<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>2024 Sonatype Blog</title>
    <link>https://www.sonatype.com/blog</link>
    <description>Conversations about software supply automation, devsecops, open source, continuous delivery, and application security.</description>
    <language>en</language>
    <pubDate>Fri, 17 Apr 2026 12:50:24 GMT</pubDate>
    <dc:date>2026-04-17T12:50:24Z</dc:date>
    <dc:language>en</dc:language>
    <item>
      <title>Mythos and the AI Vulnerability Storm: Exploring the Control Point</title>
      <link>https://www.sonatype.com/blog/mythos-and-the-ai-vulnerability-storm</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sonatype.com/blog/mythos-and-the-ai-vulnerability-storm" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sonatype.com/hubfs/1-2025_Website-Assets/2025_blog_images/Blog-AI-Vulnerability-Storm.jpg" alt="Mythos and the AI Vulnerability Storm: Exploring the Control Point" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;&lt;span&gt;The Inflection Point Is Here&lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span&gt;With &lt;a href="https://red.anthropic.com/2026/mythos-preview/"&gt;Mythos&lt;/a&gt;, Anthropic showed that AI can find vulnerabilities in minutes that once took skilled technologists months to find. This shift is a &lt;a href="https://labs.cloudsecurityalliance.org/mythos-ciso/"&gt;coming storm for developers&lt;/a&gt;. &lt;/span&gt;While no one knows the exact implications, how do you handle security remediation when vulnerability volume increases 2x, 5x, or even 10x — and issues are identified faster and with greater sophistication?&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sonatype.com/blog/mythos-and-the-ai-vulnerability-storm" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sonatype.com/hubfs/1-2025_Website-Assets/2025_blog_images/Blog-AI-Vulnerability-Storm.jpg" alt="Mythos and the AI Vulnerability Storm: Exploring the Control Point" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;&lt;span&gt;The Inflection Point Is Here&lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span&gt;With &lt;a href="https://red.anthropic.com/2026/mythos-preview/"&gt;Mythos&lt;/a&gt;, Anthropic showed that AI can find vulnerabilities in minutes that once took skilled technologists months to find. This shift is a &lt;a href="https://labs.cloudsecurityalliance.org/mythos-ciso/"&gt;coming storm for developers&lt;/a&gt;. &lt;/span&gt;While no one knows the exact implications, how do you handle security remediation when vulnerability volume increases 2x, 5x, or even 10x — and issues are identified faster and with greater sophistication?&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=1958393&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.sonatype.com%2Fblog%2Fmythos-and-the-ai-vulnerability-storm&amp;amp;bu=https%253A%252F%252Fwww.sonatype.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>secure software supply chain</category>
      <category>Application Vulnerabilities</category>
      <category>devsecops</category>
      <category>AI</category>
      <pubDate>Thu, 16 Apr 2026 17:15:03 GMT</pubDate>
      <guid>https://www.sonatype.com/blog/mythos-and-the-ai-vulnerability-storm</guid>
      <dc:date>2026-04-16T17:15:03Z</dc:date>
      <dc:creator>Mitchell Johnson</dc:creator>
    </item>
    <item>
      <title>When AI Writes Code, Who Governs the Dependencies?</title>
      <link>https://www.sonatype.com/blog/when-ai-writes-code-who-governs-the-dependencies</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sonatype.com/blog/when-ai-writes-code-who-governs-the-dependencies" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sonatype.com/hubfs/blog_fed_ai.png" alt="Image with a hexagon shape at center with the letters AI and a web icon" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span style="color: #444444;"&gt;Th&lt;span style="text-decoration: none;"&gt;e &lt;/span&gt;&lt;/span&gt;&lt;a href="https://www.war.gov/" style="text-decoration: none;"&gt;&lt;span style="color: #1155cc;"&gt;Department of War's&lt;/span&gt;&lt;/a&gt;&lt;a href="https://sam.gov/workspace/contract/opp/a13c653b5a1440fca2fb4457c192b5fb/view" style="text-decoration: none;"&gt;&lt;span style="color: #1155cc;"&gt;Call for Solutions on AI-enabled coding capabilities (CDAO_26-01)&lt;/span&gt;&lt;/a&gt;&lt;span style="color: #444444;"&gt;&lt;span style="text-decoration: none;"&gt; arrives at exa&lt;/span&gt;ctly the right moment. Today's AI coding assistants have moved beyond experiments in productivity to becoming the basis for how modern software is built. The DoW is right to close the gap with the commercial sector, and the Call for Solution's emphasis on security, data handling, and IL5 compliance reflects a clear-eyed understanding of what defense-grade deployment requires.&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sonatype.com/blog/when-ai-writes-code-who-governs-the-dependencies" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sonatype.com/hubfs/blog_fed_ai.png" alt="Image with a hexagon shape at center with the letters AI and a web icon" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span style="color: #444444;"&gt;Th&lt;span style="text-decoration: none;"&gt;e &lt;/span&gt;&lt;/span&gt;&lt;a href="https://www.war.gov/" style="text-decoration: none;"&gt;&lt;span style="color: #1155cc;"&gt;Department of War's&lt;/span&gt;&lt;/a&gt;&lt;a href="https://sam.gov/workspace/contract/opp/a13c653b5a1440fca2fb4457c192b5fb/view" style="text-decoration: none;"&gt;&lt;span style="color: #1155cc;"&gt;Call for Solutions on AI-enabled coding capabilities (CDAO_26-01)&lt;/span&gt;&lt;/a&gt;&lt;span style="color: #444444;"&gt;&lt;span style="text-decoration: none;"&gt; arrives at exa&lt;/span&gt;ctly the right moment. Today's AI coding assistants have moved beyond experiments in productivity to becoming the basis for how modern software is built. The DoW is right to close the gap with the commercial sector, and the Call for Solution's emphasis on security, data handling, and IL5 compliance reflects a clear-eyed understanding of what defense-grade deployment requires.&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=1958393&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.sonatype.com%2Fblog%2Fwhen-ai-writes-code-who-governs-the-dependencies&amp;amp;bu=https%253A%252F%252Fwww.sonatype.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>government</category>
      <category>dependencies</category>
      <category>State of the Software Supply Chain</category>
      <category>Sonatype Lifecycle</category>
