Learn

Learn about software supply chain security and Endor Labs.

Featured resources

AI Security Code Review: A Multi-Agent Approach for Detecting Security Design Flaws at Scale
Ebook/Report

AI Security Code Review: A Multi-Agent Approach for Detecting Security Design Flaws at Scale

Apr 23, 2025
Introducing the Endor Labs MCP Server: fix-first security for the vibe coding era
Blog

Introducing the Endor Labs MCP Server: fix-first security for the vibe coding era

Apr 23, 2025
Introducing AI Security Code Review
Blog

Introducing AI Security Code Review

Apr 23, 2025
Meet the application security platform built for the AI era
Blog

Meet the application security platform built for the AI era

Apr 23, 2025
Topic
Medium
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Security
Open Source
Endor Labs & Oligo: Closing the Loop Between Secure Code and Secure Runtime
Blog

Endor Labs & Oligo: Closing the Loop Between Secure Code and Secure Runtime

Jul 10, 2025
Security
Open Source
Struggling to Patch Spring-Web? Try This Instead
Blog

Struggling to Patch Spring-Web? Try This Instead

Jul 9, 2025
Open Source
Security
Compliance & SBOM
SCA
Under the Hood: People.ai's Proactive Approach to AI Security
Blog

Under the Hood: People.ai's Proactive Approach to AI Security

Jul 1, 2025
Open Source
Security
Compliance & SBOM
People.ai transforms security and compliance with Endor Labs
Customer Story

People.ai transforms security and compliance with Endor Labs

Jul 1, 2025
Open Source
Security
Streamline Investigation with Enriched Vulnerability Search
Blog

Streamline Investigation with Enriched Vulnerability Search

Jun 25, 2025
Open Source
Security
SCA
What is AppSec? A 2025 Guide for Security Practitioners
Blog

What is AppSec? A 2025 Guide for Security Practitioners

Jun 19, 2025
SCA
Open Source
Security
Cracking the Code: Solving the Challenges of C/C++ Software Composition Analysis
Ebook/Report

Cracking the Code: Solving the Challenges of C/C++ Software Composition Analysis

Jun 18, 2025
SCA
First Party Code
AI/ML
Developer Productivity
Mysten Labs Improves DevEx with Endor Labs
Customer Story

Mysten Labs Improves DevEx with Endor Labs

Jun 17, 2025
SCA
Developer Productivity
Under the Hood: Mysten Labs’ Strategies for Building the Most Secure Blockchain
Blog

Under the Hood: Mysten Labs’ Strategies for Building the Most Secure Blockchain

Jun 17, 2025
Developer Productivity
Open Source
SCA
Zebra Technologies Cuts SCA Noise by 97% with Endor Labs
Customer Story

Zebra Technologies Cuts SCA Noise by 97% with Endor Labs

Jun 11, 2025
SCA
Open Source
Security
Next-Gen SCA for C/C++: Closing the Detection Gap
Blog

Next-Gen SCA for C/C++: Closing the Detection Gap

Jun 11, 2025
Security
AI/ML
Critical SQL Injection Vulnerability in LlamaIndex (CVE-2025-1793) – Advisory and Analysis
Blog

Critical SQL Injection Vulnerability in LlamaIndex (CVE-2025-1793) – Advisory and Analysis

Jun 9, 2025
Open Source
Security
AppSec’s Exploitation Era:What Verizon, Mandiant, and Datadog Are Telling Us
Blog

AppSec’s Exploitation Era: What Verizon, Mandiant, and Datadog Are Telling Us

Jun 4, 2025
First Party Code
Security
Benchmarking Opengrep Performance Improvements
Blog

Benchmarking Opengrep Performance Improvements

May 29, 2025
Security
Open Source
The UK Software Security Code of Practice through a Software Supply Chain Lens
Blog

The UK Software Security Code of Practice through a Software Supply Chain Lens

May 22, 2025
First Party Code
Security
CVE-2025-47949 Reveals Flaw in samlify That Opens Door to SAML Single Sign-On Bypass
Blog

CVE-2025-47949 Reveals Flaw in samlify That Opens Door to SAML Single Sign-On Bypass

May 20, 2025
Security
Developer Productivity
Endor Labs Policies: Developer-Friendly Security Automation
Ebook/Report

Endor Labs Policies: Developer-Friendly Security Automation

May 19, 2025
Security
CVE-2025-4641 is Critical, But Likely Unreachable
Blog

CVE-2025-4641 is Critical, But Likely Unreachable

May 16, 2025
Security
Mastering Security Automation: Exception and Remediation Policies
Blog

Mastering Security Automation: Exception and Remediation Policies

May 15, 2025
Open Source
5 Tips for Managing Bazel Dependencies (Without Losing Friends)
Blog

5 Tips for Managing Bazel Dependencies (Without Losing Friends)

May 12, 2025
Security
Blog

Why Security Policies Frustrate Developers (and How We Can Fix Them)

May 6, 2025
no-results
Sorry, no results matching your search.

Want to stay in the loop?

Sign up for our newsletter.