Mend.io Malicious Packages

polyfill supply chain attack 1

More than 100K sites impacted by Polyfill supply chain attack

The new Chinese owner tampers with the code of cdn.polyfill.io to inject malware targeting mobile devices.

Read More
blog 2 1

Over 100 Malicious Packages Target Popular ML PyPi Libraries

Discover the latest security threat as over 100 malicious packages target popular ML PyPi libraries. Learn about the attack methods.

Read More
what new security threats arise from the boom in ai and llms

What New Security Threats Arise from The Boom in AI and LLMs?

Explore the security threats arising from the boom in AI and LLMs, including data privacy, misinformation, and resource exhaustion.

Read More
what role should dependency management play as the regulation of the software supply chain escalates

What Role Should Dependency Management Play as the Regulation of the Software Supply Chain Escalates?

Discover the importance of dependency management in securing the software supply chain as regulations escalate.

Read More
eight considerations for thwarting malicious packages

8 Considerations for Thwarting Malicious Packages

Learn how to protect your code from malicious packages with these eight considerations. Stay ahead of supply chain security threats.

Read More
what you can do to stop software supply chain attacks

What You Can Do to Stop Software Supply Chain Attacks

Learn how to stop software supply chain attacks with SBOMs, best practices, and prioritizing known vulnerabilities. Protect your software.

Read More
theres a new stealer variant in town and its using electron to stay fully undetected

There’s a New Stealer Variant in Town, and It’s Using Electron to Stay Fully Undetected

Discover the latest threat in town - a new info-stealer variant using Electron to remain undetected. Learn about its attack flow.

Read More
brandjacking

What Risks Do You Run from Brandjacking, and How Do You Overcome Them?

Learn about the risks of brandjacking & how to overcome them with application security tools & practices. Protect your org from cyber threats.

Read More
cybersecurity risks posed by typosquatting and how you can beat them

What Cybersecurity Risks Does Typosquatting Pose, and How Can You Beat Them?

Find out what typosquatting is, why it is such a threat, and what you can do to stop it.

Read More
how does slsa help strengthen software supply chain security

How Does SLSA Help Strengthen Software Supply Chain Security?

Learn how SLSA enhances software supply chain security with levels of protection. Understand the risks, benefits, and best practices.

Read More
understanding the anatomy of a malicious package attack

Understanding the Anatomy of a Malicious Package Attack

Learn to protect your applications from malicious packages with our guide. Understand the anatomy of attacks and how to prevent them.

Read More
whats driving the adoption of sboms and whats

What’s Driving the Adoption of SBOMs? What’s Next for Them?

Discover what's driving the adoption of SBOMs and what's next for them in terms of malicious packages and supply chain security.

Read More
unseen risks of open source dependencies case of an abandoned name e1685538190274

The Unseen Risks of Open Source Dependencies: The Case of an Abandoned Name

Mend.io research discovered a threat actor takeover of the name ‘gemnasium-gitlab-service', a retired Ruby gem with two million+ downloads.

Read More
what are malicious packages blog

What are Malicious Packages? How Do They Work?

Learn about malicious packages, how they work, and the growing threat they pose to software supply chains.

Read More
blog 2 1

Deceptive ‘Vibranced’ npm Package Discovered Masquerading as Popular ‘Colors’ Package

Discover the threat of the 'Vibranced' npm package masquerading as 'Colors'. Learn about its stages of execution, obfuscation techniques.

Read More
Yandex Data Leak Triggers Malicious Package Publication 1

Yandex Data Leak Triggers Malicious Package Publication

Discover how the Yandex data leak triggered malicious package publication, leading to supply chain security risks.

Read More