      <category>federal</category>
      <category>Sonatype Repository Firewall</category>
      <category>artificial intelligence</category>
      <category>SBOM Manager</category>
      <category>AI</category>
      <pubDate>Thu, 16 Apr 2026 12:00:04 GMT</pubDate>
      <guid>https://www.sonatype.com/blog/when-ai-writes-code-who-governs-the-dependencies</guid>
      <dc:date>2026-04-16T12:00:04Z</dc:date>
      <dc:creator>Tom Tapley</dc:creator>
    </item>
    <item>
      <title>Why Software Supply Chain Security Requires a New Playbook</title>
      <link>https://www.sonatype.com/blog/why-software-supply-chain-security-requires-a-new-playbook</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sonatype.com/blog/why-software-supply-chain-security-requires-a-new-playbook" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sonatype.com/hubfs/blog_gartner_supply_chain_risk.jpg" alt="Image of skull icon on a computer monitor flanked by upward arrows, signifying increases in malware and vulnerabilities" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;Software is being built faster than ever, but application security has not kept up.&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sonatype.com/blog/why-software-supply-chain-security-requires-a-new-playbook" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sonatype.com/hubfs/blog_gartner_supply_chain_risk.jpg" alt="Image of skull icon on a computer monitor flanked by upward arrows, signifying increases in malware and vulnerabilities" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;Software is being built faster than ever, but application security has not kept up.&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=1958393&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.sonatype.com%2Fblog%2Fwhy-software-supply-chain-security-requires-a-new-playbook&amp;amp;bu=https%253A%252F%252Fwww.sonatype.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>secure software supply chain</category>
      <category>Software Supply Chain</category>
      <category>analyst report</category>
      <category>Gartner</category>
      <category>Software composition analysis</category>
      <category>report</category>
      <category>CI/CD</category>
      <pubDate>Wed, 15 Apr 2026 13:00:06 GMT</pubDate>
      <author>alinskens@sonatype.com (Aaron Linskens)</author>
      <guid>https://www.sonatype.com/blog/why-software-supply-chain-security-requires-a-new-playbook</guid>
      <dc:date>2026-04-15T13:00:06Z</dc:date>
    </item>
    <item>
      <title>Q1 2026 Open Source Malware Index: Adaptive Attacks Exploit Trust</title>
      <link>https://www.sonatype.com/blog/q1-2026-open-source-malware-index</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sonatype.com/blog/q1-2026-open-source-malware-index" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sonatype.com/hubfs/blog_osmiQ12026.jpg" alt="Q1 2026 Open Source Malware Index: Adaptive Attacks Exploit Trust" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2 style="font-size: 30px; font-weight: normal;"&gt;TL;DR&lt;/h2&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;Sonatype identified 21,764 open source malware packages in Q1 2026, bringing the total logged since 2017 to 1,346,867.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;npm accounted for 75% of malicious packages this quarter. Trojans dominated, with most activity focused on credential theft, host reconnaissance, and staged payload delivery.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;The quarter's defining pattern was trust abuse: attackers succeeded by hiding behind trusted packages, trusted release paths, and trusted workflows.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Three incidents stood out: SANDWORM_MODE, the LiteLLM compromise, and the axios compromise.&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;h2 style="font-size: 30px; font-weight: normal;"&gt;By the Numbers: What We Saw&lt;/h2&gt; 
&lt;p&gt;In the first three months of 2026, Sonatype identified 21,764 open source malware packages across ecosystems, bringing the total number logged since 2017 to 1,346,867. Q1 activity was heavily concentrated in npm and focused on credential theft, host information exfiltration, and staged follow-on compromise.&lt;/p&gt; 
&lt;p&gt;The quarter was also defined by trojan-style malware, which outpaced brandjacking and hijacking as the dominant payload type. While access paths varied — typosquatting, maintainer compromise, and abuse of legitimate release channels — the pattern was consistent: attackers kept finding ways to push malware through software that looked legitimate enough to trust by default.&lt;/p&gt; 
&lt;p&gt;Three incidents illustrate that pattern especially clearly:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;&lt;a href="https://guide.sonatype.com/vulnerability/sonatype-2026-000542" style="text-decoration: none; font-weight: normal;"&gt;SANDWORM_MODE&lt;/a&gt;&lt;span&gt;, which pointed to more adaptive and worm-like malware behavior.&lt;/span&gt;&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Th&lt;span style="text-decoration: none;"&gt;e &lt;/span&gt;&lt;span style="font-weight: normal;"&gt;&lt;a style="text-decoration: none;"&gt;&lt;/a&gt;&lt;a href="https://guide.sonatype.com/component/golang/github.com%2Faquasecurity%2Ftrivy/v0.69.4/vulnerabilities?severities=critical" style="text-decoration: none;"&gt;&lt;/a&gt;&lt;a href="https://guide.sonatype.com/component/golang/github.com%2Faquasecurity%2Ftrivy/v0.69.4/vulnerabilities?severities=critical" style="text-decoration: none;"&gt;Trivy&lt;/a&gt;&lt;span style="text-decoration: none;"&gt;/&lt;/span&gt;&lt;a href="https://guide.sonatype.com/vulnerability/sonatype-2026-001357" style="text-decoration: none;"&gt;litellm&lt;/a&gt;&lt;span style="text-decoration: none;"&gt;-lin&lt;/span&gt;ked campaign&lt;/span&gt;&lt;span&gt;, which showed how release paths and high-value AI and security tooling can become the attack surface.&lt;/span&gt;&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;T&lt;span style="text-decoration: none;"&gt;he &lt;/span&gt;&lt;span style="font-weight: normal;"&gt;&lt;a style="text-decoration: none;"&gt;&lt;/a&gt;&lt;a href="https://guide.sonatype.com/component/npm/axios/1.14.1" style="text-decoration: none;"&gt;&lt;/a&gt;&lt;a href="https://guide.sonatype.com/component/npm/axios/1.14.1" style="text-decoration: none;"&gt;axios&lt;/a&gt;&lt;span style="text-decoration: none;"&gt; comp&lt;/span&gt;romise&lt;/span&gt;&lt;span&gt;, which demonstrated how a small dependency change inside a highly trusted package can create outsized downstream risk. &lt;/span&gt;&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;&lt;span style="color: #ff00ff; white-space-collapse: preserve;"&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;h2 style="font-size: 30px; font-weight: normal;"&gt;Beyond the Numbers: Trust Abuse Was the Defining Pattern&lt;/h2&gt; 
