|
Snyk in 30: Developer-first security democast
|
Jim Armstrong |
2023-03-02 |
1,538 |
--
|
|
Announcing the 2022 State of Open Source Security report from Snyk and …
|
Megan Moore |
2022-06-21 |
558 |
--
|
|
New OpenSSL critical vulnerability: What you need to know
|
Vandana Verma Sehgal |
2022-10-31 |
1,282 |
2
|
|
Welcoming Samantha Wessels: Snyk’s New Vice President, EMEA Sales
|
Dino DiMarino |
2022-01-10 |
409 |
--
|
|
Modern VS Code extension development: The basics
|
Mdu Sibisi |
2023-09-14 |
2,775 |
--
|
|
What kind of (security) dog are you?
|
Belyn Lai |
2023-08-25 |
756 |
--
|
|
Mitigating DOM clobbering attacks in JavaScript
|
Keshav Malik |
2023-08-07 |
1,806 |
--
|
|
Improving coverage of cloud resources to reduce infrastructure drift
|
Stephane Jourdan |
2022-03-23 |
2,878 |
--
|
|
CodeSecDays conference and more complete security coverage with GitGuardian
|
Sarah Conway |
2023-08-10 |
989 |
--
|
|
Snyk users don't have to worry about NVD delays
|
Hadas Bloom |
2024-03-13 |
734 |
--
|
|
Best practices for creating a modern npm package with security in mind
|
Brian Clark |
2022-09-12 |
4,985 |
2
|
|
Automate cloud compliance with Snyk IaC
|
Lauren Place |
2023-02-07 |
591 |
--
|
|
Discussions on improving security through chaos engineering
|
Mariah Gresham |
2023-08-03 |
966 |
--
|
|
How to strengthen security in your CI/CD pipeline
|
James Konik |
2023-07-12 |
1,800 |
--
|
|
Snyk welcomes Helios, accelerating our ASPM vision with runtime insights
|
Manoj Nair |
2024-01-16 |
874 |
--
|
|
Introducing Snyk’s new Risk Score for risk-based prioritization
|
Gur Shafriri, Benji Catabi-Kalman |
2023-08-17 |
1,514 |
--
|
|
Four easy ways to analyze your Java and Kotlin code
|
Brian Vermeer |
2024-08-13 |
1,982 |
--
|
|
5 ways to improve security during digital transformation
|
Erin Cullen |
2023-04-10 |
1,007 |
--
|
|
How to use AI for software development and cybersecurity
|
Simon Maple |
2023-08-30 |
1,755 |
--
|
|
SnakeYaml 2.0: Solving the unsafe deserialization vulnerability
|
Brian Vermeer |
2023-06-21 |
1,205 |
--
|
|
Finding YAML Deserialization with Snyk Code
|
Calum Hutton |
2023-02-23 |
799 |
--
|
|
Announcing customized role-based access controls for Snyk
|
Daniel Berman |
2022-06-29 |
1,237 |
--
|
|
Snyk announces new Slack integration
|
Sarah Conway |
2023-05-30 |
610 |
--
|
|
Best practices for using AI in the SDLC
|
Frank Fischer |
2023-07-19 |
749 |
--
|
|
DevOpsDays Singapore 2024: Unmasking the security pitfalls in AI-generated code
|
Hiroko Nakano |
2024-04-23 |
562 |
--
|
|
Announcing the 2022 State of Cloud Security report from Snyk
|
Megan Moore |
2022-09-13 |
757 |
--
|
|
Engineering culture at Snyk: The values that support and drive our teams
|
Sergey Vasilkov |
2023-05-08 |
2,259 |
--
|
|
SnykCon recap: Building a developer-focused AppSec program
|
Mariah Gresham |
2022-01-27 |
1,051 |
--
|
|
"Dirty Pipe" Linux vulnerability and your containerized applications (CVE-2022-0847)
