Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Your AI Could Hack You #cybersecuritytips

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Preventing the Preventable: Tackling Internal Cloud Security Risks

Once the frontier of innovation, the cloud has become the battleground of operational discipline. As cloud complexity rises, the most common and costly security threats aren't advanced nation-state attacks. They're internal errors. According to the CSA's Top Threats to Cloud Computing Deep Dive 2025, more than half of reported cloud breaches stemmed from preventable issues like misconfigurations, IAM failures, and operational oversights. These are self-inflicted and are happening with alarming frequency.

Unlock seamless HIPAA compliance in multi-cloud environments with TrustCloud

In this article Organizations that treat HIPAA compliance as a living, breathing part of their operations, not just an annual checkbox, are the ones best positioned to protect patient data, mitigate risk, and build enduring trust with patients and partners.

How a Real Crypto API Exploit Let Users Change Asset Types #CryptoSecurity #CryptoExchange #crypto

A real-world API vulnerability let a user change the asset type in a major crypto exchange—bypassing expected controls. Watch how a simple tweak to API parameters enabled unauthorized trades and exposed critical flaws. Learn why detailed schema validation and input checks are essential for protecting sensitive financial APIs.

Loyalty Fraud Cost Businesses

Think credit card fraud is the biggest threat to eCommerce? Think again. Loyalty fraud cost businesses $4B in 2024, and most companies didn't see it coming. Why? Because the attack vector isn't obvious. It's: Credential stuffing + password spraying Poorly managed APIs connecting loyalty platforms to 3rd parties No real-time detection when the bad guys cash in points for untraceable gift cards.

What the Tea App Breach Reveals About Mobile Security in 2025

In July 2025, Tea Dating Advice—an app designed to help women vet dating partners—was thrust into the spotlight after a catastrophic data breach. International publications, including BBC, NPR, and The New York Times, reported that over 72,000 user images and 1.1 million private messages were leaked, exposing deeply sensitive information about more than 1.6 million users. The breach affected users who joined before February 2024 due to a failure to migrate legacy data to secure storage.

Mend & Cursor: Revolutionizing AI-Generated Code Security | Mend.io

Discover how AI is transforming software development with tools like Cursor IDE and Mend.io. In this video, Alex explains how Cursor’s AI First Code Editor simplifies complex tasks, enabling both experienced and new developers to build sophisticated applications faster than ever. Mend.io takes this transformation a step further by seamlessly integrating SAST and SCA directly into the Cursor IDE. This powerful combination ensures that AI-generated code is secure from the moment it’s written, with Mend.io’s Igenic performing rapid scans without slowing down the development process.