Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The latest News and Information on Application Security including monitoring, testing, and open source.

AI Governance in AppSec: The More Things Change, The More They Stay the Same

Every hype cycle brings fresh security concerns, and AI is no exception. AI governance might sound like uncharted territory, but it’s really just another evolution of the same security principles AppSec teams have been applying for years. The fundamentals—secure coding, risk management, compliance, and policy enforcement—haven’t changed.

Understanding your WAF: How to address common gaps in web application security

Web application firewalls (WAFs) are one of the most commonly used tools that organizations deploy to protect their applications at runtime. By monitoring HTTP traffic and filtering out suspicious requests, WAFs act as a protective layer around an application that protects it from certain types of incoming threats. However, WAFs often fall short of expectations.

Sensing and blocking JavaScript SQL injection attacks

You’ve heard about JavaScript SQL injection attacks before, but you’re not entirely sure what they look like in the wild or if you need to worry about them in the first place. Maybe you’re trying to figure out just how bad it could be. In short, if you’re building apps using SQL databases, like MySQL and PostgreSQL, you’re at risk—you’re not safe from attack methods plaguing developers and their databases for decades.

Best DevSecOps Tools for Application Security in 2025

Building secure applications is about more than just adding security features at the end of the development process. It’s about addressing vulnerabilities and threats as they arise and improving security continuously—right from the start. That’s the power of DevSecOps.

Automating SOC 2 Application Security with Jit + Drata

Checking off application security requirements for SOC 2 compliance is often a burden for everyone involved. Security and GRC teams need to manually upload evidence to SOC2 compliance systems like Drata, while development teams suddenly need to use code security scanners that throw wrenches in the SDLC.

Prisma and PostgreSQL vulnerable to NoSQL injection? A surprising security risk explained

Imagine you’re building a blogging web app using Prisma. You write a simple query to authenticate users based on their provided email and password: Looks harmless, right? But what if an attacker sends password = { "not": "" }? Instead of returning the User object only when email and password match, the query always returns the User when only the provided email matches. This vulnerability is known as operator injection, but it’s more commonly referred to as NoSQL injection.

How to Securely Embrace the AI Revolution in Software Development

Software development is one of the most impacted workflows in the Artificial Intelligence revolution. How will you handle the AI-driven revolution in software development securely? Check out this video to see how our innovation can help you stop risks in AI and the software supply chain at the start.

The Hidden Cost of Mobile App Security Gaps: Reasons Behind Top 5 Breaches Unveiled

In cybersecurity, learning the hard way is often the most expensive lesson. High-profile breaches that dominate headlines are more than just cautionary tales—they're stark reminders of what happens when critical gaps in monitoring and detection are ignored.

Mend.io, formerly known as Whitesource #securityvulnerability #coding

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.