|
Eric Smalling |
2022-03-09 |
1,180 |
--
|
|
Security lessons with a Snyk Ambassador
|
Andres Haro |
2022-10-11 |
941 |
--
|
|
3 tips from Snyk and Dynatrace’s AI security experts
|
Sarah Conway |
2024-01-22 |
905 |
--
|
|
Snyk Code, the only security tool chosen by developers in Stack Overflow's …
|
Liqian Lim (林利蒨) |
2024-08-27 |
901 |
--
|
|
Snyk Voices: Returning from maternity leave
|
Tali Wahrhaft |
2022-05-06 |
2,557 |
--
|
|
How to prevent NullPointerExceptions in Java
|
Lucien Chemaly |
2023-09-21 |
2,669 |
--
|
|
The ultimate guide to creating a secure Python package
|
Gourav Singh Bais |
2024-05-08 |
3,482 |
--
|
|
Why you need a security companion for AI-generated code
|
Liqian Lim (林利蒨) |
2023-10-25 |
1,834 |
--
|
|
Building Docker images in Kubernetes
|
Vitalis Ogbonna |
2022-05-03 |
1,557 |
--
|
|
Snyk takes over Boston for SnykWeek
|
Megan Moore |
2022-05-19 |
663 |
--
|
|
Reduce risk to your supply chain with a software bill of materials …
|
Ryan Searle |
2023-06-07 |
881 |
--
|
|
Cybersecurity Venture’s 2023 Software Supply Chain Attack Report
|
Sydney Milligan |
2023-10-10 |
816 |
--
|
|
Maximizing IAM security with AWS permissions boundaries and Snyk
|
Wayne Crissman |
2023-06-26 |
1,019 |
--
|
|
Fun with ciphers in copycat Wordles
|
Micah Silverman |
2022-02-02 |
903 |
--
|
|
Data leak in the Netherlands: What developers should learn from this
|
Brian Vermeer |
2023-03-31 |
753 |
--
|
|
Identify vulnerabilities in your container images with Snyk’s enhanced Docker Desktop Extension
|
LaToya Muff |
2023-04-11 |
363 |
--
|
|
Learning from cloud transformation as we move to AI
|
David Lugo |
2024-05-21 |
976 |
--
|
|
Enabling policy as code (PaC) with OPA and Rego
|
Eric Smalling |
2022-01-19 |
1,522 |
--
|
|
How to secure an S3 bucket on AWS?
|
Liran Tal |
2024-07-12 |
3,393 |
--
|
|
Using Pulumi to automate the Snyk Kubernetes integration for containers
|
Pas Apicella |
2022-02-09 |
2,064 |
--
|
|
How Axel Springer National Media and Tech achieved continuous security with Snyk
|
Nina McClure |
2024-09-03 |
952 |
--
|
|
You should be using HTTP Strict Transport Security (HSTS) headers in your …
|
Raphael Mun |
2022-12-29 |
1,729 |
--
|
|
Secure Java URL encoding and decoding
|
Jura Gorohovsky |
2023-08-14 |
3,090 |
--
|
|
Snyk named a Leader, placed highest in Strategy category in The Forrester …
|
Manoj Nair |
2023-06-13 |
770 |
--
|
|
Nightfall AI and Snyk unite to deliver AI-powered secrets scanning for developers
|
LaToya Muff |
2023-11-29 |
547 |
--
|
|
SnykCon recap: Automation for better compliance and faster feedback loops
|
Megan Moore |
2022-04-13 |
1,189 |
--
|
|
Krampus delivers an end-of-year Struts vulnerability
|
Micah Silverman |
2024-01-02 |
1,667 |
--
|
|
3 tips for rebuilding a Docker image faster (and save CI seconds!)
|
Liran Tal |
2023-12-28 |
2,564 |
--
|
|
Does AI lead to AppSec hell or nirvana?
