Mend.io Blog

Poisoned axios: npm account takeover, 50 million downloads, and a rat that vanishes after install

Poisoned Axios: npm Account Takeover, 50 Million Downloads, and a RAT That Vanishes After Install

LATEST
Learn more

Filter & Search

16 women paving the way in appsec - ahviptcynte0jmntzd1pdgvtzwrpdg9yaw1hz2umzmlszw5hbwu9axrlbwvkaxrvcmltywdlxzvlnjrmmzi4mzm1y2uucg5njnzlcnnpb249mdawmczzawc9oweznjhmzddmowe0njblmtvimza5ndizzwvhnjmwmjk

16 Women Paving the Way in AppSec

Discover 16 women leaders in the field of Application Security who are paving the way for progress and innovation.

Read More Read More
16 women paving the way in appsec - ahviptcynte0jmntzd1pdgvtzwrpdg9yaw1hz2umzmlszw5hbwu9axrlbwvkaxrvcmltywdlxzvkodm0ogrjztzkn2iucg5njnzlcnnpb249mdawmczzawc9zjrmnda4ndq0njy0otcyy2u1mzyzogu2zde1ytnmnje

Security Advisories Play a Critical Role in Keeping Our Software Safe

Learn about security advisories. Discover popular advisories like Microsoft Security, National Vulnerability Database, and Apache Security.

Read More Read More
16 women paving the way in appsec - ahviptcynte0jmntzd1pdgvtzwrpdg9yaw1hz2umzmlszw5hbwu9axrlbwvkaxrvcmltywdlxzvjnme3owjkmdc3zjguanbnjnzlcnnpb249mdawmczzawc9n2u2zwyynti1njk2ythjztnmnju0mtq5zmvjn2jlmzg

Experience over Best Practices- Interview with CyberArk’s WhiteHat Hacker Len Noe

Interview with CyberArk’s WhiteHat Hacker Len Noe. Learn how hackers switch to become white hat hackers for the public good.

Read More Read More
16 women paving the way in appsec - top 15 appsec experts to follow 1

Top 15 Security Experts to Follow on Twitter

Discover the top 15 security experts to follow on Twitter for the latest updates on application security. Engage with thought leaders.

Read More Read More
16 women paving the way in appsec - serverless security

What Risks Does Serverless Computing Pose to Your Application Security?

Explore the risks of serverless computing on application security. Learn how to navigate security concerns in the digital world.

Read More Read More
16 women paving the way in appsec - bug bounty

3 Million Reasons Bug Bounty Programs are a Win-Win

Explore how bug bounty programs offer a win-win for cybersecurity, enabling companies to leverage global talent for robust app security.

Read More Read More
16 women paving the way in appsec - single page application

5 (Practical) Tips to Help You Secure Your Single Page Application

What is A Single Page Application Jeff Nibler describes Single Page Applications (SPAs) as the latest evolution in web application design. With SPAs, various JavaScript libraries and tools such as...

Read More Read More
16 women paving the way in appsec - misra iso 26262 1

MISRA and ISO 26262: Compliance Is Key to Security

Discover the importance of compliance with MISRA and ISO 26262 standards for security in the transportation industry.

Read More Read More
16 women paving the way in appsec - new mysql

Critical MySQL Database Vulnerability Puts Your Data at Risk

Critical MySQL database vulnerability puts your data at risk. Learn about its specifications, and steps for remediation and mitigation.

Read More Read More
16 women paving the way in appsec - android security 2

What You Don’t Know About Android Application Security…

Discover the latest in Android application security threats and solutions. Learn how to protect yourself and your users from potential risks.

Read More Read More
16 women paving the way in appsec - development life cycle post

Application Lifecycle Management — 5 Common Pitfalls to Avoid

Learn how to avoid common pitfalls in Application Lifecycle Management (ALM) to ensure project success.

Read More Read More

Subscribe to our Blog

Never miss a post. Opt-out at any time.

Thank you

You’re all set to receive our latest posts.

AI Security & Compliance Assessment

Map your maturity against the global standards. Receive a personalized readiness report in under 5 minutes.