What New Security Threats Arise from The Boom in AI and LLMs?
Learn about the big threats that come with AI and LLM technology.
Read about application security, DevSecOps, license compliance, and software supply chain security.
Learn about the big threats that come with AI and LLM technology.
Incorporate security into your development processes. Set your developers up for security success with these tips.
Learn what the latest research says about why application security programs struggle and what you can do to strengthen your AppSec.
Discover why and how dependency management has become more significant as regulation and governance of the software supply chain escalates.
Discover eight key considerations to help you thwart the escalating threat of malicious packages and secure your software and applications.
Learn more about the growing threat of malicious packages in this webinar with Jeanette Sherman, Sr. Product Marketing Manager - Mend.io.
Discover the best practices you can employ to strengthen your software supply chain security.
See the attack flow of this new info-stealer Mend.io detected and how it can stay undetected by abusing trusted development tools like Electron.
What is brandjacking, why is it such a threat, and what role do AppSec security practices play in thwarting it?
Find out what typosquatting is, why it is such a threat, and what you can do to stop it.
Join Rhys Arkins, Vice President of Product Management – Mend.io in this panel of application and software security experts as they discuss strategies for addressing the malicious packages threat vector.
In addition to the growing number of vulnerabilities, today’s security teams face the emerging challenge of malicious packages. Learn how to secure your applications with this White Paper.
Find out what SLSA is and how it contributes to software supply chain security.
Join VP of Product Management, Jeff Martin and Principal Product Architect, Maciej Mensfeld as they dig into the findings from the Mend Malicious Packages Special Report.
Learn why malicious packages are a growing threat to application security, how they work, and what you can do to stop them
Discover two of the key drivers behind the demand and adoption of SBOMs: technical and legislative.
Mend.io research discovered a threat actor takeover of the name ‘gemnasium-gitlab-service', a retired Ruby gem with more than two million downloads. Existing projects that haven't updated their dependencies might unwittingly pull in this new version, assuming it's a continuation of the original. Given that the new gem is now controlled by an unknown entity, it could be altered to include malicious code or to perform undesirable actions.
Open source code package repositories allow anyone to store or publish packages, and unfortunately that can include packages containing malware. These are known as malicious packages. Read on to learn about what they are and how they work.
A new malicious package named 'Vibranced' has been detected on the Node Package Manager (npm) repository and poses a significant threat to users who may unknowingly install it. The package has been carefully crafted to mimic the popular ‘colors’ package.
Download this report to see why malicious packages are a growing threat.
Research from Mend.io’s new Malicious Packages Special Report: Attacks Move Beyond Vulnerabilities illustrates the growing threat of malicious packages, including a 315 percent increase in attacks from 2021 to 2022.
Discover how integrating AppSec into your repository, like Bitbucket Cloud, can improve and simplify your application security.
Learn about the risks posed by leaked code and malicious packages at Russian tech giant Yandex.
Download this free infographic for a quick overview of the Mend.io Open Source Risk Report results.
Mend researchers identify a new type of malicious code that deletes directories.
Our team detected an attack on npm packages that utilized typosquatting to compromise nearly 300 NPM packages.
Over the past three days, the Mend research team identified two separate attacks that published malicious packages to npm: reverse remote shell as part of typosquatting attack on the popular ‘cors’ package, and an ATO attack on the “Just Eat” organization.
Mend Research uncovered an unusual attack in RubyGems that exploited a previously existing package with a significant number of downloads to launch a typosquatting attack.
Another week, another supply chain incident. It’s been only nine days since the Mend research team detected the dYdX incident, and today we have detected another supply chain malicious campaign.
San Francisco-based dYdX, a widely used decentralized crypto exchange with roughly $1 billion in daily trades, has had its NPM account hacked in a software supply chain attack detected by Mend Supply Chain Defender
By comparing current malicious package trends with malware’s evolution over the past 20 years, we can predict a likely future direction for malicious packages.
The Mend research team analyzes a malicious package in which the harmful code is not only in a JSON file, but is also fully encrypted.
Discover why npm is susceptible to RCE, why it’s such a serious threat, the characteristics of RCE in npm, what should be done to stop it, and how Mend Supply Chain Defender achieves this.
Monero (XMR) is an open-source, privacy-oriented cryptocurrency that was launched in 2014. It uses a public distributed ledger containing technology that obscures transaction details to ensure the anonymity of its users. Monero maintains egalitarian mining, allowing anyone to participate. As tempting as it may seem, some go a step further and use the infrastructure of...
Mend Supply Chain Defender reported and blocked a massive dependency confusion attack involving a single author uploading 168 packages to npm.
Understand how software supply chains work in large enterprises, discover the most important elements of software supply chain management, and how Mend can address them.