|
Erin Cullen |
2023-10-03 |
1,040 |
--
|
|
Node.js multithreading with worker threads series: worker_threads tutorial
|
James Walker |
2022-10-25 |
2,310 |
--
|
|
PHP security in Snyk Code now GA
|
DeveloperSteve Coochin |
2022-01-26 |
760 |
--
|
|
Announcing Snyk AppRisk: Elevate your AppSec game with ASPM
|
Daniel Berman |
2023-12-12 |
1,464 |
--
|
|
3 ways AppSec modernization is a game-changer for financial services
|
Katie DeMatteis |
2024-09-03 |
782 |
--
|
|
SnykLaunch April '23: C/C++ expansion, cloud and IaC updates, custom container security, …
|
Jim Armstrong |
2023-04-04 |
1,462 |
--
|
|
New SEC cybersecurity rules put more onus on the CISO, not so …
|
Myke Lyons |
2023-08-03 |
1,578 |
--
|
|
Enhancing code to cloud security with the Common Configuration Scoring System
|
Wayne Crissman |
2023-12-14 |
998 |
--
|
|
Snyk welcomes Enso: Enabling security leaders to scale their AppSec program with …
|
Manoj Nair |
2023-06-07 |
972 |
--
|
|
Leaky Vessels: Docker and runc container breakout vulnerabilities (January 2024)
|
Jamie Smith |
2024-01-31 |
1,729 |
41
|
|
Introducing Snyk’s partnership with Gemini Code Assist
|
David Lugo |
2024-04-09 |
682 |
--
|
|
Snyk is named a Strong Performer as a first-time entrant in the …
|
Peter McKay |
2023-09-20 |
696 |
--
|
|
Day in the life of a food giant CISO
|
Vandana Verma Sehgal |
2024-04-18 |
668 |
--
|
|
Join "The Big Fix" to secure your projects with Snyk and earn …
|
Liran Tal |
2022-02-09 |
1,029 |
--
|
|
Snyk & Atlassian: How to embed security in AI-assisted software development
|
LaToya Muff |
2024-02-14 |
1,030 |
--
|
|
Integrating Snyk Code SAST results in your ServiceNow workflows
|
Sarah Conway |
2024-05-07 |
514 |
--
|
|
Three reasons to invest in an ASPM solution in 2024
|
Julia Kraut |
2023-12-12 |
610 |
--
|
|
With Love, Your Applications
|
Krysta Williams-Timm |
2024-02-14 |
373 |
--
|
|
Snyk named a 2022 Gartner Peer Insights Customers’ Choice for Application Security …
|
Tony Sleva |
2022-10-04 |
382 |
--
|
|
Three trends shaping software supply chain security today
|
Erin Cullen |
2024-08-22 |
923 |
--
|
|
How to add Playwright tests to your pull request CI with GitHub …
|
Liran Tal |
2022-10-14 |
2,546 |
--
|
|
Using insecure npm package manager defaults to steal your macOS keyboard shortcuts
|
Yagiz Nizipli |
2023-06-28 |
1,102 |
--
|
|
Protestware is trending in open source: 4 different types and their impact
|
Benji Catabi-Kalman |
2022-03-22 |
1,185 |
--
|
|
Fetch the Flag CTF 2022 writeup: Roadrunner
|
Giovanni Funchal |
2022-11-10 |
1,138 |
--
|
|
AI quality: Garbage in, garbage out
|
Michael Biocchi |
2024-06-11 |
730 |
--
|
|
How to secure JavaScript applications right from the CLI
|
Gideon Idoko |
2023-10-24 |
2,412 |
--
|
|
Happy 1st Birthday, Snyk Code!
|
Frank Fischer |
2022-05-06 |
1,368 |
--
|
|
10 best practices for securely developing with AI
|
Simon Maple |
2023-09-27 |
3,204 |
--
|
|
Snyk top 10 code vulnerabilities report
|
Mariah Gresham |
2023-05-18 |
424 |
1
|
|
Analyzing the PwnKit local privilege escalation exploit
|
Kyle Suero |
2022-01-29 |
726 |
--
|
|
Setting up the Docker image scan GitHub Action
|
Mohammad-Ali A'râbi |
2023-05-19 |
1,076 |
--
|
|
Getting started with PHP static analysis in 2024
|
Liran Tal |
2024-03-21 |
2,431 |
--
|
|
Introducing the Snyk App for Compass: A complete view of software component …
|
LaToya Muff |
2023-10-05 |
662 |
--
|
|
How to prevent XPath injection attacks
|
Marcelo Oliveira |
2023-05-10 |
2,175 |
--
|
|
Securing your SBOM on Google Cloud
|
David Lugo |
2024-03-28 |
983 |
--
|
|
More accurate than GPT-4: How Snyk’s CodeReduce improved the performance of other …
|
Eric Fernandez |
2024-05-07 |
1,245 |
--
|
|
These aren’t the npm packages you’re looking for
|
DeveloperSteve Coochin |
2022-05-04 |
1,141 |
--
|
|
Snyk’s guide to disclosing pronouns
|
Mariah Gresham, Alex Fallon |
2022-06-09 |
774 |
--
|
|
Can AI write secure code?
