Learn

Learn about software supply chain security and Endor Labs.

Featured resources

StackHawk + Endor Labs: Correlating SAST and DAST Alerts
Blog

StackHawk + Endor Labs: Correlating SAST and DAST Alerts

Nov 20, 2025
Introducing AI SAST That Thinks Like a Security Engineer
Blog

Introducing AI SAST That Thinks Like a Security Engineer

Nov 19, 2025
Critical SQL Injection Vulnerability in Django (CVE-2025-64459)
Blog

Critical SQL Injection Vulnerability in Django (CVE-2025-64459)

Nov 6, 2025
State of Dependency Management 2025
Ebook/Report

State of Dependency Management 2025

Nov 4, 2025
Topic
Medium
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Open Source
Opinion
Zero Trust for Open Source: Why Enterprises Need a New AppSec Playbook
Blog

Zero Trust for Open Source: Why Enterprises Need a New AppSec Playbook

Sep 22, 2025
Security
Malware
Blog

It’s Time to Take Malware Seriously (Attackers Do)

Sep 19, 2025
Security
SCA
AI/ML
Malware
Fireside Chat: Building an AppSec Program for Cursor
Video

Fireside Chat: Building an AppSec Program for Cursor

Sep 19, 2025
No items found.
Ebook/Report

A Practical Guide to AI and Application Security

Sep 19, 2025
Open Source
Security
Malware
How to Defend Against NPM Software Supply Chain Attacks
Blog

How to Defend Against NPM Software Supply Chain Attacks

Sep 16, 2025
Security
News
Open Source
Malware
A virus-like npm malware attack has spread to 180+ packages so far, including CrowdStrike and Tinycolor.
Blog

npm Malware Outbreak: Tinycolor and CrowdStrike Packages Compromised

Sep 16, 2025
AI/ML
News
Endor Labs Drives 225% Revenue Growth, Pioneers the Future of Secure SDLC
Blog

Endor Labs Drives 225% Revenue Growth, Pioneers the Future of Secure SDLC

Sep 16, 2025
Security
Open Source
Malware
Major Supply Chain Attack Compromises Popular npm Packages Including chalk and debug
Blog

Major Supply Chain Attack Compromises Popular npm Packages Including chalk and debug

Sep 8, 2025
Security
Malware
Blog

Nx build platform compromised by supply chain attack – How attackers collude with AI code assistants

Aug 27, 2025
No items found.
How We Cracked SCA for C/C++ Codebases
Blog

How We Cracked SCA for C/C++ Codebases

Aug 21, 2025
Customer Stories
SCA
Tech
Cursor Develops a Secure Product with Endor Labs
Customer Story

Cursor Develops a Secure Product with Endor Labs

Aug 20, 2025
CI/CD
Open Source
Security
When CodeRabbit became PwnedRabbit: A cautionary tale for every GitHub App vendor (and their customers)
Blog

When CodeRabbit became PwnedRabbit: A cautionary tale for every GitHub App vendor (and their customers)

Aug 20, 2025
AI/ML
Open Source
Security
Shadow AI in Your Codebase: A Hidden Supply Chain Risk
Blog

Shadow AI in Your Codebase: A Hidden Supply Chain Risk

Aug 20, 2025
Customer Stories
SCA
Tech
Five9 Transforms Software Supply Chain Security with Endor Labs
Customer Story

Five9 Transforms Software Supply Chain Security with Endor Labs

Aug 20, 2025
SCA
Customer Stories
Under the Hood: How I Vet Early-Stage Startups for Critical Security Programs
Blog

Under the Hood: How I Vet Early-Stage Startups for Critical Security Programs

Aug 20, 2025
No items found.
Detect End-of-Life (EOL) Software in Containers with Endor Labs
Blog

Detect End-of-Life (EOL) Software in Containers with Endor Labs

Aug 13, 2025
AI/ML
First Party Code
Security
The Most Common Security Vulnerabilities in AI-Generated Code
Blog

The Most Common Security Vulnerabilities in AI-Generated Code

Aug 12, 2025
AI/ML
First Party Code
Security
The Last Mile of AI Productivity Is Code Review
Blog

The Last Mile of AI Productivity Is Code Review

Aug 11, 2025
Security
SCA
AI/ML
Fireside Chat: CISOs on AI, Shift Left, and Building Trust at People.ai and AppLovin
Video

Fireside Chat: CISOs on AI, Shift Left, and Building Trust at People.ai and AppLovin

Aug 7, 2025
Security
SCA
Fireside Chat: Building a High-Trust Product Security Program at Zebra
Video

Fireside Chat: Building a High-Trust Product Security Program at Zebra

Aug 6, 2025
AI/ML
First Party Code
Security
How to Detect LLM Prompt Injection Risks
Blog

How to Detect LLM Prompt Injection Risks

Aug 6, 2025
no-results
Sorry, no results matching your search.

Want to stay in the loop?

Sign up for our newsletter.