Yandex Data Leak Triggers Malicious Package Publication
Learn about the risks posed by leaked code and malicious packages at Russian tech giant Yandex.
Read about application security, DevSecOps, open source license compliance and audit
Learn about the risks posed by leaked code and malicious packages at Russian tech giant Yandex.
Introducing an article in Forbes by Mend CEO Rami Sass, focusing on how application security requires ongoing awareness, effort and investment, buy-in from executive leadership, and the inculcation of a security-aware culture within every organization.
Discover why cloud-native environments are vulnerable, two of the main risks, and how to address them.
Discover the threats, opportunities, and challenges of building a modern application security strategy.
Increase your knowledge of open source licenses by learning what the main types are, how they work, and how they differ.
What’s the modern approach to SAST, why is it different, and how does it optimize your organization’s code, software, and application security?
Part two of three blogs in a series that focuses on the challenges, opportunities and solutions for software and application security in banking and fintech.
Mend’s new Open Source Risk Report delves into the significant risk posed by the ongoing rise in open source vulnerabilities and software supply chain attacks.
Experts from Mend, FINOS, the Linux Foundation and Morgan Stanley discuss the challenges and opportunities of software and application security in banking and fintech. Part one of three.
Kubernetes is widely used but comes with security risks. Discover what these risks are, how they can be exploited, how to define and implement security for Kubernetes configurations, and how to protect Kubernetes applications.
Mend researchers identify a new type of malicious code that deletes directories.
Several Mend experts offer insight into what they expect to see in 2023 – and some ideas on how to prepare.
Open source license management has become so important that governments are seeking to mandate it.
Learn how to build a compelling case for buying a software composition analysis (SCA) tool in your organization.
Attacks targeting the software supply chain are on the rise. Learn why an SBOM is vital to Application Security and Compliance.
All about application security - why is the application layer the weakest link, and how to get application security right.
Our team detected an attack on npm packages that utilized typosquatting to compromise nearly 300 NPM packages.
Discover the top ten application security best practices to safeguard your applications and minimize the impact of vulnerabilities.
While detecting vulnerabilities is important, you also need to know the ones that pose the highest risk to your business. Learn why prioritizing vulnerabilities is vital to effective application security, the key considerations when prioritizing, and what an effective prioritization process looks like.
How can you get the most value from your SAST tool, and what should it include to maximize the value you derive from it?
Discover what steps you can take to safeguard your code base, your software, and your applications from zero-day attacks.
Mend’s new Open Source Risk Report delves into the significant risk posed by the ongoing rise in open source vulnerabilities and software supply chain attacks.
Updating software dependencies is vital to software and application security, but there are challenges. Learn the risks associated with updating dependencies, why they occur, and how you can address them.
Recent high-profile software supply chain breaches have sharpened the focus on application security. However, as cybersecurity professionals know all too well, concern doesn’t always equate to action. In theory, the rise of DevSecOps best practices that shift responsibility for application security further left should reduce, or outright eliminate, the vulnerabilities that now routinely make it...
The modern AppSec approach includes strategies and technologies that help teams prioritize. By giving them tools that efficiently identify security vulnerabilities that present the biggest risk, they can address them as quickly as possible. Learn how you can implement these strategies in a fireside chat with the experts from Amazon Web Services (AWS) and Mend....
Until recently, application security testing was cumbersome and time-consuming. Now, enterprises using Azure DevOps Repos can add automated application security testing directly to the repo. This DevSecOps approach combines convenience for developers along with features that security professionals want such as centralized deployment, management and policy enforcement. If your organization uses Azure DevOps, attend this...
Building a modern application security program requires a robust DevSecOps environment built on collaboration. For many companies, that means shifting away from IT silos towards a shared-responsibility mindset regarding security across the organization.
The Renovate open source project for automating dependency update hit some big Github milestones, so we put together a little appreciation for our favorite dependency update bot.
Cloud-native applications are at particular risk from vulnerabilities in their code. Discover why and how you should assess these risks in order to reinforce your security.
Over the past three days, the Mend research team identified two separate attacks that published malicious packages to npm: reverse remote shell as part of typosquatting attack on the popular ‘cors’ package, and an ATO attack on the “Just Eat” organization.
Attacks on software supply chains have greatly accelerated the rate at which organizations are now embracing DevSecOps best practices to secure both legacy monolithic and emerging cloud-native applications. Adopting a DevSecOps approach can help maintain the speed of application development and deployment while ensuring the security and stability of applications. But the range of technologies...
Mend SCA available as an action within new DevOps service, Amazon CodeCatalyst
Learn what shift left testing means, how it can save you time and costs, and why you need to shift left your open source components’ management.
Why is integrating dependency management into cloud services so important, how do you manage dependencies better, and what does Mend do with Amazon Web Services (AWS) to help you achieve this?
Mend’s new integration with Bitbucket Cloud brings smart, automated risk reduction to DevOps teams with ultra-fast rollouts and 100 percent adoption rates.
Learn why teams that pay attention to governance by using a CSIRP are more successful at combating the continued growth of cyberattacks.