|
Frank Fischer |
2023-05-03 |
2,244 |
--
|
|
Snyk finds 200+ malicious npm packages, including Cobalt Strike dependency confusion attacks
|
Kirill Efimov |
2022-05-24 |
2,807 |
3
|
|
Introducing parlay, a tool for enriching SBOMs
|
Gareth Rushgrove |
2023-06-07 |
773 |
--
|
|
360 degrees of application security with Snyk
|
Soumen Mukherjee |
2024-04-24 |
1,273 |
--
|
|
How to keep an HTTP connection alive for 9 hours
|
Micah Silverman |
2023-10-23 |
2,391 |
3
|
|
Congratulations to Snyk’s 2022 CRN Women of the Channel
|
Carey Stanton |
2022-05-09 |
740 |
--
|
|
How to build a secure API gateway in Node.js
|
Florian Rappl |
2022-12-28 |
2,647 |
--
|
|
Response to the Enduring Security Framework (ESF) Guide for Developers
|
Gareth Rushgrove |
2022-09-03 |
602 |
--
|
|
Creating SBOMs with the Snyk CLI
|
Brian Vermeer |
2024-02-08 |
1,348 |
--
|
|
Vulnerability: runc process.cwd and leaked fds container breakout (CVE-2024-21626)
|
Rory McNamara |
2024-01-31 |
1,114 |
3
|
|
Ethical hacking techniques
|
Vandana Verma Sehgal |
2023-06-05 |
1,713 |
--
|
|
Alert: LaughTilYouCry ransomware sabotages npm package (with puns)
|
Mariah Gresham |
2022-04-01 |
529 |
--
|
|
Snykers share wellness tips for mental health awareness month
|
Belyn Lai |
2023-05-30 |
706 |
--
|
|
Snyk Partner Speaks series: True DevSecOps with Snyk and Dynatrace
|
Sarah Conway |
2023-06-08 |
177 |
--
|
|
Snyk enhances ServiceNow with comprehensive insights into vulnerabilities in open source software
|
Marco Morales |
2023-01-24 |
633 |
--
|
|
The security course missing from higher education
|
Michael Biocchi |
2022-07-12 |
955 |
--
|
|
Snyk ranked #20 on 2022 Forbes Cloud 100 list
|
Jeff Yoshimura |
2022-08-09 |
341 |
--
|
|
Container images simplified with Ko
|
Eric Smalling |
2022-10-10 |
3,025 |
1
|
|
Snyk Ranked #19 on 2023 Forbes Cloud 100 List
|
Peter McKay |
2023-08-08 |
430 |
--
|
|
Going beyond “shift left” to extend AppSec in all directions
|
Ben Desjardins |
2024-07-09 |
968 |
--
|
|
Research with Snyk and Redhunt Labs: Scanning the top 1000 orgs on …
|
Vandana Verma Sehgal |
2023-06-22 |
399 |
--
|
|
Snyk Partner Speak Video Series Puts Spotlight on New Integrations
|
Sarah Conway |
2023-04-12 |
181 |
--
|
|
How to build a modern DevSecOps culture: Lessons from Jaguar Land Rover …
|
Brian Piper |
2024-02-21 |
1,209 |
--
|
|
Panel recap: Breaking Bad Security Habits with Corey Quinn
|
Erin Cullen |
2022-12-20 |
985 |
--
|
|
Amplifying AAPI Voices to Honor Asian American Pacific Islander Heritage Month
|
Belyn Lai, Yos Pang |
2023-05-25 |
1,495 |
--
|
|
NPM security: preventing supply chain attacks
|
Liran Tal |
2022-11-08 |
3,307 |
1
|
|
Integrating the Snyk Language Server with IntelliJ IDEs
|
Arvyd Paeglit |
2024-06-17 |
344 |
--
|
|
Black Hat Asia customer panel recap: How to lead DevSecOps adoption
|
Brian Piper |
2023-09-18 |
821 |
--
|
|
Recap: Stress-Free Security for Devs and Ops on AWS
|