&lt;p&gt;Q1 saw one new malicious package every six minutes, a&lt;span style="text-decoration: none;"&gt;nd &lt;/span&gt;&lt;a href="https://www.sonatype.com/blog/sonatype-discovers-two-malicious-npm-packages" style="text-decoration: none;"&gt;&lt;span style="color: #1155cc;"&gt;npm&lt;/span&gt;&lt;/a&gt;&lt;span style="text-decoration: none;"&gt; acc&lt;/span&gt;ounted for 75%, reinforcing that attackers still see JavaScript ecosystems as the fastest path to developers and build systems at scale. The prevalence of trojans far showed attackers did not need especially novel tactics to succeed. In many cases, the playbook was simple: publish something plausible, get it installed, and execute inside a trusted workflow.&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;The most common behaviors — credential theft, host information exfiltration, and droppers for follow-on compromise — point to the same conclusion. These campaigns were designed for access, persistence, and reuse inside developer and CI/CD environments.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;The core risk in Q1 was not just malicious code entering the ecosystem. It was malicious code entering through trusted names, trusted workflows, and trusted environments.&lt;/span&gt;&lt;/p&gt; 
&lt;h2 style="font-size: 30px; font-weight: normal;"&gt;SANDWORM_MODE: Supply Chain Malware Got More Worm-Like&lt;/h2&gt; 
&lt;p&gt;SANDWORM_MODE was one of Q1's clearest signs that open source malware is b&lt;span style="text-decoration: none;"&gt;ecoming &lt;/span&gt;&lt;a href="https://www.sonatype.com/blog/sandworm_mode-the-rise-of-adaptive-supply-chain-worms" style="text-decoration: none;"&gt;&lt;span style="color: #1155cc;"&gt;more adaptive and automated&lt;/span&gt;&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;&lt;span style="text-decoration: none;"&gt;The campai&lt;/span&gt;gn used typosquatted npm packages to harvest sensitive data from developer machines and CI environments. Sonatype observed theft of npm and GitHub tokens, environment variables, cryptographic keys, and API credentials, along with code aimed at spreading into additional repositories and workflows.&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Researchers also found code designed to interact with a local Ollama instance, suggesting early experimentation with malware that could modify itself inside compromised environments.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;What made SANDWORM_MODE important was not just that it spread. It showed attackers building malware to take advantage of the automation and trust built into modern software delivery.&lt;/span&gt;&lt;/p&gt; 
&lt;h2 style="font-size: 30px; font-weight: normal;"&gt;Trivy Hijack: Trusted Release Paths Became the Attack Surface&lt;/h2&gt; 
&lt;p&gt;&lt;span&gt;The Trivy incident stood out because it was not just a compromised package story. It was a supply chain attack that linked trusted security tooling to malicious code insertion in another widely used project.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;In March 2026, a compromised version of th&lt;span style="text-decoration: none;"&gt;e &lt;/span&gt;Trivy security scanner was used&lt;span style="text-decoration: none;"&gt; to he&lt;/span&gt;lp facilitate the insertion of &lt;a href="https://www.sonatype.com/blog/compromised-litellm-pypi-package-delivers-multi-stage-credential-stealer" style="text-decoration: none;"&gt;malicious code into the LiteLLM library&lt;/a&gt;. That made the attack especially significant: the issue was not simply a fake package or a one-off malicious upload, but the abuse of a trusted tool inside the software delivery chain.&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;The related LiteLLM compromise involved malicious PyPI versions 1.82.7 and 1.82.8, which contained an obfuscated credential stealer and dropper. The malware targeted API keys, environment variables, SSH keys, Git credentials, cloud secrets, Kubernetes tokens, Terraform and Helm artifacts, and CI/CD configuration, then established persistence through sysmon.py.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;What made this incident so important in Q1 was the attack path itself. Once attackers can compromise a trusted tool or release workflow, they no longer need to rely on obvious deception. They can use legitimate software and trusted delivery paths to move malicious code downstream.&lt;/span&gt;&lt;/p&gt; 
&lt;h2 style="font-size: 30px; font-weight: normal;"&gt;Axios Compromise: Small Change, Large Blast Radius&lt;/h2&gt; 
&lt;p&gt;T&lt;span style="text-decoration: none;"&gt;he &lt;/span&gt;&lt;a href="https://www.sonatype.com/blog/axios-compromise-on-npm-introduces-hidden-malicious-package" style="text-decoration: none;"&gt;&lt;span style="color: #1155cc;"&gt;axios compromise showed&lt;/span&gt;&lt;/a&gt;&lt;span style="text-decoration: none;"&gt; h&lt;/span&gt;ow little an attacker needs to change to create downstream risk. Attackers hijacked an npm publishing account and released axios@1.14.1 and axios@0.30.4 with a hidden dependency on &lt;a href="https://guide.sonatype.com/component/npm/plain-crypto-js/4.2.1" style="text-decoration: none;"&gt;plain-crypto-js@4.2.1&lt;/a&gt;. That package acted as an obfuscated loader, using npm's postinstall hook to fetch and run a secondary payload.&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Researchers found OS-specific launcher behavior for MacOS, Windows, and Linux, consistent with delivery of a remote access trojan. The attack also used cleanup and metadata tricks to make analysis harder.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;The lesson was straightforward: attackers did not need to rewrite a popular library. They only needed to insert a malicious transitive dependency into a package developers already trusted.&lt;/span&gt;&lt;/p&gt; 
