Mend.io Blog

Npm supply chain attack: sophisticated multi-chain cryptocurrency drainer infiltrates popular packages

NPM Supply Chain Attack: Sophisticated Multi-Chain Cryptocurrency Drainer Infiltrates Popular Packages

LATEST
Learn more

Filter & Search

Npm supply chain attack: sophisticated multi-chain cryptocurrency drainer infiltrates popular packages - npm supply chain attack blog

NPM Supply Chain Attack: Sophisticated Multi-Chain Cryptocurrency Drainer Infiltrates Popular Packages

A sophisticated npm supply chain attack compromised popular packages

Read More Read More
Npm supply chain attack: sophisticated multi-chain cryptocurrency drainer infiltrates popular packages - understanding bias in generative ai blog

Understanding Bias in Generative AI: Types, Causes & Consequences

Learn what bias in generative AI is, its causes, and consequences.

Read More Read More
Npm supply chain attack: sophisticated multi-chain cryptocurrency drainer infiltrates popular packages - generative ai statistics blog

58 Generative AI Statistics to Know in 2025

Explore 58 key generative AI stats for 2025.

Read More Read More
Npm supply chain attack: sophisticated multi-chain cryptocurrency drainer infiltrates popular packages - sbom security key components and use cases blog

SBOM Security: 6 Key Components and Top 3 Use Cases

Discover 6 core components and 3 top use cases of SBOM security.

Read More Read More
Npm supply chain attack: sophisticated multi-chain cryptocurrency drainer infiltrates popular packages - what is an ai bom blog post

What is an AI Bill of Materials (AI BOM)?

Learn how to create and automate an AI BOM.

Read More Read More
Npm supply chain attack: sophisticated multi-chain cryptocurrency drainer infiltrates popular packages - blog graphic gen ai security

What is Generative AI Security?

Learn what generative AI in cybersecurity is and how to secure against threats.

Read More Read More
Npm supply chain attack: sophisticated multi-chain cryptocurrency drainer infiltrates popular packages - blog image hallucinated package attacks 2x

The Hallucinated Package Attack: Slopsquatting

Learn how AI-generated code can lead to fake package installs and attacks.

Read More Read More
Npm supply chain attack: sophisticated multi-chain cryptocurrency drainer infiltrates popular packages - blog a guide to standard sbom formats

What Is A Software Bill of Materials (SBOM) & 4 Critical Benefits

Learn how SBOMs improve transparency, security, and compliance.

Read More Read More
Npm supply chain attack: sophisticated multi-chain cryptocurrency drainer infiltrates popular packages - blog pr forge

Introducing Mend Forge

Explore Mend Forge—Mend.io’s AI-native innovation engine

Read More Read More
Npm supply chain attack: sophisticated multi-chain cryptocurrency drainer infiltrates popular packages - blog cover prompt hardening

What is AI system prompt hardening?

Learn how to protect AI apps with secure prompt hardening techniques.

Read More Read More
Npm supply chain attack: sophisticated multi-chain cryptocurrency drainer infiltrates popular packages - blog graphic deploying gen ai guardrails@2x

Deploying Gen AI Guardrails for Compliance, Security and Trust

Explore AI guardrails for generative AI.

Read More Read More
Npm supply chain attack: sophisticated multi-chain cryptocurrency drainer infiltrates popular packages - blog graphic patch management

Why Patch Management is Important and How to Get It Right

Discover why patch management is one of the most critical and overlooked pillars of application security. Learn how to streamline your patching process and automate it.

Read More Read More
Npm supply chain attack: sophisticated multi-chain cryptocurrency drainer infiltrates popular packages - blog image red teaming tools

Best AI Red Teaming Tools: Top 7 Solutions in 2025

AI Red Teaming tools help teams simulate real life scenarios. They zero in on a more practical question: how does your AI system really behaves.

Read More Read More
Npm supply chain attack: sophisticated multi-chain cryptocurrency drainer infiltrates popular packages - blog what is application security posture management aspm

What Is Application Security Posture Management (ASPM)?

Discover how ASPM improves risk visibility, reduces alert fatigue, and accelerates secure development.

Read More Read More
Npm supply chain attack: sophisticated multi-chain cryptocurrency drainer infiltrates popular packages - blog image what is sca @2x

What is Software Composition Analysis (SCA)?

Learn about Software Composition Analysis (SCA) and how it helps manage open source code to reduce security risks.

Read More Read More
Npm supply chain attack: sophisticated multi-chain cryptocurrency drainer infiltrates popular packages - blog image prompt injection

What Is a Prompt Injection Attack? Types, Examples & Defenses

Learn what prompt injection attacks are and how to defend against 4 key types.

Read More Read More

Subscribe to our Newsletter

Join our subscriber list to get the latest news and updates

Thanks for signing up!