David Lugo |
2023-04-03 |
1,341 |
--
|
|
Polyfill supply chain attack embeds malware in JavaScript CDN assets
|
Liran Tal |
2024-06-26 |
1,892 |
--
|
|
The npm faker package and the unexpected demise of open source libraries
|
Liran Tal |
2022-09-02 |
2,339 |
--
|
|
Snyk Fetch the Flag CTF 2023 writeup: Audiopolis
|
John Hammond |
2023-11-30 |
278 |
--
|
|
Securing the digital future: Reviewing the Biden-Harris administration's National Cybersecurity Strategy
|
Vandana Verma Sehgal |
2023-03-20 |
713 |
--
|
|
A security expert’s view on Gartner’s generative AI insights
|
Liqian Lim (林利蒨) |
2024-08-07 |
1,729 |
--
|
|
Snyk CLI: Introducing Semantic Versioning and release channels
|
Chintan B. |
2024-04-30 |
930 |
--
|
|
Cheat sheet: Meeting security compliance standards
|
Mariah Gresham |
2022-09-15 |
784 |
--
|
|
How to make a mock API server in JavaScript
|
David Ekete |
2022-10-20 |
2,038 |
1
|
|
Call for action: Exploring vulnerabilities in Github Actions
|
Elliot Ward, Rory McNamara, Raul Onitza-Klugman |
2024-06-06 |
3,977 |
--
|
|
How Snyk can help secure supply chains per Executive Order M-21-30
|
Vandana Verma Sehgal |
2022-09-29 |
1,767 |
1
|
|
Session management security: Best practices for protecting user sessions
|
Okoth Pius |
2023-07-11 |
2,703 |
1
|
|
Data loss prevention for developers
|
Annabel Gauci |
2023-05-24 |
2,103 |
2
|
|
Snyk brings infrastructure as code security to HashiCorp Terraform Cloud
|
Marco Morales |
2022-05-04 |
762 |
--
|
|
Top 5 scary AWS misconfigurations
|
Shilpi Bhattacharjee |
2022-10-31 |
816 |
--
|
|
Snyk and Atlassian deepen partnership with Snyk security in Jira Software
|
Jill Wilkins |
2023-02-08 |
412 |
--
|
|
10 modern Node.js runtime features to start using in 2024
|
Liran Tal |
2024-05-29 |
5,030 |
2
|
|
Snyk and AWS announce native Amazon EKS support directly from the AWS …
|
David Lugo |
2024-06-12 |
418 |
--
|
|
5 Node.js security code snippets every backend developer should know
|
Liran Tal |
2024-02-28 |
3,106 |
--
|
|
Introducing the ASPM Masterclass
|
Erin Cullen |
2024-03-12 |
504 |
--
|
|
Dependency injection in Python
|
Lucien Chemaly |
2023-10-31 |
2,919 |
--
|
|
Snyk Apps now GA: An easy, standardized, and secure framework for building …
|
Sarah Conway |
2023-11-20 |
1,108 |
--
|
|
Manage security issues in Jira with Snyk Security in Jira Cloud
|
LaToya Muff |
2023-08-09 |
330 |
--
|
|
Securing symmetric encryption algorithms in Java
|
Brian Vermeer |
2023-10-18 |
1,489 |
--
|
|
Preventing insecure deserialization in Node.js
|
Benson Kuria Macharia |
2023-04-17 |
1,890 |
--
|
|
Building a security-conscious CI/CD pipeline
|
Peter De Tender |
2023-06-29 |
1,529 |
--
|
|
Interview with an engineer: Diving into modern SAST
|
Snyk Team |
2022-05-18 |
1,355 |
--
|
|
Controlling your server with a reverse shell attack
|
Brian Vermeer |
2022-08-10 |
1,544 |
--
|
|
Is your team on the *security* naughty or nice list?
