Search Results

Learn about software supply chain security and Endor Labs

Search all our {count} unique resources
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Critical Remote Code Execution (RCE) Vulnerabilities in React and Next.js
chrome_reader_mode
Article

Critical Remote Code Execution (RCE) Vulnerabilities in React and Next.js

React and Next.js contain a critical RCE vulnerability

The New era of Code-to-Cloud Security
chrome_reader_mode
Article

The New era of Code-to-Cloud Security

Rubrik Hits Aggressive SLAs via Endor Labs
chrome_reader_mode
Article

Rubrik Hits Aggressive SLAs via Endor Labs

Rubrik uses Endor Labs for SCA, SAST, container scanning, and secret detection.

Understanding NPM Worms and the Shai-Hulud Attack
chrome_reader_mode
Article

Understanding NPM Worms and the Shai-Hulud Attack

A breakdown of npm worms, how Shai-Hulud spread across the ecosystem, and the key security practices every team needs to prevent large-scale compromise.

Shai-Hulud 2 Malware Campaign Targets GitHub and Cloud Credentials Using Bun Runtime
chrome_reader_mode
Article

Shai-Hulud 2 Malware Campaign Targets GitHub and Cloud Credentials Using Bun Runtime

Analysis of Shai-Hulud 2, a new npm supply chain attack

The OWASP Top 10 Gets Modernized
chrome_reader_mode
Article

The OWASP Top 10 Gets Modernized

A look at the 2025 update to the OWASP Top 10, the most significant update since 2021

How Endor Labs Is Supporting Bryce, a Next-Gen AppSec Builder
chrome_reader_mode
Article

How Endor Labs Is Supporting Bryce, a Next-Gen AppSec Builder

Endor Labs celebrates emerging AppSec talent at OWASP Global AppSec, highlighting Bryce’s Space Badge and investing in his future with a $5,000 scholarship.

StackHawk + Endor Labs: Correlating SAST and DAST Alerts
chrome_reader_mode
Article

StackHawk + Endor Labs: Correlating SAST and DAST Alerts

Cut through duplicate alerts by mapping findings from static and dynamic analysis, so teams can focus on remediating the vulnerabilities that matter.

AI SAST: Combining Agents, Program Analysis, and Rules for High-Confidence Code Security
chrome_reader_mode
Article

AI SAST: Combining Agents, Program Analysis, and Rules for High-Confidence Code Security

This whitepaper details Endor Labs' multi-modal approach to AI SAST, leveraging agentic reasoning, program analysis, and advanced rules to eliminate 95% of false positives while surfacing complex logic flaws.

Introducing AI SAST That Thinks Like a Security Engineer
chrome_reader_mode
Article

Introducing AI SAST That Thinks Like a Security Engineer

Endor Labs AI SAST detects business logic flaws and reduces false positives by up to 95% by orchestrating multiple AI agents to review code.

Invisible Threats and the Blind Spots of Security 

chrome_reader_mode
Article

Invisible Threats and the Blind Spots of Security 


How GlassWorm Exploited Unicode Shadows in VS Code Supply Chains

Code-to-Cloud Application Risk Management with Upwind and Endor Labs
chrome_reader_mode
Article

Code-to-Cloud Application Risk Management with Upwind and Endor Labs

Together Endor Labs and Upwind deliver complete visibility across code and cloud for strong security posture management across the SLDC.

The Great Indonesian TEA Theft: Analyzing a NPM Spam Campaign
chrome_reader_mode
Article

The Great Indonesian TEA Theft: Analyzing a NPM Spam Campaign

How a sophisticated spam campaign hijacked popular NPM packages with Indonesian food names as part of a global software supply chain attack.

Happier DOMs: The perils of running untrusted JavaScript code outside of a web browser
chrome_reader_mode
Article

Happier DOMs: The perils of running untrusted JavaScript code outside of a web browser

Endor Labs reveals critical RCE flaws in Happy DOM, showing how weak JavaScript sandboxes enable prototype pollution and unsafe code execution in Node.js.

