Mend.io Supply Chain Security

what are malicious packages blog

What are Malicious Packages? How Do They Work?

Learn about malicious packages, how they work, and the growing threat they pose to software supply chains.

Read More
rsa view from the floor

RSA Conference 2023: Key Takeaways From Our Five Favorite Sessions

RSA 2023 takeaways, including sessions on supply chain security, translating security for the board, & the psychology of DevSecOps.

Read More
five key principles of modern application security e1678917349838

The Five Key Principles of Modern Application Security

Discover the key principles of modern application security. Learn how to secure your software and protect against evolving threats.

Read More
who should take responsibility for application security

Just Who Exactly Should Take Responsibility for Application Security?

Explore the complexities of application security responsibility in the age of DevSecOps and supply chain breaches. Who should take the lead?

Read More
securing the software supply chain mend open source risk report

Securing the Software Supply Chain: Key Findings from the Mend Open Source Risk Report

Discover key findings from the Mend Open Source Risk Report on securing the software supply chain. Watch the webinar for more insights.

Read More
Yandex Data Leak Triggers Malicious Package Publication 1

Yandex Data Leak Triggers Malicious Package Publication

Discover how the Yandex data leak triggered malicious package publication, leading to supply chain security risks.

Read More
blog image

Malicious Code Deletes Directories If You Do Not Have a License

Discover how malicious code can delete directories if you don’t have a license. Learn about supply chain security and license compliance.

Read More
large Blog 1 3

Mend’s Trends for 2023

Stay ahead of cyber threats with Mend’s Trends for 2023. Experts predict a rise in AI-driven cybercrime and open source vulnerabilities.

Read More
large Blog 1 2

Introducing the Mend Open Source Risk Report

Discover the latest insights on open source risk management in the Mend Open Source Risk Report.

Read More
Blog

DevSecOps: A Comprehensive Guide to Securely Managing Your DevOps Workflow

Get to know all about DevSecOps and the main tools and practices that organizations should adopt in order to implement a DevSecOps pipeline.

Read More
big blog post

Top Three User Priorities for Software Composition Analysis

Discover the top three user priorities for Software Composition Analysis including application security, DevSecOps, and license compliance.

Read More
openssl alert

Advisory: New OpenSSL Critical Security Vulnerability

Learn about the new OpenSSL critical security vulnerabilities CVE-2022-3786 and CVE-2022-3602. Discover their impact, and protect your systems.

Read More
The six golden rules for you to follow to improve your software and application security 2

Six Golden Rules for Software and Application Security

Learn the six golden rules for software and application security.. Stay safe during Cybersecurity Awareness Month 2022!

Read More
npm Massive Dependency Confusion Attack

Cybercriminals targeted users of packages with a total of 1.5 billion weekly downloads on npm

Stay informed about the latest supply chain security incident targeting npm users. Learn about the malicious packages and more.

Read More
npm Massive Dependency Confusion Attack

Popular Cryptocurrency Exchange dYdX Has Had Its NPM Account Hacked

dYdX, a popular cryptocurrency exchange, had its NPM account hacked in a supply chain attack. Learn how to protect against similar attacks.

Read More
1000X650 2

Mend API Helps Make SBOMs Simple

Learn how Mend API simplifies the creation of SBOMs for better supply chain security. Stay ahead in DevSecOps with our automated tool.

Read More