Learn

Learn about software supply chain security and Endor Labs.

Featured resources

Root in One Request: Marimo's Critical Pre-Auth RCE (CVE-2026-39987)
Blog

Root in One Request: Marimo's Critical Pre-Auth RCE (CVE-2026-39987)

Apr 9, 2026
Ebook/Report

Malware in Open Source Ecosystems

Apr 1, 2026
Blog

Axios compromised: hijacked maintainer account pushes malicious npm versions

Mar 30, 2026
Ebook/Report

A Practitioner’s Guide to Responding to the TeamPCP Supply Chain Attacks

Mar 27, 2026
Topic
Medium
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
News
SCA
From cloud security to code security: why we've raised $25M to take on OSS dependency sprawl
Blog

From Cloud Security to Code Security: Why We've Raised $25M to Take on OSS Dependency Sprawl

Oct 11, 2022
News
Open Source
Endor Labs Launches with $25M Seed Financing to Tackle Massive Sprawl of Open Source Software (OSS)
Blog

Endor Labs Launches with $25M Seed Financing to Tackle Massive Sprawl of Open Source Software (OSS)

Oct 10, 2022
Security
Compliance & SBOM
SBOMs are just a means to an end
Blog

SBOMs are Just a Means to an End

Sep 13, 2022
Security
Open Source
Introducing the OpenSSF Scorecard API
Blog

Introducing the OpenSSF Scorecard API

Sep 8, 2022
Developer Productivity
How to get the most out of GitHub API rate limits
Blog

How to Get the Most out of GitHub API Rate Limits

Aug 21, 2022
News
Opinion
Why I joined Endor Labs to Build our India Team
Blog

Why I Joined Endor Labs to Build our India Team

Aug 2, 2022
Opinion
Security
Open Source
How Zero Trust principles can accelerate open source adoption in enterprises
Blog

How Zero Trust Principles Can Accelerate Enterprise Adoption of OSS

Jul 25, 2022
Security
Tech
What security teams need to know about software development
Blog

What Security Teams Need to Know about Software Development

Jul 14, 2022
Opinion
Security
CSRB Log4j Report - The Response is as Dangerous as the Vulnerability
Blog

CSRB Log4j Report - The Response is as Dangerous as the Vulnerability

Jul 14, 2022
Security
Developer Productivity
Opinion
Polyrepo vs. Monorepo - How does it impact dependency management?
Blog

Polyrepo vs. Monorepo - How Does it Impact Dependency Management?

Jul 12, 2022

Want to stay in the loop?

Sign up for our newsletter.