Blog

Learn about software supply chain security and Endor Labs

OWASP OSS Risk 2: Compromise of Legitimate Package

OWASP OSS Risk 2: Compromise of Legitimate Package

OWASP OSS Risk 2: Explore the compromise of legitimate open-source packages, with an in-depth case study of the tj-actions/changed-files GitHub Action supply chain attack.

Blast Radius of the tj-actions/changed-files Supply Chain Attack

Blast Radius of the tj-actions/changed-files Supply Chain Attack

Analysis of the tj-actions/changed-files GitHub Actions compromise, assessing the impact and damage from the attack.

What You Need to Know About UK Cyber Essentials Certification

What You Need to Know About UK Cyber Essentials Certification

Cyber Essentials helps UK businesses guard against internet-based attacks and prove their security measures are truly effective.

GitHub Action tj-actions/changed-files supply chain attack: what you need to know

GitHub Action tj-actions/changed-files supply chain attack: what you need to know

GitHub Action tj-actions/changed-files was compromised, exposing CI/CD secrets. Learn how this attack impacts repositories and what steps to take now.

Application Security Posture Management (ASPM) Explained

Application Security Posture Management (ASPM) Explained

Learn when application security posture management (ASPM) solutions work, their limitations, and alternatives for cutting through security alert noise.

How Endor Patches Are Built and Tested

How Endor Patches Are Built and Tested

Endor Patches are backported open-source security fixes. Learn how we build and test Endor Patches for compatibility and security.

The AppSec Maturity Staircase: Climbing Faster, Not Harder with Endor Labs

The AppSec Maturity Staircase: Climbing Faster, Not Harder with Endor Labs

Each stage of the application security maturity staircase evolves your program—and Endor Labs is your escalator to the top.

How to Get Developers to Accept Security PRs Faster

How to Get Developers to Accept Security PRs Faster

Improve your mean time to remediation (MTTR) with smarter automatic pull requests that use upgrade impact analysis to reduce alert fatigue for developers.

DeepSeek R1: What Security Teams Need to Know

DeepSeek R1: What Security Teams Need to Know

Learn how to evaluate security risk factors for DeepSeek R1, and about important considerations for working with open source AI models.

How to Discover Open Source AI Models in Your Code

How to Discover Open Source AI Models in Your Code

Use Endor Labs to discover, evaluate, and enforce policies governing the usage of open source AI models from Hugging Face in your applications.

Remote Code Execution Vulnerabilities in Apache Struts

Remote Code Execution Vulnerabilities in Apache Struts

CVE-2024-53677 and CVE-2023-50164 are vulnerabilities in Apache Struts that could pave the way for remote code execution, or RCE. Learn how to figure out if you’re affected, and if so what to do about it

Everything You Need to Know About Opengrep

Everything You Need to Know About Opengrep

Opengrep is a fork of Semgrep's open source static code analysis engine. Learn about the benefits and how you can contribute.

Uncover Trends and Show AppSec Value with the Endor Labs Dashboard

Uncover Trends and Show AppSec Value with the Endor Labs Dashboard

Vulnerability metrics can help you uncover remediation and SLA trends, and demonstrate the value of AppSec investments to your leadership.

Identifying and Tracking FedRAMP False Positives

Identifying and Tracking FedRAMP False Positives

False positives can make FedRAMP ConMon costly. Learn why it’s hard to accurately identify false positives and some tactics for making this process less challenging.

How Endor Labs Prioritizes Open Source Security Patches

How Endor Labs Prioritizes Open Source Security Patches

Learn how Endor Labs targets the critical dependencies that are responsible for most of the open source vulnerabilities in the software supply chain.

Why Reachability Analysis for JavaScript Is Hard (and How We Fixed It)

Why Reachability Analysis for JavaScript Is Hard (and How We Fixed It)

JavaScript reachability is tricky for SCA tools because of how JavaScript approaches dependency resolution, dependency imports, and functions.

Under the Hood: Grip Security Builds Customer Trust with AppSec

Under the Hood: Grip Security Builds Customer Trust with AppSec

Grip Security values strong application security because it helps them build trust with their customers. Learn how a security company approaches AppSec.

The Uncomfortable Truth of Vulnerable and Outdated Software Components

The Uncomfortable Truth of Vulnerable and Outdated Software Components

Learn where common industry sayings such as “stay up to date” come from and how you can help Endor Labs help you overcome those challenges.

Why OVAL Feeds Outperform NVD for Linux Vulnerability Management

Why OVAL Feeds Outperform NVD for Linux Vulnerability Management

Learn why OVAL feeds, curated by Linux distributions, offer more precise vulnerability data than the NVD, reducing container scanning false positives and wasted efforts.

Achieving FedRAMP’s Container Scanning Requirements

Achieving FedRAMP’s Container Scanning Requirements

Breaking Changes, Breaking Trust

Breaking Changes, Breaking Trust

Breaking Changes, Breaking Trust

Reducing FedRAMP Compliance Costs with Endor Labs

Reducing FedRAMP Compliance Costs with Endor Labs

Vulnerability Management for FedRAMP compliance is expensive; your SCA tool should help you make it cheaper and easier.

Microsoft Defender for Cloud Natively Integrates with Endor Labs

Microsoft Defender for Cloud Natively Integrates with Endor Labs

Integrate Microsoft Defender for Cloud with Endor Labs for reachability analysis and attack path visibility — available natively within the Defender for Cloud console. Prioritize what to fix without switching tools.

Hugging Face Model Score Curation at Endor Labs

Hugging Face Model Score Curation at Endor Labs

Understand how models are factored and scored at Endor Labs, new exploration tab for HuggingFace models

Endor Labs Announces Integrated SAST Offerings

Endor Labs Announces Integrated SAST Offerings

Endor Labs now integrates Static Application Security Testing (SAST) into your application security testing stack.

Book a Demo

Protect your open source dependencies, secrets, and CI/CD pipelines without slowing down devs.