Announcing Native Support for OWASP Secure Pipeline Verification Standard
chrome_reader_mode
Article

Announcing Native Support for OWASP Secure Pipeline Verification Standard

Endor Labs now offers native support for OWASP SPVS, helping teams secure every stage of the software delivery pipeline from Plan to Operate.

OWASP Top 10 Adds A03:2025: Software Supply Chain Failures
chrome_reader_mode
Article

OWASP Top 10 Adds A03:2025: Software Supply Chain Failures

The 2025 update to the OWASP Top 10 for Web Applications elevated software supply chain failures to the third leading risk.

Critical SQL Injection Vulnerability in Django (CVE-2025-64459)
chrome_reader_mode
Article

Critical SQL Injection Vulnerability in Django (CVE-2025-64459)

Critical SQL Injection Vulnerability in Django (CVE-2025-64459). Learn what happened, root cause, impact, and how to mitigate.

False Negatives in SAST: Hidden Risks Behind the Noise
chrome_reader_mode
Article

False Negatives in SAST: Hidden Risks Behind the Noise

Traditional SAST tools miss vulnerabilities while overwhelming teams with false positives. Here's why the silent failures are more dangerous than the noise.

State of Dependency Management 2025
chrome_reader_mode
Article

State of Dependency Management 2025

AI Coding Agents and Software Supply Chain Risk

Why AI Code Gets Less Secure With Every Prompt
chrome_reader_mode
Article

Why AI Code Gets Less Secure With Every Prompt

New research shows that AI-generated code becomes less secure with each iteration—highlighting why developers need guardrails and structured approaches.

From Shift Left to Shift Down: Making SAST Work for Developers
chrome_reader_mode
Article

From Shift Left to Shift Down: Making SAST Work for Developers

Shift-left security programs are failing and SAST is partly to blame. Shifting security down, not left, is how we make it work for developers.

Why SAST Failed (And What’s Next)
chrome_reader_mode
Article

Why SAST Failed (And What’s Next)

Static analysis promised scalable secure coding. Instead, it delivered false positives and fatigue. Here’s why—and what the next era of analysis must do differently.

CVE-2025-53967 Remote Code Execution in Framelink Figma MCP Server
chrome_reader_mode
Article

CVE-2025-53967 Remote Code Execution in Framelink Figma MCP Server

Learn about CVE-2025-53967, a high-severity RCE vulnerability in Framelink Figma MCP, including mitigation and vetting recommendations.

Rethinking the Interface: How Agentic UX is Shaping the Future of Endor Labs
chrome_reader_mode
Article

Rethinking the Interface: How Agentic UX is Shaping the Future of Endor Labs

Discover how agentic UX streamlines application security workflows with proactive automation, faster decisions, and a more intuitive experience.

Proactive Protection from Malware Attacks
chrome_reader_mode
Article

Proactive Protection from Malware Attacks

Protect your software supply chain from rising malware attacks. Endor Labs blocks malicious open-source dependencies early and reduces incident response.

Why Cooldown Windows Belong in Every npm Security Strategy
chrome_reader_mode
Article

Why Cooldown Windows Belong in Every npm Security Strategy

Block risky npm releases before they spread. Endor Labs’ new cooldown policy enforces wait times to stop malware attacks.

Zero Trust for Open Source: Why Enterprises Need a New AppSec Playbook
chrome_reader_mode
Article

Zero Trust for Open Source: Why Enterprises Need a New AppSec Playbook

Enterprises must extend Zero Trust security principles to open source: assume nothing is safe, verify every dependency, and enforce guardrails across the software supply chain.

It’s Time to Take Malware Seriously (Attackers Do)
chrome_reader_mode
Article

It’s Time to Take Malware Seriously (Attackers Do)

Too often, malware isn’t a priority until there’s a high-profile attack. But with the recent escalation of attacks, it’s time to make malware a first-party citizen in application security programs.

Fireside Chat: Building an AppSec Program for Cursor
chrome_reader_mode
Article

Fireside Chat: Building an AppSec Program for Cursor

Learn how Travis McPeak is building an AppSec program that's both effective and non-disruptive to the engineering team's workflow.

