Learn

Learn about software supply chain security and Endor Labs.

Featured resources

Introducing security for AI coding agents and workstations
Blog

Introducing Security for AI Coding Agents and Workstations

May 12, 2026
Beyond Mythos: A CISO's Guide to Building an Effective Software Security Program for the AI Era
Ebook/Report

Beyond Mythos: A CISO's Guide to Building an Effective Software Security Program for the AI Era

Apr 29, 2026
Claude Opus 4.7 Sets New Records in the Endor Labs Agent Security League
Blog

Claude Opus 4.7 Sets New Records in the Endor Labs Agent Security League

Apr 17, 2026
Surge in submissions forces NIST to change how it handles CVEs. Here's what it means for vulnerability management.
Blog

Surge in submissions forces NIST to change how it handles CVEs. Here's what it means for vulnerability management.

Apr 17, 2026
Topic
Medium
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
AI/ML
Open Source
Security
Introducing Agent Governance: Using Hooks to Bring Visibility to AI Coding Agents
Blog

Introducing Agent Governance: Using Hooks to Bring Visibility to AI Coding Agents

May 12, 2026
Open Source
News
Introducing Package Firewall
Blog

Introducing Package Firewall

May 12, 2026
Malware
Ebook/Report

Malware Defense: A multi-agent detection engine and package firewall

May 12, 2026
AI/ML
News
Open Source
Introducing security for AI coding agents and workstations
Blog

Introducing Security for AI Coding Agents and Workstations

May 12, 2026
Malware
Open Source
Security
Shai-Hulud compromises the @tanstack ecosystem: 80+ packages compromised
Blog

Shai-Hulud compromises the @tanstack ecosystem: 160+ packages compromised

May 11, 2026
Malware
Security
Blog

Popular lightning PyPI Package Backdoored in Latest Shai-Hulud Wave

Apr 30, 2026
AI/ML
Beyond Mythos: A CISO's Guide to Building an Effective Software Security Program for the AI Era
Ebook/Report

Beyond Mythos: A CISO's Guide to Building an Effective Software Security Program for the AI Era

Apr 29, 2026
Malware
Security
Mini Shai-Hulud: npm Worm Hits SAP Developer Packages
Blog

Mini Shai-Hulud: npm Worm Hits SAP Developer Packages

Apr 29, 2026
AI/ML
GPT-5.5 Sets a New Code Security Record with Cursor, not Codex, in Agent Security League
Blog

GPT-5.5 Sets a New Code Security Record with Cursor, not Codex, in Agent Security League

Apr 27, 2026
Malware
Security
Shai-Hulud: The Third Coming — Inside the @bitwarden/cli@2026.4.0 Supply Chain Attack
Blog

The Bitwarden CLI Supply Chain Attack: What Happened and What to Do

Apr 23, 2026
AI/ML
The agent control plane needs a security layer
Blog

The agent control plane needs a security layer

Apr 23, 2026
Malware
Organizational Behavior Predicts OSS Malware Program Success
Blog

Organizational Behavior Predicts OSS Malware Program Success

Apr 22, 2026
AI/ML
Claude Opus 4.7 Sets New Records in the Endor Labs Agent Security League
Blog

Claude Opus 4.7 Sets New Records in the Endor Labs Agent Security League

Apr 17, 2026
Open Source
Security
Surge in submissions forces NIST to change how it handles CVEs. Here's what it means for vulnerability management.
Blog

Surge in submissions forces NIST to change how it handles CVEs. Here's what it means for vulnerability management.

Apr 17, 2026
Security
Open Source
The Dangers of Reusing Protobuf Definitions: Critical Code Execution in protobuf.js (GHSA-xq3m-2v4x-88gg)
Blog

The Dangers of Reusing Protobuf Definitions: Critical Code Execution in protobuf.js (GHSA-xq3m-2v4x-88gg)

Apr 17, 2026
Security
Open Source
A critical sandbox bypass lets attackers run arbitrary code in Spring apps.
Blog

It's About Thyme: How a Whitespace Character Broke Thymeleaf's Expression Sandbox (CVE-2026-40478)

Apr 16, 2026
AI/ML
Agent Security League: Evaluating the Security of AI-Coded Software
Ebook/Report

Agent Security League: Evaluating the Security of AI-Coded Software

Apr 15, 2026
AI/ML
Is AI Coding Safe? Introducing the Agent Security League
Blog

Is AI Coding Safe? Introducing the Agent Security League

Apr 15, 2026
Malware
Open Source
Security
The Unkillable C2: How Attackers Are Moving Command and Control to the Blockchain
Blog

The Unkillable C2: How Attackers Are Moving Command and Control to the Blockchain

Apr 13, 2026
Security
News
Open Source
Root in One Request: Marimo's Critical Pre-Auth RCE (CVE-2026-39987)
Blog

Root in One Request: Marimo's Critical Pre-Auth RCE (CVE-2026-39987)

Apr 9, 2026
Security
Malware
What Security and Engineering Teams Fear Most About Malware
Blog

What Security and Engineering Teams Fear Most About Malware

Apr 8, 2026

Want to stay in the loop?

Sign up for our newsletter.