Malicious Code Deletes Directories If You Do Not Have a License
Discover how malicious code can delete directories if you don't have a license. Learn about supply chain security and license compliance.
To use rest_client, or to use rest-client, that is the question
Discover the risks of using rest_client versus rest-client in RubyGems. Learn how a recent attack was thwarted.
Cybercriminals targeted users of packages with a total of 1.5 billion weekly downloads on npm
Stay informed about the latest supply chain security incident targeting npm users. Learn about the malicious packages and more.
Popular Cryptocurrency Exchange dYdX Has Had Its NPM Account Hacked
dYdX, a popular cryptocurrency exchange, had its NPM account hacked in a supply chain attack. Learn how to protect against similar attacks.
Today’s Security Tidbit: An Encrypted JSON File Containing Malicious Code
Discover how encrypted JSON files are being used to hide malicious code. Learn about the latest security findings and how to protect your apps.
How to Conquer Remote Code Execution (RCE) in npm
Learn how to conquer Remote Code Execution (RCE) attacks in npm. Find out why npm is susceptible, the threats of RCE, and more.
3 Critical Best Practices of Software Supply Chain Security
Learn about the 3 critical best practices of software supply chain security to protect your organization from malicious packages.
New Typosquating Attack on npm Package ’colors’ Using Cross language Technique Explained
Discover the latest typosquatting attack on the npm package 'colors' using a cross-language technique.
Impact Analysis: RubyGems Critical CVE-2022-29176 Unauthorized Package Takeover
Impact Analysis of RubyGems Critical CVE-2022-29176 Unauthorized Package Takeover. Learn about the vulnerability, impact assessment, and more
Threat Actor Deploys Malicious Packages Using Hex Encoding and Delayed Execution
Discover how threat actors are using hex encoding and delayed execution to deploy malicious packages. Learn how to protect your applications.
A Malicious Package Found Stealing AWS AIM data on npm has Similarities To Capital One Hack
Discover how a malicious package found stealing AWS AIM data on npm has similarities to the Capital One hack. Learn about the threat.
Welcome to Mend, Diffend!
Mend welcomes Diffend, an innovative software supply chain security service, to improve open source risk management.