Blog

Learn about software supply chain security and Endor Labs

Under the Hood: People.ai's Proactive Approach to AI Security

Under the Hood: People.ai's Proactive Approach to AI Security

Hear how a CISO at an AI-first company is thinking about securing AI, and how AI should improve security programs.

Streamline Investigation with Enriched Vulnerability Search

Streamline Investigation with Enriched Vulnerability Search

Endor Labs Vulnerability Search helps you investigate CVEs with enriched metadata, call paths, and precise impact analysis—resolving conflicts across public feeds.

What is AppSec? A 2025 Guide for Security Practitioners

What is AppSec? A 2025 Guide for Security Practitioners

Learn what Application Security (AppSec) is, why it matters, and how to build a modern, scalable AppSec program across the SDLC.

Under the Hood: Mysten Labs’ Strategies for Building the Most Secure Blockchain

Under the Hood: Mysten Labs’ Strategies for Building the Most Secure Blockchain

How Mysten Labs builds secure and low-friction systems for blockchain by focusing on code ownership, usability, and AppSec strategy.

Next-Gen SCA for C/C++: Closing the Detection Gap

Next-Gen SCA for C/C++: Closing the Detection Gap

A new method for identifying OSS dependencies and vulnerabilities in C/C++ with greater accuracy and precision than legacy tools.

Critical SQL Injection Vulnerability in LlamaIndex (CVE-2025-1793) – Advisory and Analysis

Critical SQL Injection Vulnerability in LlamaIndex (CVE-2025-1793) – Advisory and Analysis

The critical SQL injection vulnerability in LlamaIndex shows how LLMs can be a backdoor into your vector store

AppSec’s Exploitation Era: What Verizon, Mandiant, and Datadog Are Telling Us

AppSec’s Exploitation Era: What Verizon, Mandiant, and Datadog Are Telling Us

A breakdown of DBIR, M-Trends, and DevSecOps reports and what they reveal about the future of AppSec in the age of AI.

Benchmarking Opengrep Performance Improvements

Benchmarking Opengrep Performance Improvements

Opengrep's improvements to rule load times resulted in 3.15x faster average scan times than Semgrep

The UK Software Security Code of Practice through a Software Supply Chain Lens

The UK Software Security Code of Practice through a Software Supply Chain Lens

How the UK Software Security Code of Practice reshapes supply chain security—and how Endor Labs helps vendors meet its core requirements.

CVE-2025-47949 Reveals Flaw in samlify That Opens Door to SAML Single Sign-On Bypass

CVE-2025-47949 Reveals Flaw in samlify That Opens Door to SAML Single Sign-On Bypass

Information on the likelihood and impact of CVE-2025-47949

CVE-2025-4641 is Critical, But Likely Unreachable

CVE-2025-4641 is Critical, But Likely Unreachable

Critical CVE-2025-4641 in WebDriverManager likely poses low real-world risk, but it should still be on radar. Here’s what you need to know, plus quick steps to check versions, upgrade, and secure CI pipelines.

Mastering Security Automation: Exception and Remediation Policies

Mastering Security Automation: Exception and Remediation Policies

Learn how Endor Labs cuts through security noise, stops unnecessary build breaks, and keeps developers focused on real risks—making security policy automation truly developer-friendly.

5 Tips for Managing Bazel Dependencies (Without Losing Friends)

5 Tips for Managing Bazel Dependencies (Without Losing Friends)

Upgrading dependencies in a Bazel monorepo? Learn 5 tips to avoid breakages, reduce risk, and keep your team (and builds) running smoothly.

Why Security Policies Frustrate Developers (and How We Can Fix Them)

Why Security Policies Frustrate Developers (and How We Can Fix Them)

Most security policies create more problems than they solve, overwhelming developers with noise and unnecessary build breaks. Here's what a better approach looks like.

Open Source Gets Political: What The easyjson Debate Misses (and what to do about it)

Open Source Gets Political: What The easyjson Debate Misses (and what to do about it)

A look at the easyjson controversy, open source provenance, and how Go's built-in protections help teams manage risk without overreacting.

Why We Raised a $93M Series B (In This Market)

Why We Raised a $93M Series B (In This Market)

Endor Labs raised a $93M Series B to accelerate its mission of securing the AI-driven software era. Learn why top investors preempted the round—and how Endor is redefining AppSec for modern development.

Introducing the Endor Labs MCP Server: fix-first security for the vibe coding era

Introducing the Endor Labs MCP Server: fix-first security for the vibe coding era

Endor Labs MCP Server powers real security fixes for vibe coding and AI-generated code—reduce noise and help AI tools fix risks for you.

Introducing AI Security Code Review

Introducing AI Security Code Review

Endor Labs helps application security teams identify the few code changes that impact their security architecture across thousands of pull requests.

Meet the application security platform built for the AI era

Meet the application security platform built for the AI era

The era of vibe coding is here. Learn how Endor Labs is helping AppSec teams secure and fix AI-generated code with a new agentic AI platform.

Critical RCE Vulnerability in Apache Parquet (CVE-2025-30065) – Advisory and Analysis

Critical RCE Vulnerability in Apache Parquet (CVE-2025-30065) – Advisory and Analysis

Endor Labs advisory: Critical CVE-2025-30065 in Apache Parquet lets attackers run code via schema parsing. Patch now by upgrading to version 1.15.1.

Reducing Noise and Fixing What Matters

Reducing Noise and Fixing What Matters

Learn how Endor Labs improves AppSec accuracy with better SCA and SAST, so you can decide if ASPM is the right fit for your organization.

OWASP OSS Risk 2: Compromise of Legitimate Package

OWASP OSS Risk 2: Compromise of Legitimate Package

OWASP OSS Risk 2: Explore the compromise of legitimate open-source packages, with an in-depth case study of the tj-actions/changed-files GitHub Action supply chain attack.

Blast Radius of the tj-actions/changed-files Supply Chain Attack

Blast Radius of the tj-actions/changed-files Supply Chain Attack

Analysis of the tj-actions/changed-files GitHub Actions compromise, assessing the impact and damage from the attack.

What You Need to Know About UK Cyber Essentials Certification

What You Need to Know About UK Cyber Essentials Certification

Cyber Essentials helps UK businesses guard against internet-based attacks and prove their security measures are truly effective.

GitHub Action tj-actions/changed-files supply chain attack: what you need to know

GitHub Action tj-actions/changed-files supply chain attack: what you need to know

GitHub Action tj-actions/changed-files was compromised, exposing CI/CD secrets. Learn how this attack impacts repositories and what steps to take now.

Book a Demo

Protect your open source dependencies, secrets, and CI/CD pipelines without slowing down devs.