Introducing AI SAST That Thinks Like a Security Engineer
Learn More
Product
Platform
Platform Overview
Code Scanning
AI for AppSec
Remediation
Use cases
Reachability-based SCA
AI Model Governance
AI-Native SAST
SBOM & Compliance
AI Security Code Review
Security Patches
Secrets Detection
Container Security
Malware Detection
Ecosystem
Languages & Integrations
Microsoft Defender for Cloud
GitHub Advanced Security
Learn
Resources
Blog
Events
Customer Stories
Ebooks & Reports
Solution Brief
Videos
LeanAppSec
Documentation
Tools
Code Prompt Library
New
TEI Calculator
Risk Explorer
Featured resources
State of Dependency Management 2025
Code Prompt Library
Artifact Signing
SCA for Bazel
SCA for Python and AI Apps
Company
About
About Us
Careers
Partners
News
Achievements
SOC 2
$93M Series B
Gartner Cool Vendor
CRN Stellar Startup
Intellyx Digital Innovation Award
See How It Works in Action
Book a Demo
Customers
LeanAppSec
Pricing
Docs
Login
Book a Demo
Book Demo
Introducing AI SAST That Thinks Like a Security Engineer
Learn More
Product
Platform
Platform Overview
Code Scanning
AI for AppSec
Remediation
Use cases
Reachability-based SCA
AI Model Governance
AI-Native SAST
SBOM & Compliance
AI Security Code Review
Security Patches
Secrets Detection
Container Security
Malware Detection
Ecosystem
Languages & Integrations
Microsoft Defender for Cloud
GitHub Advanced Security
Learn
Resources
Blog
Events
Customer Stories
Ebooks & Reports
Solution Brief
Videos
LeanAppSec
Documentation
Tools
Code Prompt Library
New
TEI Calculator
Risk Explorer
Featured resources
State of Dependency Management 2025
Code Prompt Library
Artifact Signing
SCA for Bazel
SCA for Python and AI Apps
Company
About
About Us
Careers
Partners
News
Achievements
SOC 2
$93M Series B
Gartner Cool Vendor
CRN Stellar Startup
Intellyx Digital Innovation Award
See How It Works in Action
Book a Demo
Customers
LeanAppSec
Pricing
Docs
Login
Book a Demo
Book Demo
Learn
Learn about software supply chain security and Endor Labs.
Featured resources
Blog
Classic Vulnerabilities Meet AI Infrastructure: Why MCP Needs AppSec
Jan 23, 2026
Blog
How Fake Font Packages Abused npm as a CDN
Jan 23, 2026
Blog
Understanding NPM Worms and the Shai-Hulud Attack
Nov 25, 2025
Blog
StackHawk + Endor Labs: Correlating SAST and DAST Alerts
Nov 20, 2025
Show filters
Topic
AI/ML
CI/CD
Compliance & SBOM
Developer Productivity
First Party Code
Malware
News
Open Source
Opinion
SCA
Security
Tech
Medium
Blog
Customer Story
Ebook/Report
Solution Brief
Video
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
News
Blog
Endor Labs Recognized As a 2023 Bay Area Best Place to Work
May 5, 2023
Security
Developer Productivity
SCA
Blog
Make Developers' Lives Easier with Endor Labs & GitHub Advanced Security
May 3, 2023
Security
Blog
LLM-assisted Malware Review: AI and Humans Join Forces to Combat Malware
Apr 17, 2023
News
Blog
Endor Labs Selected as Finalist for RSA Conference 2023 Innovation Sandbox
Mar 22, 2023
News
Blog
Announcing the Endor Labs Hyperdrive Program for Resellers and Solution Providers
Mar 16, 2023
News
Blog
Endor Labs partners with Zinfinity to help enterprise safely adopt Open Source Software
Mar 6, 2023
SCA
Security
Open Source
Ebook/Report
OWASP Top 10 Risks for Open Source
Mar 1, 2023
Security
Compliance & SBOM
Blog
How to Quickly Measure SBOM Accuracy for Maven Projects (for Free)
Feb 28, 2023
Compliance & SBOM
News
Security
Blog
Endor Labs is SOC2 Certified!
Feb 9, 2023
SCA
Open Source
Video
Introduction to Open Source Security - Webinar
Feb 3, 2023
SCA
Open Source
Video
Comparing SBOMs Generated at Different Lifecycle Stages - Webinar
Feb 3, 2023
Security
Compliance & SBOM
Blog
SBOM vs. SBOM: Comparing SBOMs from Different Tools and Lifecycle Stages
Feb 2, 2023
Developer Productivity
Security
Blog
What Breaking Changes Teach Us about Security
Jan 31, 2023
Compliance & SBOM
Blog
Open Source Licensing Simplified: A Comparative Overview of Popular Licenses
Jan 24, 2023
Security
Compliance & SBOM
Blog
What is VEX and Why Should I Care?
Jan 18, 2023
Security
Open Source
Malware
Blog
Whatfuscator, Malicious Open Source Packages, and Other Beasts
Jan 9, 2023
Security
Blog
Exploring Risk: Understanding Software Supply Chain Attacks
Jan 5, 2023
News
Blog
Endor Labs and Intuitive Partner to Help Enterprises Leverage OSS
Jan 2, 2023
SCA
Security
Blog
What is Reachability-Based Dependency Analysis?
Dec 21, 2022
SCA
Security
Open Source
Ebook/Report
State of Dependency Management 2022
Dec 8, 2022
SCA
Open Source
Video
Why We Need Static Analysis When Prioritizing Vulnerabilities - Webinar
Dec 6, 2022
Previous
1
...
Next
13 / 14
Want to stay in the loop?
Sign up for our newsletter.