Filter & Search

OWASP Top 10 for LLM Applications: A Quick Guide

Discover the OWASP Top 10 for LLM Applications in this comprehensive guide. Learn about vulnerabilities, & prevention techniques.

Read More

What You Need to Know About Hugging Face

Stay informed about the risks and challenges of AI models with Hugging Face. Learn how to identify and secure AI-generated code.

Read More

Critical Backdoor Found in XZ Utils (CVE-2024-3094) Enables SSH Compromise 1

Discover how CVE-2024-3094 affects XZ Utils and enables SSH compromise. Get insights on detection, mitigation, and system security.

Read More

Over 100 Malicious Packages Target Popular ML PyPi Libraries

Discover the latest security threat as over 100 malicious packages target popular ML PyPi libraries. Learn about the attack methods.

Read More

Learning From History: AI Gender Bias

Learn about AI gender bias in large language models, how historical data impacts AI, & implications for women in health & car safety fields.

Read More

What is LDAP Injection? Types, Examples and How to Prevent It

Learn what LDAP Injection is, its types, examples, and how to prevent it. Secure your applications against LDAP attacks.

Read More

Container Security: Creating an Effective Security Program with Reachability Analysis

Learn how to create an effective container security program with reachability analysis to protect your applications from vulnerabilities.

Read More

Mend.io Launches Mend Container

Mend.io launches Mend Container to address security in cloud-native development, offering reachability analysis and secrets detection.

Read More

Breaking: What is Going on with the NVD? Does it Affect Me?

Learn about the current issues with the National Vulnerability Database, how it affects vulnerability reporting, and how Mend SCA can help.

Read More

What is the difference between an SCA scan and a container scan?

Learn about the difference between SCA scans and container scans, why scanning containers for vulnerabilities is important.

Read More

How is a Container Scan Done?

Learn the importance of scanning container images for vulnerabilities to keep your containerized environments safe.

Read More

Secrets Management vs Secrets Detection: Here’s What You Need to Know

Learn about the importance of secrets management vs secrets detection in application security. Protect your sensitive data.

Read More

How to Use Dependency Injection in Java: Tutorial with Examples

Learn how to use Dependency Injection in Java with this comprehensive tutorial. Discover its benefits, types, and practical examples.

Read More

CVSS 4.0 is Here: How to Make the Most of It

Learn about the latest version of CVSS 4.0. Understand the new metrics and how to use them in your org’s vulnerability remediation strategy.

Read More

Quality > Quantity: How to Get the Most Out of SAST

Learn how to make the most out of Static Application Security Testing (SAST) without overwhelming developers.

Read More

Idempotency: The Microservices Architect’s Shield Against Chaos

Discover the power of idempotency in microservices architecture. Learn how to maintain data consistency and predictability.

Read More

Subscribe to our Newsletter

Join our subscriber list to get the latest news and updates

Thanks for signing up!