Introducing AI SAST That Thinks Like a Security Engineer
Learn More
Product
Platform
Platform Overview
Code Scanning
AI for AppSec
Remediation
Use cases
Reachability-based SCA
AI Model Governance
AI SAST
SBOM & Compliance
AI Security Code Review
Security Patches
Secrets Detection
Container Security
Malware Detection
Ecosystem
Languages & Integrations
Microsoft Defender for Cloud
GitHub Advanced Security
Learn
Resources
Blog
Events
Customer Stories
Ebooks & Reports
Solution Brief
Videos
LeanAppSec
Documentation
Tools
Code Prompt Library
New
TEI Calculator
Risk Explorer
Self-Guided Product Tour
Featured resources
State of Dependency Management 2025
Code Prompt Library
Artifact Signing
SCA for Bazel
SCA for Python and AI Apps
Company
About
About Us
Careers
Partners
News
Achievements
SOC 2
$93M Series B
Gartner Cool Vendor
CRN Stellar Startup
Intellyx Digital Innovation Award
See How It Works in Action
Book a Demo
Customers
LeanAppSec
Pricing
Docs
Login
Book a Demo
Book Demo
Introducing AI SAST That Thinks Like a Security Engineer
Learn More
Product
Platform
Platform Overview
Code Scanning
AI for AppSec
Remediation
Use cases
Reachability-based SCA
AI Model Governance
AI SAST
SBOM & Compliance
AI Security Code Review
Security Patches
Secrets Detection
Container Security
Malware Detection
Ecosystem
Languages & Integrations
Microsoft Defender for Cloud
GitHub Advanced Security
Learn
Resources
Blog
Events
Customer Stories
Ebooks & Reports
Solution Brief
Videos
LeanAppSec
Documentation
Tools
Code Prompt Library
New
TEI Calculator
Risk Explorer
Self-Guided Product Tour
Featured resources
State of Dependency Management 2025
Code Prompt Library
Artifact Signing
SCA for Bazel
SCA for Python and AI Apps
Company
About
About Us
Careers
Partners
News
Achievements
SOC 2
$93M Series B
Gartner Cool Vendor
CRN Stellar Startup
Intellyx Digital Innovation Award
See How It Works in Action
Book a Demo
Customers
LeanAppSec
Pricing
Docs
Login
Book a Demo
Book Demo
Learn
Learn about software supply chain security and Endor Labs.
Featured resources
Blog
Introducing Full Stack Reachability: Container Scanning That Actually Reduces Noise
Feb 11, 2026
Blog
Classic Vulnerabilities Meet AI Infrastructure: Why MCP Needs AppSec
Jan 23, 2026
Blog
How Fake Font Packages Abused npm as a CDN
Jan 23, 2026
Blog
Understanding NPM Worms and the Shai-Hulud Attack
Nov 25, 2025
Show filters
Topic
AI/ML
CI/CD
Compliance & SBOM
DevSecOps Tools
Developer Productivity
First Party Code
Malware
News
Open Source
Opinion
SCA
Security
Tech
Medium
Blog
Customer Story
Ebook/Report
Solution Brief
Video
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
CI/CD
Security
Blog
You Have a Shadow Pipeline Problem
Mar 19, 2024
SCA
Open Source
Security
Blog
Remediating Vulnerabilities vs. Maintaining Current Dependencies
Mar 13, 2024
SCA
Security
Video
Prioritizing SCA Findings with Reachability Analysis - On-Demand Webinar
Mar 6, 2024
CI/CD
Compliance & SBOM
Security
Blog
Signing Your Artifacts For Security, Quality, and Compliance
Mar 5, 2024
Open Source
SCA
Security
Malware
Blog
Detect Malicious Packages Among Your Open Source Dependencies
Feb 28, 2024
News
Blog
Tom Gleason Joins Endor Labs as VP of Customer Solutions
Feb 20, 2024
CI/CD
Compliance & SBOM
Security
Blog
Introducing CI/CD Security with Endor Labs
Feb 14, 2024
Security
Open Source
SCA
Video
How to Improve SCA in GitHub Advanced Security - Tutorial
Feb 5, 2024
Security
Open Source
SCA
Compliance & SBOM
Video
How to Ingest and Manage SBOMs - Tutorial
Jan 30, 2024
Compliance & SBOM
Tech
Customer Story
VMware Achieves SBOM Compliance for Over 100 Services with Endor Labs
Jan 29, 2024
Security
AI/ML
Blog
AI-Supported Environment Debugging for Endor Labs
Jan 25, 2024
Security
Open Source
SCA
Compliance & SBOM
Video
How to Generate SBOM and VEX - Tutorial
Jan 23, 2024
Security
AI/ML
Open Source
Video
How to Use AI for Open Source Selection - Tutorial
Jan 9, 2024
Security
SCA
News
Blog
Introducing a Better Way to SCA for Monorepos and Bazel
Jan 8, 2024
SCA
Security
Opinion
Blog
5 Types of Reachability Analysis (and Which is Right for You)
Jan 2, 2024
Security
Tech
Blog
What’s in a Name? A Look at the Software Identification Ecosystem
Dec 20, 2023
Security
Blog
What You Need to Know About Apache Struts and CVE-2023-50164
Dec 18, 2023
Security
SCA
Blog
Introducing JavaScript Reachability and Phantom Dependency Detection
Dec 12, 2023
Security
SCA
Tech
Customer Story
MileIQ Securely Reimagines a Decade Old Product with Endor Labs
Dec 11, 2023
Security
Compliance & SBOM
Blog
How CycloneDX VEX Makes Your SBOM Useful
Dec 8, 2023
First Party Code
Security
Video
How to Scan and Prioritize Valid Secrets - Tutorial
Dec 6, 2023
Previous
1
...
Next
11 / 15
Want to stay in the loop?
Sign up for our newsletter.