A Practical Guide to AI and Application Security
chrome_reader_mode
Article

A Practical Guide to AI and Application Security

As AI reshapes software development, security teams can be the catalyst for unlocking productivity without sacrificing safety.

How to Defend Against NPM Software Supply Chain Attacks
chrome_reader_mode
Article

How to Defend Against NPM Software Supply Chain Attacks

Practical steps security teams and developers can take to reduce risks from software supply chain attacks targeting the npm registry.

npm Malware Outbreak: Tinycolor and CrowdStrike Packages Compromised
chrome_reader_mode
Article

npm Malware Outbreak: Tinycolor and CrowdStrike Packages Compromised

A virus-like npm malware attack has spread to 180+ packages so far, including CrowdStrike and Tinycolor.

Endor Labs Drives 225% Revenue Growth, Pioneers the Future of Secure SDLC
chrome_reader_mode
Article

Endor Labs Drives 225% Revenue Growth, Pioneers the Future of Secure SDLC

AppSec company’s rapid growth reflects rising demand for security built for the speed and scale of engineering teams shaping the future of software with AI

Major Supply Chain Attack Compromises Popular npm Packages Including chalk and debug
chrome_reader_mode
Article

Major Supply Chain Attack Compromises Popular npm Packages Including chalk and debug

Popular npm packages including chalk and debug were compromised in a major supply chain attack. Learn what happened, root cause, impact, and how to mitigate.

Nx build platform compromised by supply chain attack – How attackers collude with AI code assistants
chrome_reader_mode
Article

Nx build platform compromised by supply chain attack – How attackers collude with AI code assistants

Nx supply chain attack: malicious npm versions of Nx exfiltrated SSH keys and tokens to GitHub—abusing AI code assistants. Learn how to detect and fix.

How We Cracked SCA for C/C++ Codebases
chrome_reader_mode
Article

How We Cracked SCA for C/C++ Codebases

Endor Labs improves C/C++ SCA by combining cryptographic hashing, code embeddings, and a curated index for accurate dependency and vulnerability detection.

Cursor Develops a Secure Product with Endor Labs
chrome_reader_mode
Article

Cursor Develops a Secure Product with Endor Labs

Cursor uses Endor Labs for SCA and dependency management. Learn how they reduced noise, accelerated remediation, and enabled both stable code and focused engineers.

When CodeRabbit became PwnedRabbit: A cautionary tale for every GitHub App vendor (and their customers)
chrome_reader_mode
Article

When CodeRabbit became PwnedRabbit: A cautionary tale for every GitHub App vendor (and their customers)

Kudelski Security uncovered an RCE flaw in CodeRabbit exposing 1M+ repos. Here’s what happened, how it was fixed, and key lessons for secure AI apps.

Shadow AI in Your Codebase: A Hidden Supply Chain Risk
chrome_reader_mode
Article

Shadow AI in Your Codebase: A Hidden Supply Chain Risk

Unvetted AI models and services are entering your codebase. Do you have a plan to find and govern them?

Five9 Transforms Software Supply Chain Security with Endor Labs
chrome_reader_mode
Article

Five9 Transforms Software Supply Chain Security with Endor Labs

Five9 uses Endor Labs’ SCA to ensure they focus on just the risks that matter and can respond quickly to zero days.

Under the Hood: How I Vet Early-Stage Startups for Critical Security Programs
chrome_reader_mode
Article

Under the Hood: How I Vet Early-Stage Startups for Critical Security Programs

Greg Pettengill, a Principal Product Security Engineer at Five9, is an early adopter of startup technology. In this article he shares his methodology for picking vendors that can deliver on promises.

Detect End-of-Life (EOL) Software in Containers with Endor Labs
chrome_reader_mode
Article

Detect End-of-Life (EOL) Software in Containers with Endor Labs

Endor Labs now detects end-of-life (EOL) software in containers, helping AppSec teams eliminate risk early.

The Most Common Security Vulnerabilities in AI-Generated Code
chrome_reader_mode
Article

The Most Common Security Vulnerabilities in AI-Generated Code

Learn about the most common and emerging security risks of AI-generated code, from injection flaws to hallucinated dependencies.