&lt;h2 style="font-size: 30px; font-weight: normal;"&gt;What Development Teams Should Take Away&lt;/h2&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;&lt;span&gt;Screen components before use. &lt;/span&gt;&lt;/strong&gt;&lt;span&gt;New packages and updates should be evaluated before they reach developer machines or CI pipelines.&lt;/span&gt;&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;&lt;span&gt;Inspect transitive dependencies. &lt;/span&gt;&lt;/strong&gt;&lt;span&gt;The axios incident showed how malware can arrive through a hidden child package, not just the top-level dependency.&lt;/span&gt;&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;&lt;span&gt;Treat dev and CI environments as high-value targets. &lt;/span&gt;&lt;/strong&gt;&lt;span&gt;Q1 malware repeatedly targeted tokens, cloud credentials, SSH material, and pipeline secrets.&lt;/span&gt;&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;&lt;span&gt;Assume credential exposure after execution. &lt;/span&gt;&lt;/strong&gt;&lt;span&gt;In incidents like LiteLLM or axios, package removal is not enough. Rotate secrets and review affected environments.&lt;/span&gt;&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;&lt;span&gt;Watch release paths, not just package names. &lt;/span&gt;&lt;/strong&gt;&lt;span&gt;Maintainer accounts, publishing workflows, and release automation are part of the attack surface.&lt;/span&gt;&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;&lt;span&gt;Do not rely on reputation alone. &lt;/span&gt;&lt;/strong&gt;&lt;span&gt;Familiar names and popular packages are no longer strong trust signals by themselves.&lt;/span&gt;&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;h2 style="font-size: 30px; font-weight: normal;"&gt;Looking Ahead&lt;/h2&gt; 
&lt;p&gt;&lt;span&gt;Q1 reinforced a consistent reality: the most effective attacks did not rely on obviously malicious packages. They relied on appearing trustworthy by hiding inside familiar names, legitimate workflows, and routine dependency updates.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Prevention is less about reacting after-the-fact and more about making better decisions before code is ever used.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;In practice, that means having access to reliable, &lt;a href="https://www.sonatype.com/products/sonatype-guide" style="text-decoration: none;"&gt;real-time intelligence about open source packages&lt;/a&gt; that highlights unusual behavior, known risks, or patterns that do not align with normal development activity.&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Tools like Sonatype Guide are designed to surface that kind of context directly to developers, making it easier to evaluate dependencies and avoid high-risk components before they enter the build.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;As Q1 showed, attackers consistently took advantage of assumed trust. The teams that reduce risk most effectively will replace that assumption with visibility and make informed decisions a routine part of development.&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sonatype.com/blog/q1-2026-open-source-malware-index" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sonatype.com/hubfs/blog_osmiQ12026.jpg" alt="Q1 2026 Open Source Malware Index: Adaptive Attacks Exploit Trust" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2 style="font-size: 30px; font-weight: normal;"&gt;TL;DR&lt;/h2&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;Sonatype identified 21,764 open source malware packages in Q1 2026, bringing the total logged since 2017 to 1,346,867.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;npm accounted for 75% of malicious packages this quarter. Trojans dominated, with most activity focused on credential theft, host reconnaissance, and staged payload delivery.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;The quarter's defining pattern was trust abuse: attackers succeeded by hiding behind trusted packages, trusted release paths, and trusted workflows.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Three incidents stood out: SANDWORM_MODE, the LiteLLM compromise, and the axios compromise.&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;h2 style="font-size: 30px; font-weight: normal;"&gt;By the Numbers: What We Saw&lt;/h2&gt; 
&lt;p&gt;In the first three months of 2026, Sonatype identified 21,764 open source malware packages across ecosystems, bringing the total number logged since 2017 to 1,346,867. Q1 activity was heavily concentrated in npm and focused on credential theft, host information exfiltration, and staged follow-on compromise.&lt;/p&gt; 
&lt;p&gt;The quarter was also defined by trojan-style malware, which outpaced brandjacking and hijacking as the dominant payload type. While access paths varied — typosquatting, maintainer compromise, and abuse of legitimate release channels — the pattern was consistent: attackers kept finding ways to push malware through software that looked legitimate enough to trust by default.&lt;/p&gt; 
&lt;p&gt;Three incidents illustrate that pattern especially clearly:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;&lt;a href="https://guide.sonatype.com/vulnerability/sonatype-2026-000542" style="text-decoration: none; font-weight: normal;"&gt;SANDWORM_MODE&lt;/a&gt;&lt;span&gt;, which pointed to more adaptive and worm-like malware behavior.&lt;/span&gt;&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Th&lt;span style="text-decoration: none;"&gt;e &lt;/span&gt;&lt;span style="font-weight: normal;"&gt;&lt;a style="text-decoration: none;"&gt;&lt;/a&gt;&lt;a href="https://guide.sonatype.com/component/golang/github.com%2Faquasecurity%2Ftrivy/v0.69.4/vulnerabilities?severities=critical" style="text-decoration: none;"&gt;&lt;/a&gt;&lt;a href="https://guide.sonatype.com/component/golang/github.com%2Faquasecurity%2Ftrivy/v0.69.4/vulnerabilities?severities=critical" style="text-decoration: none;"&gt;Trivy&lt;/a&gt;&lt;span style="text-decoration: none;"&gt;/&lt;/span&gt;&lt;a href="https://guide.sonatype.com/vulnerability/sonatype-2026-001357" style="text-decoration: none;"&gt;litellm&lt;/a&gt;&lt;span style="text-decoration: none;"&gt;-lin&lt;/span&gt;ked campaign&lt;/span&gt;&lt;span&gt;, which showed how release paths and high-value AI and security tooling can become the attack surface.&lt;/span&gt;&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;T&lt;span style="text-decoration: none;"&gt;he &lt;/span&gt;&lt;span style="font-weight: normal;"&gt;&lt;a style="text-decoration: none;"&gt;&lt;/a&gt;&lt;a href="https://guide.sonatype.com/component/npm/axios/1.14.1" style="text-decoration: none;"&gt;&lt;/a&gt;&lt;a href="https://guide.sonatype.com/component/npm/axios/1.14.1" style="text-decoration: none;"&gt;axios&lt;/a&gt;&lt;span style="text-decoration: none;"&gt; comp&lt;/span&gt;romise&lt;/span&gt;&lt;span&gt;, which demonstrated how a small dependency change inside a highly trusted package can create outsized downstream risk. &lt;/span&gt;&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;&lt;span style="color: #ff00ff; white-space-collapse: preserve;"&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;h2 style="font-size: 30px; font-weight: normal;"&gt;Beyond the Numbers: Trust Abuse Was the Defining Pattern&lt;/h2&gt; 
