Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

FBI Report: Attackers Are Sending Physical Packages with Malicious QR Codes

The FBI has issued an advisory warning that scammers are distributing QR code phishing (quishing) links via unsolicited packages sent by snail mail. Recipients may scan the code to find out where the package came from, which will land them on a phishing page. This is a variation of a “brushing scam,” where unscrupulous vendors send packages designed to harvest information that can be used in phony positive reviews.

Top cyberattacks from the last six months: A deep dive into the digital battlefield

Cyberattacks today have become sophisticated digital disasters, capable of disrupting organizations within minutes. These attacks are no longer limited to surface-level exploits; threat actors now use advanced tactics to infiltrate and exploit trust within critical systems. As traditional security models struggle to keep up, organizations must adopt behavior-driven detection and proactive defense strategies.

Beyond Anomalies: How Autonomous Threat Hunting Uncovers the Full Attack Story

APIs are essential in today's digital landscape, supporting everything from mobile apps to vital backend systems. As their importance grows, they also become attractive targets for advanced attackers who bypass traditional security methods. These adversaries do not simply exploit API flaws; instead, they mimic normal user behavior to launch subtle, slow-and-low attacks that are difficult for conventional tools to detect.

What is DLL Sideloading? How to Detect and Prevent DLL Sideloading Attacks?

You update your antivirus. You install that fancy EDR. You think you’re safe. But, surprise, Hackers are still getting in without triggering a single alarm. By hijacking trusted apps and making them load malicious code, voluntarily. This sneaky move is called DLL Sideloading, and it’s becoming the cybercriminal’s favourite backdoor. Sounds horrifying? It is. But here’s the good news for you. If you understand how DLL sideloading works, you can catch it before it wrecks your system.

Turning Data Disaster into Strategy: Lessons to Learn from Malware Attacks

Malware, as one of many cyber threats, is not some random annoyance. Yet, there is nothing polite about it. It bypasses your firewall and establishes itself in your system. Then, escalated privileges are granted, and processes are killed. If you are particularly unlucky, malware encrypts your core and sticks around like a parasite in the CI/CD. So, it’s not about chaos but orchestration. That means you’re forgetting about something.

API Security Attack Vectors (2025): A Complete Guide

APIs run the show today. Whether it’s a mobile app fetching user data, a SaaS platform integrating with Stripe, or a microservice coordinating with ten others, APIs are the glue and the backbone. This is something that attackers are notoriously aware of. The challenge? Most security tooling still operates on a page-view and form-based model. It can’t view the business logic of API calls, like knowing who is supposed to do what on what object and in what context.

Wi-Fi Intrusion from neighboring networks, how to stop the Nearest Neighbor Attacks

Wireless networks have traditionally been a weak point in corporate cybersecurity. However, what was once a localized risk, limited to an office space, has now evolved into a more sophisticated threat, making detection more difficult.

Account Takeover Nightmare: Why You're Always Fighting Fires! #appsec #cybersecurity

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.