The Last Mile of AI Productivity Is Code Review
chrome_reader_mode
Article

The Last Mile of AI Productivity Is Code Review

Developers are generating more code with AI coding assistants, but release velocity isn’t increasing. Here’s how to fix it.

Fireside Chat: CISOs on AI, Shift Left, and Building Trust at People.ai and AppLovin
chrome_reader_mode
Article

Fireside Chat: CISOs on AI, Shift Left, and Building Trust at People.ai and AppLovin

Learn how top security leaders think about using AI code assistants to achieve the shift-left dream, increase release velocity, and build developer trust.

Fireside Chat: Building a High-Trust Product Security Program at Zebra
chrome_reader_mode
Article

Fireside Chat: Building a High-Trust Product Security Program at Zebra

Learn how Zebra Technologies builds a successful Product Security program by using reachability and risk ranking to prioritize critical vulnerabilities, making fixes fast and building developer trust.

How to Detect LLM Prompt Injection Risks
chrome_reader_mode
Article

How to Detect LLM Prompt Injection Risks

Learn how to detect prompt injection vulnerabilities in GenAI applications and prevent attackers from exploiting LLM-powered workflows.

Why Your AI Code Assistant Might Be Shipping CVEs
chrome_reader_mode
Article

Why Your AI Code Assistant Might Be Shipping CVEs

LLMs often recommend outdated or vulnerable open source packages—here’s why it happens, why it matters, and how AppSec and DevOps leaders can stay ahead.

Anti-Pattern Avoidance: A Simple Prompt Pattern for Safer AI-Generated Code
chrome_reader_mode
Article

Anti-Pattern Avoidance: A Simple Prompt Pattern for Safer AI-Generated Code

How CWE-specific prompts cut LLM code vulnerabilities by more than half.

Endor Labs now integrates with GitHub Copilot in VS Code
chrome_reader_mode
Article

Endor Labs now integrates with GitHub Copilot in VS Code

Secure AI-generated code at the source with a new integration for GitHub Copilot powered by the Endor Labs platform.

Securing AI Coding Assistants: A Total Cost Analysis
chrome_reader_mode
Article

Securing AI Coding Assistants: A Total Cost Analysis

A CISO’s guide to analyzing and containing the security costs of AI-generated code

Endor Labs Now Available on Google Cloud Marketplace
chrome_reader_mode
Article

Endor Labs Now Available on Google Cloud Marketplace

Endor Labs is now available on the Google Cloud Marketplace, enabling faster procurement and deployment of software supply chain security for GCP customers and partners.

How to Detect Infrastructure as Code (IaC) Misconfigurations with AI Security Code Review
chrome_reader_mode
Article

How to Detect Infrastructure as Code (IaC) Misconfigurations with AI Security Code Review

Learn how to detect misconfigurations in Infrastructure as Code (IaC) files, preventing privilege escalation and unsafe defaults before they reach production.

Endor Labs now integrates with Cursor AI Code Editor
chrome_reader_mode
Article

Endor Labs now integrates with Cursor AI Code Editor

Secure AI-generated code at the source with a new Cursor integration powered by the Endor Labs platform.

Secure-Insecure Diff: A Smarter Way to Prompt for Safer Code
chrome_reader_mode
Article

Secure-Insecure Diff: A Smarter Way to Prompt for Safer Code

How a multi-step prompt technique can reduce vulnerabilities in AI-generated code

How to Evaluate Endor Labs SCA for C/C++ Projects
chrome_reader_mode
Article

How to Evaluate Endor Labs SCA for C/C++ Projects

A step-by-step guide to testing Endor Labs SCA accuracy for C/C++ projects

CVE-2025-54313: eslint-config-prettier Compromise — High Severity but Windows-Only
chrome_reader_mode
Article

CVE-2025-54313: eslint-config-prettier Compromise — High Severity but Windows-Only

CVE-2025-54313 tracks a supply chain attack on eslint-config-prettier, where four malicious versions of a popular npm library targeted Windows machines with a remote-code execution payload. Learn how it happened and how to stay safe.