&lt;p&gt;Q1 saw one new malicious package every six minutes, a&lt;span style="text-decoration: none;"&gt;nd &lt;/span&gt;&lt;a href="https://www.sonatype.com/blog/sonatype-discovers-two-malicious-npm-packages" style="text-decoration: none;"&gt;&lt;span style="color: #1155cc;"&gt;npm&lt;/span&gt;&lt;/a&gt;&lt;span style="text-decoration: none;"&gt; acc&lt;/span&gt;ounted for 75%, reinforcing that attackers still see JavaScript ecosystems as the fastest path to developers and build systems at scale. The prevalence of trojans far showed attackers did not need especially novel tactics to succeed. In many cases, the playbook was simple: publish something plausible, get it installed, and execute inside a trusted workflow.&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;The most common behaviors — credential theft, host information exfiltration, and droppers for follow-on compromise — point to the same conclusion. These campaigns were designed for access, persistence, and reuse inside developer and CI/CD environments.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;The core risk in Q1 was not just malicious code entering the ecosystem. It was malicious code entering through trusted names, trusted workflows, and trusted environments.&lt;/span&gt;&lt;/p&gt; 
&lt;h2 style="font-size: 30px; font-weight: normal;"&gt;SANDWORM_MODE: Supply Chain Malware Got More Worm-Like&lt;/h2&gt; 
&lt;p&gt;SANDWORM_MODE was one of Q1's clearest signs that open source malware is b&lt;span style="text-decoration: none;"&gt;ecoming &lt;/span&gt;&lt;a href="https://www.sonatype.com/blog/sandworm_mode-the-rise-of-adaptive-supply-chain-worms" style="text-decoration: none;"&gt;&lt;span style="color: #1155cc;"&gt;more adaptive and automated&lt;/span&gt;&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;&lt;span style="text-decoration: none;"&gt;The campai&lt;/span&gt;gn used typosquatted npm packages to harvest sensitive data from developer machines and CI environments. Sonatype observed theft of npm and GitHub tokens, environment variables, cryptographic keys, and API credentials, along with code aimed at spreading into additional repositories and workflows.&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Researchers also found code designed to interact with a local Ollama instance, suggesting early experimentation with malware that could modify itself inside compromised environments.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;What made SANDWORM_MODE important was not just that it spread. It showed attackers building malware to take advantage of the automation and trust built into modern software delivery.&lt;/span&gt;&lt;/p&gt; 
&lt;h2 style="font-size: 30px; font-weight: normal;"&gt;Trivy Hijack: Trusted Release Paths Became the Attack Surface&lt;/h2&gt; 
&lt;p&gt;&lt;span&gt;The Trivy incident stood out because it was not just a compromised package story. It was a supply chain attack that linked trusted security tooling to malicious code insertion in another widely used project.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;In March 2026, a compromised version of th&lt;span style="text-decoration: none;"&gt;e &lt;/span&gt;Trivy security scanner was used&lt;span style="text-decoration: none;"&gt; to he&lt;/span&gt;lp facilitate the insertion of &lt;a href="https://www.sonatype.com/blog/compromised-litellm-pypi-package-delivers-multi-stage-credential-stealer" style="text-decoration: none;"&gt;malicious code into the LiteLLM library&lt;/a&gt;. That made the attack especially significant: the issue was not simply a fake package or a one-off malicious upload, but the abuse of a trusted tool inside the software delivery chain.&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;The related LiteLLM compromise involved malicious PyPI versions 1.82.7 and 1.82.8, which contained an obfuscated credential stealer and dropper. The malware targeted API keys, environment variables, SSH keys, Git credentials, cloud secrets, Kubernetes tokens, Terraform and Helm artifacts, and CI/CD configuration, then established persistence through sysmon.py.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;What made this incident so important in Q1 was the attack path itself. Once attackers can compromise a trusted tool or release workflow, they no longer need to rely on obvious deception. They can use legitimate software and trusted delivery paths to move malicious code downstream.&lt;/span&gt;&lt;/p&gt; 
&lt;h2 style="font-size: 30px; font-weight: normal;"&gt;Axios Compromise: Small Change, Large Blast Radius&lt;/h2&gt; 
&lt;p&gt;T&lt;span style="text-decoration: none;"&gt;he &lt;/span&gt;&lt;a href="https://www.sonatype.com/blog/axios-compromise-on-npm-introduces-hidden-malicious-package" style="text-decoration: none;"&gt;&lt;span style="color: #1155cc;"&gt;axios compromise showed&lt;/span&gt;&lt;/a&gt;&lt;span style="text-decoration: none;"&gt; h&lt;/span&gt;ow little an attacker needs to change to create downstream risk. Attackers hijacked an npm publishing account and released axios@1.14.1 and axios@0.30.4 with a hidden dependency on &lt;a href="https://guide.sonatype.com/component/npm/plain-crypto-js/4.2.1" style="text-decoration: none;"&gt;plain-crypto-js@4.2.1&lt;/a&gt;. That package acted as an obfuscated loader, using npm's postinstall hook to fetch and run a secondary payload.&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Researchers found OS-specific launcher behavior for MacOS, Windows, and Linux, consistent with delivery of a remote access trojan. The attack also used cleanup and metadata tricks to make analysis harder.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;The lesson was straightforward: attackers did not need to rewrite a popular library. They only needed to insert a malicious transitive dependency into a package developers already trusted.&lt;/span&gt;&lt;/p&gt; 
