Providers: Top 5 Vendors in 2025

AI Red Teaming providers are specialized companies that simulate adversarial attacks on AI systems to uncover vulnerabilities, biases, and harmful behaviors before these systems are deployed.

Read More Read More
The growing challenge of shadow mcp: unauthorized ai connectivity in your codebase - blog owasp dependency check

OWASP Dependency Check: How Does It Work?

Learn how OWASP Dependency Check helps secure open source components.

Read More Read More
The growing challenge of shadow mcp: unauthorized ai connectivity in your codebase - blog image top ten tips to choose a great sast tool@2x

Top Ten Tips to Choose a Great SAST Tool

The top ten tips for choosing a SAST tool for application security. Integration, automation, and scalability are key factors to consider.

Read More Read More
The growing challenge of shadow mcp: unauthorized ai connectivity in your codebase - dynamic application security testing dast basics 1

Dynamic Application Security Testing: DAST Basics

Learn about dynamic application security testing (DAST).

Read More Read More
The growing challenge of shadow mcp: unauthorized ai connectivity in your codebase - best ai red teaming companies top 10 providers in 2025@2x

Best AI Red Teaming Companies: Top 10 Providers in 2025

AI Red Teaming companies help software and security teams to better understand how their AI application behaves under adversarial attacks.

Read More Read More
The growing challenge of shadow mcp: unauthorized ai connectivity in your codebase - mend microsoft partnership post

Introducing Mend’s Integration with Microsoft Defender for Cloud

Mend.io now integrates with Microsoft Defender for Cloud, bringing intelligent open source security insights into cloud workflows.

Read More Read More
The growing challenge of shadow mcp: unauthorized ai connectivity in your codebase - blog image red teaming solutions 1

Top AI Red Teaming Solutions and How to Choose

Learn what AI red teaming solutions solve, how they work, and how to choose the right fit.

Read More Read More
The growing challenge of shadow mcp: unauthorized ai connectivity in your codebase - mend and herodevs partnership

Mend.io & HeroDevs Partnership: Eliminate Risks in Deprecated Package

Announcing an exclusive partnership between Mend.io and HeroDevs to provide support for deprecated packages.

Read More Read More
The growing challenge of shadow mcp: unauthorized ai connectivity in your codebase - vector and embedding weakness blog post

Vector and Embedding Weaknesses in AI Systems

Learn how to secure embeddings against poisoning, leakage, and inversion attacks.

Read More Read More
The growing challenge of shadow mcp: unauthorized ai connectivity in your codebase - mitre cve program uncertainty blog

MITRE CVE Program Uncertainty: Mend.io’s commitment to uninterrupted vulnerability protection

Mend.io continues to deliver uninterrupted, multi-source vulnerability protection.

Read More Read More

Subscribe to our Blog

Never miss a post. Opt-out at any time.

Thank you

You’re all set to receive our latest posts.

AI Security & Compliance Assessment

Map your maturity against the global standards. Receive a personalized readiness report in under 5 minutes.