Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

eCommerce and Retail Penetration Testing: Protect Payments, Customer Data, and Compliance

Penetration testing for eCommerce and retail has become critical as these industries face escalating cyber threats, making them prime targets for attackers seeking financial gain and sensitive customer data. According to IBM’s 2025 Cost of a Data Breach Report, the global average cost of a data breach reached $4.44 million.

Cheaters never win: large-scale campaign targets gamers who cheat with StealC and cryptojacking

A sprawling cyber campaign is turning gamers’ hunger to gain an edge into a massive payday for threat actors who are leveraging over 250 malware samples to steal credentials and cryptocurrencies. The operation has already netted wallets containing more than US$135,000. In this blog post, we will delve into a specific infection instance, explore its mechanisms. and share indicators of compromise (IoCs).

Defeating Microsoft EPM in the Race to Admin: a Tale of a LPE vulnerability

Not too long ago I read an interesting blogpost by SpecterOps about Microsoft EPM that got my attention as I was not aware of this Microsoft product/feature. It was interesting to learn that Microsoft expanded into the realm of Endpoint Privilege Management and since this means that there must be some service/driver running with high privileges that elevates low-privileged processes, I thought there could be potential vulnerabilities and bugs.

IT compliance audit checklist: 7 steps to follow

As IT threats and vulnerabilities continue to evolve, regulatory and compliance demands are growing in response. Many organizations today need to navigate multiple mandatory security frameworks and regulations. According to Vanta’s 2025 Trust Maturity Report, 90% of respondents cite compliance requirements as a top driver for investing in security. ‍ Maintaining compliance with the necessary frameworks requires continuous monitoring of your security posture and critical controls updates.

Why AI Security Tools Are Different and 9 Tools to Know in 2025

As companies embed AI models into their applications, they face risks that traditional security tools weren’t designed to catch, such as prompt injection, data leakage, model poisoning, and shadow AI. Addressing these threats requires a new class of security tools built specifically for AI specific risk.

Data Rejection and API Best Practice #cybersecurity

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.