Learn

Learn about software supply chain security and Endor Labs.

Featured resources

Root in One Request: Marimo's Critical Pre-Auth RCE (CVE-2026-39987)
Blog

Root in One Request: Marimo's Critical Pre-Auth RCE (CVE-2026-39987)

Apr 9, 2026
Ebook/Report

Malware in Open Source Ecosystems

Apr 1, 2026
Blog

Axios compromised: hijacked maintainer account pushes malicious npm versions

Mar 30, 2026
Ebook/Report

A Practitioner’s Guide to Responding to the TeamPCP Supply Chain Attacks

Mar 27, 2026
Topic
Medium
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Security
Open Source
Opinion
XZ is A Wake Up Call For Software Security: Here's Why by Dimitri Stiliadis
Blog

XZ is A Wake Up Call For Software Security: Here's Why

Apr 1, 2024
Compliance & SBOM
SSDF Compliance and Attestation by Chris Hughes
Blog

SSDF Compliance and Attestation

Mar 26, 2024
CI/CD
Security
You Have a Shadow Pipeline Problem by Darren Meyer
Blog

You Have a Shadow Pipeline Problem

Mar 19, 2024
SCA
Open Source
Security
Remediating Vulnerabilities vs. Maintaining Current Dependencies
Blog

Remediating Vulnerabilities vs. Maintaining Current Dependencies

Mar 13, 2024
SCA
Security
Prioritizing SCA Findings with Reachability Analysis - On-Demand Webinar
Video

Prioritizing SCA Findings with Reachability Analysis - On-Demand Webinar

Mar 6, 2024
CI/CD
Compliance & SBOM
Security
Signing Your Artifacts For Security, Quality, and Compliance
Blog

Signing Your Artifacts For Security, Quality, and Compliance

Mar 5, 2024
Open Source
SCA
Security
Malware
Detecting Malicious Packages in Open Source Dependencies by Henrik Plate
Blog

Detect Malicious Packages Among Your Open Source Dependencies

Feb 28, 2024
News
Tom Gleason Joins Endor Labs as VP of Customer Solutions
Blog

Tom Gleason Joins Endor Labs as VP of Customer Solutions

Feb 20, 2024
CI/CD
Compliance & SBOM
Security
Introducing CI/CD Security with Endor Labs
Blog

Introducing CI/CD Security with Endor Labs

Feb 14, 2024
Security
Open Source
SCA
How to Improve SCA in GitHub Advanced Security
Video

How to Improve SCA in GitHub Advanced Security - Tutorial

Feb 5, 2024
Security
Open Source
SCA
Compliance & SBOM
How to Ingest and Manage SBOMs
Video

How to Ingest and Manage SBOMs - Tutorial

Jan 30, 2024
Compliance & SBOM
Tech
VMware achieves SBOM compliance for over 100 services with Endor Labs
Customer Story

VMware Achieves SBOM Compliance for Over 100 Services with Endor Labs

Jan 29, 2024
Security
AI/ML
AI-Supported Environment Debugging for Endor Labs
Blog

AI-Supported Environment Debugging for Endor Labs

Jan 25, 2024
Security
Open Source
SCA
Compliance & SBOM
How to Generate SBOM and VEX
Video

How to Generate SBOM and VEX - Tutorial

Jan 23, 2024
Security
AI/ML
Open Source
How to Use AI for Open Source Selection
Video

How to Use AI for Open Source Selection - Tutorial

Jan 9, 2024
Security
SCA
News
Introducing a Better Way to SCA for Monorepos and Bazel
Blog

Introducing a Better Way to SCA for Monorepos and Bazel

Jan 8, 2024
SCA
Security
Opinion
5 Types of Reachability Analysis (and Which is Right for You)
Blog

5 Types of Reachability Analysis (and Which is Right for You)

Jan 2, 2024
Security
Tech
What’s in a Name? A Look at the Software Identification Ecosystem
Blog

What’s in a Name? A Look at the Software Identification Ecosystem

Dec 20, 2023
Security
What you need to know about Apache Struts and CVE-2023-50164
Blog

What You Need to Know About Apache Struts and CVE-2023-50164

Dec 18, 2023
Security
SCA
Introducing JavaScript Reachability and Phantom Dependency Detection
Blog

Introducing JavaScript Reachability and Phantom Dependency Detection

Dec 12, 2023
Security
SCA
Tech
MileIQ securely reimagines a decade old product with Endor Labs
Customer Story

MileIQ Securely Reimagines a Decade Old Product with Endor Labs

Dec 11, 2023

Want to stay in the loop?

Sign up for our newsletter.