Mend.io Blog

Poisoned axios: npm account takeover, 50 million downloads, and a rat that vanishes after install

Poisoned Axios: npm Account Takeover, 50 Million Downloads, and a RAT That Vanishes After Install

LATEST
Learn more

Filter & Search

Shadow ai: examples, risks, and 8 ways to mitigate them - blog image cover shadow ai

Shadow AI: Examples, Risks, and 8 Ways to Mitigate Them

Uncover the hidden risks of Shadow AI and learn 8 key strategies to address it.

Read More Read More
Shadow ai: examples, risks, and 8 ways to mitigate them - shadow mcp blog graphic

The Growing Challenge of Shadow MCP: Unauthorized AI Connectivity in Your Codebase

MCP adoption is surging across industries, fundamentally reshaping how systems connect to AI models.

Read More Read More
Shadow ai: examples, risks, and 8 ways to mitigate them - application security — the complete guide

Security Testing in 2025: Testing Apps, AI, Cloud Native, and More

Learn about key trends in modern security and the OWASP Top 10.

Read More Read More
Shadow ai: examples, risks, and 8 ways to mitigate them - mitre cve program uncertainty blog

MITRE CVE Program Uncertainty: Mend.io’s commitment to uninterrupted vulnerability protection

Mend.io continues to deliver uninterrupted, multi-source vulnerability protection.

Read More Read More
Shadow ai: examples, risks, and 8 ways to mitigate them - introducing the value dashboard blog post

The Value Dashboard: Measure and Showcase Your Security Impact

Track, measure, and prove your AppSec impact with the Mend.io Value Dashboard.

Read More Read More
Shadow ai: examples, risks, and 8 ways to mitigate them - the top 11 web vulnerability scanners

The Top 11 Web Vulnerability Scanners

Discover the top 11 web vulnerability scanners and learn why they are essential for protecting your web applications from hackers.

Read More Read More
Shadow ai: examples, risks, and 8 ways to mitigate them - mend sast ai remediation graphic

AI Powered Remediation: Mend SAST Performs +46% Better Than Competitors

See how Mend SAST's AI powered automated remediation eliminates vulnerabilities with speed & accuracy.

Read More Read More
Shadow ai: examples, risks, and 8 ways to mitigate them - jetbrains partnership blog

Mend.io and JetBrains Partner to Bring Enhanced Code Security to Developers

Announcing a partnership between Mend.io and JetBrains for IDE and Qodana.

Read More Read More
Shadow ai: examples, risks, and 8 ways to mitigate them - cvss3. 1 vs cvss4 blog

CVSS 3.1 vs CVSS 4.0: A Look at the Data

CVSS base scores are up in the latest version of the scoring system. What does that mean for AppSec practitioners?

Read More Read More
Shadow ai: examples, risks, and 8 ways to mitigate them - backstage plugin announcement blog post

Mend.io – Backstage Integration: Bringing Security Insights Where You Need Them

Backstage offers wide views and controls across the development process and with the Mend.io plugin, deep insights into application risks overall or by project.

Read More Read More
Shadow ai: examples, risks, and 8 ways to mitigate them - benefits of vex for sboms post

Benefits of VEX for SBOMs

SBOMs alone are overwhelming. Learn how VEX adds context, highlighting real threats for efficient risk management.

Read More Read More
Shadow ai: examples, risks, and 8 ways to mitigate them - blog its cybersecurity awareness month lets talk appsec

It‘s Cybersecurity Awareness Month-Let‘s Talk AppSec

October is Cybersecurity Awareness Month. Learn how to protect your software and reduce risks with AppSec tips.

Read More Read More
Shadow ai: examples, risks, and 8 ways to mitigate them - dont treat dast like dessert post

Don’t Treat DAST Like Dessert

DAST is an essential part of a nutritious application security diet—not just a once-a-quarter treat.

Read More Read More
Shadow ai: examples, risks, and 8 ways to mitigate them - power of platform native consolidation in appsec blog

The Power of Platform-Native Consolidation in Application Security

Streamline workflows, consolidate data, boost security posture, and empower developers to focus on innovation.

Read More Read More
Shadow ai: examples, risks, and 8 ways to mitigate them - ai and aws blog 1

What is the KEV Catalog?

A quick guide to the Known Exploited Vulnerabilities (KEV) catalog.

Read More Read More
Shadow ai: examples, risks, and 8 ways to mitigate them - application security the complete guide blog post

What Is Application Security? Types, Tools and Best Practices

Explore our application security complete guide and find key trends, testing methods, best practices, and tools to safeguard your software.

Read More Read More

Subscribe to our Blog

Never miss a post. Opt-out at any time.

Thank you

You’re all set to receive our latest posts.

AI Security & Compliance Assessment

Map your maturity against the global standards. Receive a personalized readiness report in under 5 minutes.