Everything You Need To Know About The FedRAMP RFC-0012
chrome_reader_mode
Article

Everything You Need To Know About The FedRAMP RFC-0012

The new FedRAMP RFC shifts the standard to require deep context into the reachability and exploitability of vulnerabilities. Here’s what you need to know.

Structuring Prompts for Secure Code Generation
chrome_reader_mode
Article

Structuring Prompts for Secure Code Generation

A practical guide to embedding security requirements into AI coding workflows

Endor Outpost: Deploy Endor Labs Behind Your Firewall
chrome_reader_mode
Article

Endor Outpost: Deploy Endor Labs Behind Your Firewall

Endor Outpost extends the full capabilities of the Endor Labs AppSec platform to Self-Hosted SCMs like Bitbucket Datacenter and GitLab Self-Managed.

Endor Labs & Oligo: Closing the Loop Between Secure Code and Secure Runtime
chrome_reader_mode
Article

Endor Labs & Oligo: Closing the Loop Between Secure Code and Secure Runtime

Endor Labs and Oligo keep pipelines fast and secure with unified reachability, real-time threat blocking, and safe, automatic fixes.

Struggling to Patch Spring-Web? Try This Instead
chrome_reader_mode
Article

Struggling to Patch Spring-Web? Try This Instead

Fixing Java deserialization vulnerabilities in Spring-Web is notoriously difficult, but Endor Labs offers an alternative with patches.

Under the Hood: People.ai's Proactive Approach to AI Security
chrome_reader_mode
Article

Under the Hood: People.ai's Proactive Approach to AI Security

Hear how a CISO at an AI-first company is thinking about securing AI, and how AI should improve security programs.

People.ai Transforms Security and Compliance with Endor Labs
chrome_reader_mode
Article

People.ai Transforms Security and Compliance with Endor Labs

People.ai replaced Snyk with Endor Labs for application security that provides an outstanding developer experience and makes it easier (and cheaper) to hit compliance targets.

Streamline Investigation with Enriched Vulnerability Search
chrome_reader_mode
Article

Streamline Investigation with Enriched Vulnerability Search

Endor Labs Vulnerability Search helps you investigate CVEs with enriched metadata, call paths, and precise impact analysis—resolving conflicts across public feeds.

What is AppSec? A 2025 Guide for Security Practitioners
chrome_reader_mode
Article

What is AppSec? A 2025 Guide for Security Practitioners

Learn what Application Security (AppSec) is, why it matters, and how to build a modern, scalable AppSec program across the SDLC.

Cracking the Code: Solving the Challenges of C/C++ Software Composition Analysis
chrome_reader_mode
Article

Cracking the Code: Solving the Challenges of C/C++ Software Composition Analysis

This whitepaper details Endor Labs’ novel approach to indexing open source dependencies and detecting vulnerabilities in C and C++ codebases.

Mysten Labs Improves DevEx with Endor Labs
chrome_reader_mode
Article

Mysten Labs Improves DevEx with Endor Labs

Within weeks of deployment, Endor Labs helped Mysten Labs transform its application security strategy.

Under the Hood: Mysten Labs’ Strategies for Building the Most Secure Blockchain
chrome_reader_mode
Article

Under the Hood: Mysten Labs’ Strategies for Building the Most Secure Blockchain

How Mysten Labs builds secure and low-friction systems for blockchain by focusing on code ownership, usability, and AppSec strategy.

Zebra Technologies Cuts SCA Noise by 97% with Endor Labs
chrome_reader_mode
Article

Zebra Technologies Cuts SCA Noise by 97% with Endor Labs

With fewer alerts and more accuracy, Zebra Technologies now spends more time building and less time chasing false positives.

Next-Gen SCA for C/C++: Closing the Detection Gap
chrome_reader_mode
Article

Next-Gen SCA for C/C++: Closing the Detection Gap

A new method for identifying OSS dependencies and vulnerabilities in C/C++ with greater accuracy and precision than legacy tools.