|
Mariah Gresham |
2023-12-20 |
873 |
--
|
|
Secure your application from Argo CD to Kubernetes
|
JJ Ng |
2022-10-12 |
1,253 |
--
|
|
How to find and fix XML entity vulnerabilities
|
Michael Sherman |
2022-09-07 |
2,223 |
--
|
|
How REI built a DevSecOps culture and how Snyk helped
|
Brian Piper |
2024-02-27 |
1,154 |
--
|
|
Snyk achieves Red Hat Vulnerability Scanner Certification
|
Tomás González Blasini, David Lugo |
2023-04-03 |
391 |
--
|
|
Why fuzzing tools should be part of your security toolkit
|
Kuria Macharia |
2022-10-28 |
1,763 |
--
|
|
How to find and fix Critical WebP zero-day vulnerability CVE-2023-4863
|
Brian Clark, Eric Smalling, Tim Gowan |
2023-10-05 |
1,282 |
--
|
|
Weak Hash vulnerability discovered in crypto-js and crypto-es (CVE-2023-46233 & CVE-2023-46133)
|
Jamie Smith |
2023-10-25 |
1,509 |
--
|
|
2022 Snyk Customer Value Study highlights: The impact of developer-first security
|
Jeff Yoshimura |
2022-10-18 |
1,061 |
--
|
|
How to update cURL
|
Brian Clark, Eric Smalling |
2023-10-11 |
1,772 |
--
|
|
AWS top 10 misconfigurations and how to fix them: A cheat sheet
|
Erin Cullen |
2023-03-15 |
1,546 |
--
|
|
Snyk + International Dog Day: recap
|
Megan Moore |
2022-10-05 |
374 |
--
|
|
Handling security vulnerabilities in Spring Boot
|
Brian Vermeer |
2023-11-29 |
1,451 |
--
|
|
Three considerations for building an effective security program
|
Alex Bovee |
2023-05-04 |
920 |
--
|
|
Top 8 penetration testing tools
|
Benson Kuria Macharia |
2023-05-25 |
1,172 |
--
|
|
Snyk Learn and the NIST Cybersecurity Framework (CSF)
|
Michael Biocchi |
2024-03-06 |
523 |
--
|
|
Snyk Fetch the Flag CTF 2023 writeup: Protect The Environment
|
John Hammond |
2023-11-30 |
243 |
--
|
|
Understanding and mitigating the Jinja2 XSS vulnerability (CVE-2024-22195)
|
Liran Tal |
2024-01-18 |
1,059 |
--
|
|
Accelerate C/ C++ security with Snyk
|
Marcie Cheung |
2023-12-05 |
614 |
--
|
|
Scaling your security team without hiring
|
Drew Wright |
2022-11-02 |
984 |
--
|
|
Mastering Python virtual environments: A complete guide to venv, Docker, and securing …
|
Liran Tal |
2024-01-10 |
1,589 |
--
|
|
Snyk Fetch the Flag CTF 2023 writeup: I Do Math
|
John Hammond |
2023-11-30 |
190 |
--
|
|
8 tips for securing containers from source to runtime
|
Sarah Conway |
2022-08-24 |
661 |
--
|
|
How to verify and secure your Mastodon account
|
Liran Tal |
2022-12-05 |
946 |
--
|
|
How to protect Node.js apps from CSRF attacks
|
Victor Ikechukwu |
2023-10-17 |
3,146 |
--
|
|
Snyk integrates with AWS Security Hub to automate security remediation workflows
|
David Lugo |
2023-06-12 |
884 |
--
|
|
Command injection vulnerability in Snyk CLI released prior to September 1, 2022 …
|
Gareth Rushgrove |
2022-10-03 |
501 |
--
|
|
How to implement SSL/TLS pinning in Node.js
|
Nwani Victory |
2023-08-29 |
2,298 |
--
|
|
Streamline dependency updates with Mergify and Snyk
|
Liran Tal |
2023-08-23 |
1,548 |
--
|
|
The Cloud Security Podcast is now powered by Snyk!
|
Ashish Rajan |
2022-07-26 |
562 |
--
|
|
5 security best practices for adopting generative AI code assistants like GitHub …
|
Liqian Lim (林利蒨) |
2024-03-05 |
1,368 |
--
|
|
A denial of service Regex breaks FastAPI security
|
Liran Tal |
2024-07-31 |
1,878 |
--
|
|
How secure is WebAssembly? 5 security concerns unique to WebAssembly
|
Marcelo Oliveira |
2023-07-28 |
1,448 |
2
|
|
The Docker project turns 10! Looking back at a decade of containers
|
Eric Smalling |
2023-03-17 |
3,058 |
--
|
|
Update: OpenSSL high severity vulnerabilities
|
Vandana Verma Sehgal |
2022-11-03 |
516 |
--
|
|
Talk to us about Snyk CLI
|
Chintan B., Neil Mackay |
2024-06-06 |
859 |
--
|
|
How Mulesoft fosters a developer-first, shift-left culture with Snyk
|
Gerald Crescione |
2024-04-30 |
798 |
--
|
|
The art of conditional rendering: Tips and tricks for React and Next.js …
|
Kumar Harsh |
2023-10-30 |
2,865 |
--
|
|
Snyk's 2023 State of Open Source Security: Supply chain security, AI, and …
|
Simon Maple |
2023-07-26 |
1,184 |
--
|
|
Snyk achieves AWS Security Competency
|
David Lugo |
2023-11-15 |
514 |
--
|
|
Preventing SQL injection attacks in Node.js
|
Lucien Chemaly |
2024-02-20 |
2,260 |
--
|
|
Addressing cybersecurity challenges in open source software with the Linux Foundation
|
Mariah Gresham |
2022-07-20 |
1,033 |
--
|
|
SnykLaunch June ‘23: Insights and DeepCode AI enable faster fixes and prioritization
|
Jim Armstrong |
2023-06-07 |
1,567 |
--
|
|
Finding and fixing exposed hardcoded secrets in your GitHub project with Snyk
|
Chandler Mayo |
2024-06-25 |
902 |
--
|
|
Breaking down the ’critical’ OpenSSL vulnerability
|
Elliot Ward, Raul Onitza-Klugman |
2022-11-04 |
1,657 |
--
|
|
Does GitOps enhance application security?
