Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Developers: Build Trust, Foster Security Culture, Stay Updated! #developers #appsec

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Why Identity Threats Are Harder to Detect

When a single identity is linked to multiple accounts across your environment, visibility gaps can occur, opening opportunities for attackers to exploit. This risk is especially high for executives and privileged users with access to your most sensitive data. In this clip, our expert Tyler Reese explains why identity correlation is essential for proactive threat detection and ITDR. Learn how identity mapping and account cataloging enhance SOC visibility and help prevent cross-account attacks.

July 7, 2025 Cyber Threat Intelligence Briefing

This week’s briefing covers: Critical Sudo Vulnerability Allows Priv Esc to Root The flaw arises from unsafe handling of the --chroot (-R) option, where sudo processes user-provided configurations (including nsswitch.conf) from within the chroot environment before validating user privileges. This allows a local attacker to construct a malicious chroot with crafted NSS configuration that forces sudo to load attacker-controlled shared libraries as root, effectively bypassing authentication.

Rewind: Microsoft Kernel Shift, GPT-4o Threats, and Scattered Spider - The 443 Podcast - Episode 334

First, we look back at Microsoft’s major shift to remove endpoint protection from the Windows kernel. When we first covered it, it was a proposed change—now it's happening, and the implications are big. Next, we revisit a segment on GPT-4o and how generative AI is fueling the next wave of social engineering attacks. It's smarter, faster, and more convincing than ever. And finally, a refresher on the arrest of a Scattered Spider leader. While that made headlines, the group's activity hasn’t slowed down, they're still very much on the radar, as we discussed just last week.

Compliance Isn't Security: Why Businesses Must Think Beyond the Basics

Industry compliance frameworks like GDPR, HIPAA, and PCI DSS have become the go-to benchmarks for cybersecurity. But here's the hard truth: meeting compliance standards doesn't guarantee your data is secure. While these frameworks set essential guardrails, they often fail to address fast-evolving cyber threats that target businesses every day. For modern enterprises, staying secure requires going beyond checkbox compliance.

Beyond the Hype: Why Adaptive AI is Essential for Modern SOCs

Artificial Intelligence (AI) has revolutionized Security Operations Centers (SOCs), automating threat triage and response. But not every AI is equipped to handle today’s evolving cyber threats. Many SOC platforms still rely on static, pre-trained models designed for yesterday’s attack patterns, leaving modern organizations vulnerable.

Calico Whisker & Staged Network Policies: Secure Kubernetes Workloads Without Downtime

Rolling out network policies in a live Kubernetes cluster can feel like swapping wings mid-flight—one typo or overly broad rule and critical traffic is grounded. Calico’s Staged Network Policies remove the turbulence by letting you deploy policies in staged mode, so you can observe their impact before enforcing anything.

How Feroot Helps Security Teams Meet NIST SP 800-53 Controls for Web Application Protection

NIST Special Publication 800-53 is a cybersecurity and privacy framework developed by the National Institute of Standards and Technology (NIST). It provides a standardized set of security controls for federal information systems, covering everything from access control and incident response to system monitoring and supply chain risk management.

How to Improve Computer Network Security for Your Business

Regardless of size or industry, all companies are exposed to potential cyber threats. Digitalization has brought countless benefits to today’s world, but as technology has evolved, so have the strategies used by cybercriminals to access and compromise company data and operations. Implementing computer network security has become a must. In recent years, cyberattacks have increased exponentially, posing a serious risk to organizational security.