&lt;h2 style="font-size: 30px; font-weight: normal;"&gt;What Development Teams Should Take Away&lt;/h2&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;&lt;span&gt;Screen components before use. &lt;/span&gt;&lt;/strong&gt;&lt;span&gt;New packages and updates should be evaluated before they reach developer machines or CI pipelines.&lt;/span&gt;&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;&lt;span&gt;Inspect transitive dependencies. &lt;/span&gt;&lt;/strong&gt;&lt;span&gt;The axios incident showed how malware can arrive through a hidden child package, not just the top-level dependency.&lt;/span&gt;&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;&lt;span&gt;Treat dev and CI environments as high-value targets. &lt;/span&gt;&lt;/strong&gt;&lt;span&gt;Q1 malware repeatedly targeted tokens, cloud credentials, SSH material, and pipeline secrets.&lt;/span&gt;&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;&lt;span&gt;Assume credential exposure after execution. &lt;/span&gt;&lt;/strong&gt;&lt;span&gt;In incidents like LiteLLM or axios, package removal is not enough. Rotate secrets and review affected environments.&lt;/span&gt;&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;&lt;span&gt;Watch release paths, not just package names. &lt;/span&gt;&lt;/strong&gt;&lt;span&gt;Maintainer accounts, publishing workflows, and release automation are part of the attack surface.&lt;/span&gt;&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;&lt;span&gt;Do not rely on reputation alone. &lt;/span&gt;&lt;/strong&gt;&lt;span&gt;Familiar names and popular packages are no longer strong trust signals by themselves.&lt;/span&gt;&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;h2 style="font-size: 30px; font-weight: normal;"&gt;Looking Ahead&lt;/h2&gt; 
&lt;p&gt;&lt;span&gt;Q1 reinforced a consistent reality: the most effective attacks did not rely on obviously malicious packages. They relied on appearing trustworthy by hiding inside familiar names, legitimate workflows, and routine dependency updates.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Prevention is less about reacting after-the-fact and more about making better decisions before code is ever used.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;In practice, that means having access to reliable, &lt;a href="https://www.sonatype.com/products/sonatype-guide" style="text-decoration: none;"&gt;real-time intelligence about open source packages&lt;/a&gt; that highlights unusual behavior, known risks, or patterns that do not align with normal development activity.&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Tools like Sonatype Guide are designed to surface that kind of context directly to developers, making it easier to evaluate dependencies and avoid high-risk components before they enter the build.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;As Q1 showed, attackers consistently took advantage of assumed trust. The teams that reduce risk most effectively will replace that assumption with visibility and make informed decisions a routine part of development.&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=1958393&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.sonatype.com%2Fblog%2Fq1-2026-open-source-malware-index&amp;amp;bu=https%253A%252F%252Fwww.sonatype.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>vulnerabilities</category>
      <category>open source management</category>
      <category>Everything Open Source</category>
      <category>Malware Analysis</category>
      <category>Malware</category>
      <category>open source malware</category>
      <pubDate>Tue, 14 Apr 2026 10:00:00 GMT</pubDate>
      <author>research@sonatype.com (Sonatype Security Research Team)</author>
      <guid>https://www.sonatype.com/blog/q1-2026-open-source-malware-index</guid>
      <dc:date>2026-04-14T10:00:00Z</dc:date>
    </item>
    <item>
      <title>Modernizing Nexus Repository: Moving Beyond OrientDB</title>
      <link>https://www.sonatype.com/blog/modernizing-nexus-repository-moving-beyond-orientdb</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sonatype.com/blog/modernizing-nexus-repository-moving-beyond-orientdb" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sonatype.com/hubfs/blog_orientdb_migration.jpg" alt="Image with two logos of different database management systems, one for OrientDB and one for Postgresql" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;If you're runn&lt;span style="text-decoration: none;"&gt;ing &lt;/span&gt;&lt;a href="https://www.sonatype.com/products/sonatype-nexus-repository" style="text-decoration: none;"&gt;&lt;span style="color: #1155cc;"&gt;Sonatype Nexus Repository&lt;/span&gt;&lt;/a&gt; or &lt;a href="https://www.sonatype.com/products/nexus-community-edition-download" style="text-decoration: none;"&gt;&lt;span style="color: #1155cc;"&gt;Sonatype Nexus Repository Community Edition&lt;/span&gt;&lt;/a&gt; (formerly known as Nexus Repository OSS) on &lt;a href="https://orientdb.dev/" style="text-decoration: none;"&gt;&lt;span style="color: #1155cc;"&gt;OrientDB&lt;/span&gt;&lt;/a&gt;&lt;span style="text-decoration: none;"&gt;, yo&lt;/span&gt;u're operating on a legacy database architecture that is no longer aligned with current security and platform requirements.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sonatype.com/blog/modernizing-nexus-repository-moving-beyond-orientdb" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sonatype.com/hubfs/blog_orientdb_migration.jpg" alt="Image with two logos of different database management systems, one for OrientDB and one for Postgresql" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;If you're runn&lt;span style="text-decoration: none;"&gt;ing &lt;/span&gt;&lt;a href="https://www.sonatype.com/products/sonatype-nexus-repository" style="text-decoration: none;"&gt;&lt;span style="color: #1155cc;"&gt;Sonatype Nexus Repository&lt;/span&gt;&lt;/a&gt; or &lt;a href="https://www.sonatype.com/products/nexus-community-edition-download" style="text-decoration: none;"&gt;&lt;span style="color: #1155cc;"&gt;Sonatype Nexus Repository Community Edition&lt;/span&gt;&lt;/a&gt; (formerly known as Nexus Repository OSS) on &lt;a href="https://orientdb.dev/" style="text-decoration: none;"&gt;&lt;span style="color: #1155cc;"&gt;OrientDB&lt;/span&gt;&lt;/a&gt;&lt;span style="text-decoration: none;"&gt;, yo&lt;/span&gt;u're operating on a legacy database architecture that is no longer aligned with current security and platform requirements.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=1958393&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.sonatype.com%2Fblog%2Fmodernizing-nexus-repository-moving-beyond-orientdb&amp;amp;bu=https%253A%252F%252Fwww.sonatype.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>repository</category>
