Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CISOs: Your Blind Spot Just Became Their Entry Point

As CISOs, you’ve invested heavily in desktop security, built out Zero Trust architectures, and hardened your perimeter. But there’s a critical gap many are still leaving exposed: mobile devices and the human behind the screen. In a world where your workforce runs on smartphones, overlooking mobile security is no longer an option.

July Release Rollup: Copilot - Improved File Search and Selection, Project Center, and more

We’re excited to share new updates and enhancements for July, including: For more information on these updates and others, please read the complete list below and follow the links for more detailed articles.

Account Takeover Nightmare: Why You're Always Fighting Fires! #appsec #cybersecurity

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

From Bots to Autonomous Agents: How State Leaders Can Prepare for the Next Wave of AI Threats

Imagine a tireless, ever-learning army that never sleeps and never makes mistakes—an army of AI agents, not humans. What began as simple bots has evolved into sophisticated, autonomous entities operating in perfect sync at machine speed. This is no longer science fiction: autonomous AI is accelerating fraud, turning slow, manual crimes into rapid, relentless attacks. Agentic AI fraud isn’t coming—it’s here. Most organizations remain unprepared.

Container security at scale: Strengthening software supply chains

Modern applications have undergone a paradigm shift, with containers becoming the default choice for deployment. While their flexibility and scalability are well-recognized, their adoption has also surfaced new and complex security challenges. Organizations are now grappling with how to embed trust across their software supply chains, maintain compliance, and mitigate risks—especially as they increasingly incorporate open-source components and AI-generated code into their workflows.

Wi-Fi Intrusion from neighboring networks, how to stop the Nearest Neighbor Attacks

Wireless networks have traditionally been a weak point in corporate cybersecurity. However, what was once a localized risk, limited to an office space, has now evolved into a more sophisticated threat, making detection more difficult.

Scaling Vector Databases With Novel Partitioning Methodologies

Imagine: A newly acquired dataset is being prepared for use as a vector database to retrieve information, create recommendation systems, be used for threat detection or similarity-based alert triage. During integration, however, operational challenges surface. Platform constraints prevent full-scale ingestion, prompting an arbitrary reduction in the size of the dataset. As a result, performance degrades significantly.

Arctic Wolf Observes July 2025 Uptick in Akira Ransomware Activity Targeting SonicWall SSL VPN

In late July 2025, Arctic Wolf observed an increase in ransomware activity targeting SonicWall firewall devices for initial access. In the intrusions reviewed, multiple pre-ransomware intrusions were observed within a short period of time, each involving VPN access through SonicWall SSL VPNs. While credential access through brute force, dictionary attacks, and credential stuffing have not yet been definitively ruled out in all cases, available evidence points to the existence of a zero-day vulnerability.

Introducing Mend Forge

Today, we’re thrilled to announce Mend Forge, our new AI native innovation engine and your window into what’s next in application security. At Mend.io, we believe that security innovation shouldn’t happen in a black box. The security landscape is shifting fast, driven by the explosive growth of AI generated code, AI powered applications, and rapidly evolving software supply chains.