Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Account Takeover Nightmare: Why You're Always Fighting Fires! #appsec #cybersecurity

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

From Bots to Autonomous Agents: How State Leaders Can Prepare for the Next Wave of AI Threats

Imagine a tireless, ever-learning army that never sleeps and never makes mistakes—an army of AI agents, not humans. What began as simple bots has evolved into sophisticated, autonomous entities operating in perfect sync at machine speed. This is no longer science fiction: autonomous AI is accelerating fraud, turning slow, manual crimes into rapid, relentless attacks. Agentic AI fraud isn’t coming—it’s here. Most organizations remain unprepared.

Container security at scale: Strengthening software supply chains

Modern applications have undergone a paradigm shift, with containers becoming the default choice for deployment. While their flexibility and scalability are well-recognized, their adoption has also surfaced new and complex security challenges. Organizations are now grappling with how to embed trust across their software supply chains, maintain compliance, and mitigate risks—especially as they increasingly incorporate open-source components and AI-generated code into their workflows.

Wi-Fi Intrusion from neighboring networks, how to stop the Nearest Neighbor Attacks

Wireless networks have traditionally been a weak point in corporate cybersecurity. However, what was once a localized risk, limited to an office space, has now evolved into a more sophisticated threat, making detection more difficult.

Scaling Vector Databases With Novel Partitioning Methodologies

Imagine: A newly acquired dataset is being prepared for use as a vector database to retrieve information, create recommendation systems, be used for threat detection or similarity-based alert triage. During integration, however, operational challenges surface. Platform constraints prevent full-scale ingestion, prompting an arbitrary reduction in the size of the dataset. As a result, performance degrades significantly.

Arctic Wolf Observes July 2025 Uptick in Akira Ransomware Activity Targeting SonicWall SSL VPN

In late July 2025, Arctic Wolf observed an increase in ransomware activity targeting SonicWall firewall devices for initial access. In the intrusions reviewed, multiple pre-ransomware intrusions were observed within a short period of time, each involving VPN access through SonicWall SSL VPNs. While credential access through brute force, dictionary attacks, and credential stuffing have not yet been definitively ruled out in all cases, available evidence points to the existence of a zero-day vulnerability.

Introducing Mend Forge

Today, we’re thrilled to announce Mend Forge, our new AI native innovation engine and your window into what’s next in application security. At Mend.io, we believe that security innovation shouldn’t happen in a black box. The security landscape is shifting fast, driven by the explosive growth of AI generated code, AI powered applications, and rapidly evolving software supply chains.

When "Private" Isn't: The Security Risks of GPT Chats Leaking to Search Engines

In late July 2025, users discovered that ChatGPT chats, initially shared via link, were appearing in search engine results on platforms such as Google, Bing, and DuckDuckGo. These shared conversations included personal content relating to mental health, career concerns, legal issues, and more, without any indication of a data breach. Instead, the exposure resulted from a now-removed feature that enabled discoverability via search indexing.

Japan's Active Cyberdefense Law: A New Era in Cybersecurity Strategy

On May 16th, 2025, the Japanese Parliament enacted a landmark piece of cybersecurity legislation: the Japan Active Cyberdefense Law. It was a historic moment for the country's digital defense, empowering law enforcement and military agencies to conduct pre-emptive cyber operations before they materialize.