      <category>migration</category>
      <category>cloud</category>
      <category>Enterprise Repository Management</category>
      <category>Nexus Repository</category>
      <category>Modern Infrastructure</category>
      <category>Nexus Repository OSS</category>
      <category>postgresql</category>
      <category>Sonatype Nexus Repository</category>
      <pubDate>Thu, 09 Apr 2026 18:55:43 GMT</pubDate>
      <author>alinskens@sonatype.com (Aaron Linskens)</author>
      <guid>https://www.sonatype.com/blog/modernizing-nexus-repository-moving-beyond-orientdb</guid>
      <dc:date>2026-04-09T18:55:43Z</dc:date>
    </item>
    <item>
      <title>AI, DevSecOps, and the Future of Application Security: The Gartner® Report</title>
      <link>https://www.sonatype.com/blog/ai-devsecops-and-the-future-of-application-security-the-gartner-report</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sonatype.com/blog/ai-devsecops-and-the-future-of-application-security-the-gartner-report" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sonatype.com/hubfs/blog_gartner_appsec1.jpg" alt="Image of a digital environment with three large sets of code brackets" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;Even as organizations recognize the importance of application security, most still struggle to operationalize it at scale. That gap becomes harder to ignore as development accelerates, AI becomes embedded in workflows, and software supply chains grow more complex.&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sonatype.com/blog/ai-devsecops-and-the-future-of-application-security-the-gartner-report" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sonatype.com/hubfs/blog_gartner_appsec1.jpg" alt="Image of a digital environment with three large sets of code brackets" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;Even as organizations recognize the importance of application security, most still struggle to operationalize it at scale. That gap becomes harder to ignore as development accelerates, AI becomes embedded in workflows, and software supply chains grow more complex.&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=1958393&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.sonatype.com%2Fblog%2Fai-devsecops-and-the-future-of-application-security-the-gartner-report&amp;amp;bu=https%253A%252F%252Fwww.sonatype.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>analyst report</category>
      <category>Application Security</category>
      <category>devsecops</category>
      <category>Gartner</category>
      <category>developers</category>
      <category>report</category>
      <category>artificial intelligence</category>
      <category>AI</category>
      <pubDate>Tue, 07 Apr 2026 14:47:49 GMT</pubDate>
      <author>alinskens@sonatype.com (Aaron Linskens)</author>
      <guid>https://www.sonatype.com/blog/ai-devsecops-and-the-future-of-application-security-the-gartner-report</guid>
      <dc:date>2026-04-07T14:47:49Z</dc:date>
    </item>
    <item>
      <title>How Sonatype's Container Scanning Protects You From Zero-Days</title>
      <link>https://www.sonatype.com/blog/how-sonatypes-container-scanning-protects-you-from-zero-days</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sonatype.com/blog/how-sonatypes-container-scanning-protects-you-from-zero-days" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sonatype.com/hubfs/blog_container_scanning.jpg" alt="Image of hexagon shape with an icon of a magnifying glass at the center" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Software development moves fast, and engineering teams face intense pressure to deliver applications securely without slowing down. Containers offer incredible speed and portability, allowing developers to build and deploy applications rapidly. But this spe&lt;span style="text-decoration: none;"&gt;ed &lt;/span&gt;&lt;a href="https://www.sonatype.com/state-of-the-software-supply-chain/2026/software-infrastructure-growth" style="text-decoration: none;"&gt;&lt;span style="color: #1155cc;"&gt;introduces hidden risks&lt;/span&gt;&lt;/a&gt;&lt;span style="text-decoration: none;"&gt; w&lt;/span&gt;hen organizations rely on inadequate tools to secure their environments.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sonatype.com/blog/how-sonatypes-container-scanning-protects-you-from-zero-days" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sonatype.com/hubfs/blog_container_scanning.jpg" alt="Image of hexagon shape with an icon of a magnifying glass at the center" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Software development moves fast, and engineering teams face intense pressure to deliver applications securely without slowing down. Containers offer incredible speed and portability, allowing developers to build and deploy applications rapidly. But this spe&lt;span style="text-decoration: none;"&gt;ed &lt;/span&gt;&lt;a href="https://www.sonatype.com/state-of-the-software-supply-chain/2026/software-infrastructure-growth" style="text-decoration: none;"&gt;&lt;span style="color: #1155cc;"&gt;introduces hidden risks&lt;/span&gt;&lt;/a&gt;&lt;span style="text-decoration: none;"&gt; w&lt;/span&gt;hen organizations rely on inadequate tools to secure their environments.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=1958393&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.sonatype.com%2Fblog%2Fhow-sonatypes-container-scanning-protects-you-from-zero-days&amp;amp;bu=https%253A%252F%252Fwww.sonatype.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>vulnerability</category>
      <category>secure software supply chain</category>
      <category>vulnerabilities</category>
      <category>code scanning</category>
      <category>containers</category>
      <category>container</category>
      <category>scan</category>
      <category>Container Security</category>
      <pubDate>Wed, 01 Apr 2026 13:00:00 GMT</pubDate>
      <guid>https://www.sonatype.com/blog/how-sonatypes-container-scanning-protects-you-from-zero-days</guid>
      <dc:date>2026-04-01T13:00:00Z</dc:date>
      <dc:creator>Crystal Derakhshan</dc:creator>
    </item>
    <item>
      <title>Axios Compromise on npm Introduces Hidden Malicious Package</title>