Critical SQL Injection Vulnerability in LlamaIndex (CVE-2025-1793) – Advisory and Analysis
chrome_reader_mode
Article

Critical SQL Injection Vulnerability in LlamaIndex (CVE-2025-1793) – Advisory and Analysis

The critical SQL injection vulnerability in LlamaIndex shows how LLMs can be a backdoor into your vector store

AppSec’s Exploitation Era: What Verizon, Mandiant, and Datadog Are Telling Us
chrome_reader_mode
Article

AppSec’s Exploitation Era: What Verizon, Mandiant, and Datadog Are Telling Us

A breakdown of DBIR, M-Trends, and DevSecOps reports and what they reveal about the future of AppSec in the age of AI.

Benchmarking Opengrep Performance Improvements
chrome_reader_mode
Article

Benchmarking Opengrep Performance Improvements

Opengrep's improvements to rule load times resulted in 3.15x faster average scan times than Semgrep

The UK Software Security Code of Practice through a Software Supply Chain Lens
chrome_reader_mode
Article

The UK Software Security Code of Practice through a Software Supply Chain Lens

How the UK Software Security Code of Practice reshapes supply chain security—and how Endor Labs helps vendors meet its core requirements.

CVE-2025-47949 Reveals Flaw in samlify That Opens Door to SAML Single Sign-On Bypass
chrome_reader_mode
Article

CVE-2025-47949 Reveals Flaw in samlify That Opens Door to SAML Single Sign-On Bypass

Information on the likelihood and impact of CVE-2025-47949

Endor Labs Policies: Developer-Friendly Security Automation
chrome_reader_mode
Article

Endor Labs Policies: Developer-Friendly Security Automation

This whitepaper talks about how Endor Labs uses context-aware security policies, like finding, action, exception, and remediation policies, to reduce noise, improve remediation speed, and help developers focus on real risks.

CVE-2025-4641 is Critical, But Likely Unreachable
chrome_reader_mode
Article

CVE-2025-4641 is Critical, But Likely Unreachable

Critical CVE-2025-4641 in WebDriverManager likely poses low real-world risk, but it should still be on radar. Here’s what you need to know, plus quick steps to check versions, upgrade, and secure CI pipelines.

Mastering Security Automation: Exception and Remediation Policies
chrome_reader_mode
Article

Mastering Security Automation: Exception and Remediation Policies

Learn how Endor Labs cuts through security noise, stops unnecessary build breaks, and keeps developers focused on real risks—making security policy automation truly developer-friendly.

5 Tips for Managing Bazel Dependencies (Without Losing Friends)
chrome_reader_mode
Article

5 Tips for Managing Bazel Dependencies (Without Losing Friends)

Upgrading dependencies in a Bazel monorepo? Learn 5 tips to avoid breakages, reduce risk, and keep your team (and builds) running smoothly.

Why Security Policies Frustrate Developers (and How We Can Fix Them)
chrome_reader_mode
Article

Why Security Policies Frustrate Developers (and How We Can Fix Them)

Most security policies create more problems than they solve, overwhelming developers with noise and unnecessary build breaks. Here's what a better approach looks like.

Open Source Gets Political: What The easyjson Debate Misses (and what to do about it)
chrome_reader_mode
Article

Open Source Gets Political: What The easyjson Debate Misses (and what to do about it)

A look at the easyjson controversy, open source provenance, and how Go's built-in protections help teams manage risk without overreacting.

Why We Raised a $93M Series B (In This Market)
chrome_reader_mode
Article

Why We Raised a $93M Series B (In This Market)

Endor Labs raised a $93M Series B to accelerate its mission of securing the AI-driven software era. Learn why top investors preempted the round—and how Endor is redefining AppSec for modern development.

Secure AI-Generated Code at the Source
chrome_reader_mode
Article

Secure AI-Generated Code at the Source

This solution brief shows how application security teams can fix risks from AI-generated code earlier in development and become the catalyst for secure, scalable adoption of AI coding tools like GitHub Copilot and Cursor in their organizations.

AI Security Code Review: A Multi-Agent Approach for Detecting Security Design Flaws at Scale
chrome_reader_mode
Article

AI Security Code Review: A Multi-Agent Approach for Detecting Security Design Flaws at Scale

This whitepaper introduces how AI Security Code Review works, what it detects, how it integrates into your workflows, and why it represents the next generation of code scanning technology — built for the complexity and speed of AI-native software development.

