Quick Guide to the OWASP OSS Risk Top 10
Learn about the top 10 risks of open source software, beyond just CVEs. From known vulnerabilities to unapproved changes.
What Makes Containers Vulnerable?
Learn about the vulnerabilities that containers bring to your applications and how to address them to keep attackers at bay.
NVD’s Backlog Triggers Public Response from Cybersec Leaders
The National Vulnerability Database's backlog triggers a public response from cybersecurity leaders. Concerns raised, open letter to Congress
OWASP Top 10 for LLM Applications: A Quick Guide
Discover the OWASP Top 10 for LLM Applications in this comprehensive guide. Learn about vulnerabilities, & prevention techniques.
What You Need to Know About Hugging Face
Stay informed about the risks and challenges of AI models with Hugging Face. Learn how to identify and secure AI-generated code.
Critical Backdoor Found in XZ Utils (CVE-2024-3094) Enables SSH Compromise 1
Discover how CVE-2024-3094 affects XZ Utils and enables SSH compromise. Get insights on detection, mitigation, and system security.
Over 100 Malicious Packages Target Popular ML PyPi Libraries
Discover the latest security threat as over 100 malicious packages target popular ML PyPi libraries. Learn about the attack methods.
Learning From History: AI Gender Bias
Learn about AI gender bias in large language models, how historical data impacts AI, & implications for women in health & car safety fields.
What is LDAP Injection? Types, Examples and How to Prevent It
Learn what LDAP Injection is, its types, examples, and how to prevent it. Secure your applications against LDAP attacks.
Container Security: Creating an Effective Security Program with Reachability Analysis
Learn how to create an effective container security program with reachability analysis to protect your applications from vulnerabilities.
Mend.io Launches Mend Container
Mend.io launches Mend Container to address security in cloud-native development, offering reachability analysis and secrets detection.
Breaking: What is Going on with the NVD? Does it Affect Me?
Learn about the current issues with the National Vulnerability Database, how it affects vulnerability reporting, and how Mend SCA can help.
What is the difference between an SCA scan and a container scan?
Learn about the difference between SCA scans and container scans, why scanning containers for vulnerabilities is important.
How is a Container Scan Done?
Learn the importance of scanning container images for vulnerabilities to keep your containerized environments safe.
Secrets Management vs Secrets Detection: Here’s What You Need to Know
Learn about the importance of secrets management vs secrets detection in application security. Protect your sensitive data.
How to Use Dependency Injection in Java: Tutorial with Examples
Learn how to use Dependency Injection in Java with this comprehensive tutorial. Discover its benefits, types, and practical examples.
Join our subscriber list to get the latest news and updates
Thanks for signing up!