      <link>https://www.sonatype.com/blog/axios-compromise-on-npm-introduces-hidden-malicious-package</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sonatype.com/blog/axios-compromise-on-npm-introduces-hidden-malicious-package" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sonatype.com/hubfs/blog_axios_compromised.jpg" alt="Image of a slide with information on new malicious packages found in npm and Sonatype research" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;A newly discovered software supply chain attack targeting the npm ecosystem briefly compromised one of the most widely used JavaScript libraries in the world.&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sonatype.com/blog/axios-compromise-on-npm-introduces-hidden-malicious-package" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sonatype.com/hubfs/blog_axios_compromised.jpg" alt="Image of a slide with information on new malicious packages found in npm and Sonatype research" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;A newly discovered software supply chain attack targeting the npm ecosystem briefly compromised one of the most widely used JavaScript libraries in the world.&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=1958393&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.sonatype.com%2Fblog%2Faxios-compromise-on-npm-introduces-hidden-malicious-package&amp;amp;bu=https%253A%252F%252Fwww.sonatype.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>npm</category>
      <category>security research</category>
      <category>malicious code npm</category>
      <category>Malware Analysis</category>
      <category>Malware</category>
      <category>open source malware</category>
      <category>Sonatype Guide</category>
      <category>Sonatype Research</category>
      <pubDate>Tue, 31 Mar 2026 20:31:30 GMT</pubDate>
      <author>research@sonatype.com (Sonatype Security Research Team)</author>
      <guid>https://www.sonatype.com/blog/axios-compromise-on-npm-introduces-hidden-malicious-package</guid>
      <dc:date>2026-03-31T20:31:30Z</dc:date>
    </item>
    <item>
      <title>Is Your Repository Ready for What's Next?</title>
      <link>https://www.sonatype.com/blog/is-your-repository-ready-for-whats-next</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sonatype.com/blog/is-your-repository-ready-for-whats-next" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sonatype.com/hubfs/blog_artifact_management.jpg" alt="Image of a desktop computer icon next to an icon of code brackets" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Most software teams don't start out planning to ado&lt;span style="text-decoration: none;"&gt;pt an &lt;/span&gt;&lt;a href="https://www.sonatype.com/compare/best-artifact-repository-solutions" style="text-decoration: none;"&gt;&lt;span style="color: #1155cc;"&gt;enterprise artifact repository&lt;/span&gt;&lt;/a&gt;.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sonatype.com/blog/is-your-repository-ready-for-whats-next" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sonatype.com/hubfs/blog_artifact_management.jpg" alt="Image of a desktop computer icon next to an icon of code brackets" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Most software teams don't start out planning to ado&lt;span style="text-decoration: none;"&gt;pt an &lt;/span&gt;&lt;a href="https://www.sonatype.com/compare/best-artifact-repository-solutions" style="text-decoration: none;"&gt;&lt;span style="color: #1155cc;"&gt;enterprise artifact repository&lt;/span&gt;&lt;/a&gt;.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=1958393&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.sonatype.com%2Fblog%2Fis-your-repository-ready-for-whats-next&amp;amp;bu=https%253A%252F%252Fwww.sonatype.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>artifact repository</category>
      <category>repository</category>
      <category>Enterprise Repository Management</category>
      <category>dependencies</category>
      <category>Nexus Repository</category>
      <category>repo</category>
      <category>repositories</category>
      <category>Sonatype Nexus Repository</category>
      <pubDate>Tue, 31 Mar 2026 13:00:04 GMT</pubDate>
      <author>mprescott@sonatype.com (Michael Prescott)</author>
      <guid>https://www.sonatype.com/blog/is-your-repository-ready-for-whats-next</guid>
      <dc:date>2026-03-31T13:00:04Z</dc:date>
    </item>
    <item>
      <title>Autonomous Development and AI: Speed vs. Security</title>
      <link>https://www.sonatype.com/blog/autonomous-development-and-ai-speed-vs.-security</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sonatype.com/blog/autonomous-development-and-ai-speed-vs.-security" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sonatype.com/hubfs/blog_ai_agents.jpg" alt="Image of a hexagon icon with a robot head in the center" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;AI-assisted develop&lt;span style="text-decoration: none;"&gt;ment is &lt;/span&gt;&lt;a href="https://www.sonatype.com/blog/how-ai-and-vibe-coding-are-changing-the-rules-of-software-security" style="text-decoration: none;"&gt;&lt;span style="color: #1155cc;"&gt;changing how software gets built&lt;/span&gt;&lt;/a&gt;. What began as a productivity boost is quickly becoming something bigger.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sonatype.com/blog/autonomous-development-and-ai-speed-vs.-security" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sonatype.com/hubfs/blog_ai_agents.jpg" alt="Image of a hexagon icon with a robot head in the center" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;AI-assisted develop&lt;span style="text-decoration: none;"&gt;ment is &lt;/span&gt;&lt;a href="https://www.sonatype.com/blog/how-ai-and-vibe-coding-are-changing-the-rules-of-software-security" style="text-decoration: none;"&gt;&lt;span style="color: #1155cc;"&gt;changing how software gets built&lt;/span&gt;&lt;/a&gt;. What began as a productivity boost is quickly becoming something bigger.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=1958393&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.sonatype.com%2Fblog%2Fautonomous-development-and-ai-speed-vs.-security&amp;amp;bu=https%253A%252F%252Fwww.sonatype.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>secure software supply chain</category>
      <category>automation</category>
      <category>State of the Software Supply Chain</category>
      <category>automated workflow</category>
      <category>Events and Webinars</category>
      <category>artificial intelligence</category>
      <category>AI</category>
      <pubDate>Thu, 26 Mar 2026 17:11:28 GMT</pubDate>
      <author>alinskens@sonatype.com (Aaron Linskens)</author>
      <guid>https://www.sonatype.com/blog/autonomous-development-and-ai-speed-vs.-security</guid>
      <dc:date>2026-03-26T17:11:28Z</dc:date>
    </item>
  </channel>
</rss>