Introducing the Endor Labs MCP Server: fix-first security for the vibe coding era
chrome_reader_mode
Article

Introducing the Endor Labs MCP Server: fix-first security for the vibe coding era

Endor Labs MCP Server powers real security fixes for vibe coding and AI-generated code—reduce noise and help AI tools fix risks for you.

Introducing AI Security Code Review
chrome_reader_mode
Article

Introducing AI Security Code Review

Endor Labs helps application security teams identify the few code changes that impact their security architecture across thousands of pull requests.

Meet the application security platform built for the AI era
chrome_reader_mode
Article

Meet the application security platform built for the AI era

The era of vibe coding is here. Learn how Endor Labs is helping AppSec teams secure and fix AI-generated code with a new agentic AI platform.

Critical RCE Vulnerability in Apache Parquet (CVE-2025-30065) – Advisory and Analysis
chrome_reader_mode
Article

Critical RCE Vulnerability in Apache Parquet (CVE-2025-30065) – Advisory and Analysis

Endor Labs advisory: Critical CVE-2025-30065 in Apache Parquet lets attackers run code via schema parsing. Patch now by upgrading to version 1.15.1.

Reducing Noise and Fixing What Matters
chrome_reader_mode
Article

Reducing Noise and Fixing What Matters

Learn how Endor Labs improves AppSec accuracy with better SCA and SAST, so you can decide if ASPM is the right fit for your organization.

OWASP OSS Risk 2: Compromise of Legitimate Package
chrome_reader_mode
Article

OWASP OSS Risk 2: Compromise of Legitimate Package

OWASP OSS Risk 2: Explore the compromise of legitimate open-source packages, with an in-depth case study of the tj-actions/changed-files GitHub Action supply chain attack.

Blast Radius of the tj-actions/changed-files Supply Chain Attack
chrome_reader_mode
Article

Blast Radius of the tj-actions/changed-files Supply Chain Attack

Analysis of the tj-actions/changed-files GitHub Actions compromise, assessing the impact and damage from the attack.

What You Need to Know About UK Cyber Essentials Certification
chrome_reader_mode
Article

What You Need to Know About UK Cyber Essentials Certification

Cyber Essentials helps UK businesses guard against internet-based attacks and prove their security measures are truly effective.

GitHub Action tj-actions/changed-files supply chain attack: what you need to know
chrome_reader_mode
Article

GitHub Action tj-actions/changed-files supply chain attack: what you need to know

GitHub Action tj-actions/changed-files was compromised, exposing CI/CD secrets. Learn how this attack impacts repositories and what steps to take now.

Application Security Posture Management (ASPM) Explained
chrome_reader_mode
Article

Application Security Posture Management (ASPM) Explained

Learn when application security posture management (ASPM) solutions work, their limitations, and alternatives for cutting through security alert noise.

How Endor Patches Are Built and Tested
chrome_reader_mode
Article

How Endor Patches Are Built and Tested

Endor Patches are backported open-source security fixes. Learn how we build and test Endor Patches for compatibility and security.

The AppSec Maturity Staircase: Climbing Faster, Not Harder with Endor Labs
chrome_reader_mode
Article

The AppSec Maturity Staircase: Climbing Faster, Not Harder with Endor Labs

Each stage of the application security maturity staircase evolves your program—and Endor Labs is your escalator to the top.

How to Get Developers to Accept Security PRs Faster
chrome_reader_mode
Article

How to Get Developers to Accept Security PRs Faster

Improve your mean time to remediation (MTTR) with smarter automatic pull requests that use upgrade impact analysis to reduce alert fatigue for developers.

DeepSeek R1: What Security Teams Need to Know
chrome_reader_mode
Article

DeepSeek R1: What Security Teams Need to Know

Learn how to evaluate security risk factors for DeepSeek R1, and about important considerations for working with open source AI models.

no-results
Sorry, no results matching your search.

Book a Demo

Protect your open source dependencies, secrets, and CI/CD pipelines without slowing down devs.