Blog

Learn about software supply chain security and Endor Labs

AI-Generated Malware Risk: A Practical Guide for Developers

AI-Generated Malware Risk: A Practical Guide for Developers

Understand ai-generated malware risk and learn how developers can detect malicious packages, stop supply chain attacks, and harden workflows

Root in One Request: Marimo's Critical Pre-Auth RCE (CVE-2026-39987)

Root in One Request: Marimo's Critical Pre-Auth RCE (CVE-2026-39987)

WebSocket pre-auth RCE, confirmed exploited in the wild within 10 hours of disclosure. Tens to hundreds of instances may remain exposed. Upgrade to 0.23.0.

What Security and Engineering Teams Fear Most About Malware

What Security and Engineering Teams Fear Most About Malware

What do security practitioners and software engineers actually fear about open source malware? We asked 605 professionals. Here is what 141 of them said, in their own words.

Top Gen AI AppSec Tools in 2026: A Practitioner's Guide

Top Gen AI AppSec Tools in 2026: A Practitioner's Guide

Gen AI AppSec tools compared for 2026. Seven platforms evaluated on noise reduction, reachability analysis, AI-specific threat detection, and developer fit.

Best DevSecOps Tools for AppSec Teams in 2026

Best DevSecOps Tools for AppSec Teams in 2026

Best DevSecOps tools for 2026: seven platforms compared on false positive rates, reachability analysis, and actionable remediation guidance for AppSec teams.

Best Application Security Testing (AST) Tools Compared

Best Application Security Testing (AST) Tools Compared

Best AST tools compared on false positive rates, reachability depth, and workflow integration. See how 7 platforms reduce real security risk for dev teams.

10 Best DevSecOps Platforms for AppSec Teams in 2026

10 Best DevSecOps Platforms for AppSec Teams in 2026

DevSecOps platforms compared: 10 tools tested with real codebases for alert noise reduction, reachability analysis, and CI/CD integration for AppSec teams.

Best Application Security Tools for DevSecOps in 2026

Best Application Security Tools for DevSecOps in 2026

AppSec tools for 2026 ranked by noise reduction, false positive rates, and workflow integration. 10 platforms compared across SAST, SCA, DAST, and ASPM.

Best Code Security Platforms in 2026, Compared

Best Code Security Platforms in 2026, Compared

Best code security platforms compared: 8 tools rated on reachability analysis, false positive rates, and workflow integration so you fix real risks, not noise.

🐱 The Inevitable Feline Takeover: A Serious Analysis

🐱 The Inevitable Feline Takeover: A Serious Analysis

New research: malware in open source ecosystems surges 14x as attackers hijack trusted packages

New research: malware in open source ecosystems surges 14x as attackers hijack trusted packages

New Endor Labs research reveals 92% of npm account takeovers occurred in 2025, targeting packages with millions of downloads

Axios compromised: hijacked maintainer account pushes malicious npm versions

Axios compromised: hijacked maintainer account pushes malicious npm versions

TeamPCP Strikes Again: Telnyx Compromised Three Days After LiteLLM

TeamPCP Strikes Again: Telnyx Compromised Three Days After LiteLLM

TeamPCP Strikes Again: Telnyx Compromised

Top 10 Software Composition Analysis (SCA) Tools in 2026

Top 10 Software Composition Analysis (SCA) Tools in 2026

Best SCA tools for 2026 compared on reachability analysis, false positive rates, and remediation quality. 10 leading platforms reviewed with hands-on testing.

What We Can Learn About GitHub Actions Security from the Trivy Breach

What We Can Learn About GitHub Actions Security from the Trivy Breach

Lessons in Hardening GitHub Actions

SolarWinds took a nation-state. The next attack just needs an LLM and $5.

SolarWinds took a nation-state. The next attack just needs an LLM and $5.

AI has collapsed the cost of offense to pocket change.

Best Software Supply Chain Security Tools for AppSec Teams

Best Software Supply Chain Security Tools for AppSec Teams

Software supply chain security tools detect and fix vulnerabilities in your dependencies. Compare 7 top platforms on reachability analysis and noise reduction.

Software Supply Chain Security: How to Manage Risk at Scale

Software Supply Chain Security: How to Manage Risk at Scale

Supply chain management in software companies protects code, dependencies, and build processes. Compare 5 security approaches that reduce alert noise by 95%.

Malware Package Firewall: Block Threats Before They Hit Your Code

Malware Package Firewall: Block Threats Before They Hit Your Code

Malware package firewalls block malicious open source code before installation. Compare 5 leading tools by detection accuracy, coverage, and developer fit.

9 Best SAST Tools in 2026: Accuracy, Speed, and Noise Compared

9 Best SAST Tools in 2026: Accuracy, Speed, and Noise Compared

Best SAST tools for 2026 compared by detection accuracy, false positive rates, and scan speed. Choose the right scanner for your tech stack and CI/CD workflow.

TeamPCP Isn't Done: Threat Actor Behind Trivy and KICS Compromises Now Hits LiteLLM's 95 Million Monthly Downloads on PyPI

TeamPCP Isn't Done: Threat Actor Behind Trivy and KICS Compromises Now Hits LiteLLM's 95 Million Monthly Downloads on PyPI

Supply Chain Attack on popular PyPI library LiteLLM

Best Software Composition Analysis (SCA) Tools for 2026

Best Software Composition Analysis (SCA) Tools for 2026

Best SCA tools for 2026 reviewed and compared. We tested 7 top platforms on reachability analysis, false positive rates, remediation quality, and CI/CD fit.

Top 8 Application Security Platforms: Ranked for 2026

Top 8 Application Security Platforms: Ranked for 2026

Application security platforms combine SAST, SCA, container scanning, and secrets detection into one workflow. See the top 8 platforms ranked for 2026.

Cursor Security: How to Secure AI-Generated Code in 2026

Cursor Security: How to Secure AI-Generated Code in 2026

Cursor security covers IDE-level protections like Privacy Mode and SOC 2. Learn the 7 AI code generation risks these controls miss and how to fix them.

Top 8 Aikido Alternatives for Developer Security in 2026

Top 8 Aikido Alternatives for Developer Security in 2026

Aikido alternatives ranked for 2026. Compare 8 AppSec platforms including Endor Labs, Snyk, and Checkmarx on reachability depth, noise reduction, and scale.

Book a Demo

Protect your open source dependencies, secrets, and CI/CD pipelines without slowing down devs.