|
Vandana Verma Sehgal |
2023-08-21 |
1,026 |
--
|
|
What are AI hallucinations and why should developers care?
|
Liran Tal |
2023-08-16 |
2,376 |
1
|
|
Ruby gem installations can expose you to lockfile injection attacks
|
Liran Tal |
2022-08-17 |
2,317 |
--
|
|
Infrastructure drift and drift detection explained
|
Lauren Place |
2022-03-09 |
1,362 |
--
|
|
Welcoming Danny Allan and Brian Rogan: Snyk leadership team expands with key …
|
Peter McKay |
2024-02-06 |
492 |
--
|
|
Getting started with React Native security
|
Kingsley Ubah |
2022-04-07 |
2,306 |
--
|
|
Fetch the Flag CTF 2022 writeup: Logster
|
Sonya Moisset |
2022-11-10 |
1,063 |
--
|
|
Snyk welcomes Reviewpad: Code, commit, celebrate!
|
Manoj Nair |
2023-10-30 |
606 |
--
|
|
Our favorite 2023 Snyk Fetch the Flag CTF writeups from the community
|
Danielle Bradford |
2023-11-21 |
183 |
--
|
|
Top 3 security best practices for handling JWTs
|
Liran Tal |
2023-12-18 |
2,007 |
--
|
|
A quick primer on LDAP injection
|
Eric Kahuha |
2023-06-01 |
1,379 |
--
|
|
10 GitHub Security Best Practices
|
Brian Vermeer |
2024-02-05 |
3,532 |
3
|
|
Ruby on Rails Docker for local development environment
|
Mikhail Tereschenko |
2022-11-02 |
1,770 |
--
|
|
.NET developers alert: Moq NuGET package exfiltrates user emails from git
|
Liran Tal |
2023-08-09 |
831 |
2
|
|
Modern VS Code extension development tutorial: Building a secure extension
|
Mdu Sibisi |
2023-10-02 |
3,917 |
--
|
|
Introducing SUS: Snyk Ultimate Security
|
Megan Moore |
2022-04-01 |
592 |
--
|
|
Control your role! Kubernetes RBAC explored
|
James Walker |
2023-07-27 |
2,123 |
--
|
|
The importance of platform engineers in a security program
|
Elliott Spira |
2023-04-13 |
962 |
--
|
|
Snyk Partner Speak Video with ServiceNow: A complete view of application security
|
Sarah Conway |
2023-05-02 |
196 |
--
|
|
Reporting AppSec risk up to your CISO
|
Kate Powers Burke, Ezra Tanzer |
2024-02-13 |
1,945 |
--
|
|
Securing next-gen development: Lessons from Trust Bank and TASConnect
|
Gerald Crescione |
2024-06-05 |
1,312 |
--
|
|
Building a secure CI/CD pipeline with GitHub Actions for your Java Application
|
Brian Vermeer |
2022-06-27 |
1,456 |
--
|
|
Snyk brings developer-first AppSec approach to C/C++
|
Roy Ram, Neha Shenoy |
2023-04-04 |
1,094 |
--
|
|
Snyk sponsors Atlassian Team ’22: Bringing developer security to the Atlassian ecosystem
|
Sarah Conway |
2022-04-05 |
601 |
--
|
|
The persistent threat: Why major vulnerabilities like Log4Shell and Spring4Shell remain significant
|
Brian Vermeer |
2024-08-29 |
1,000 |
--
|
|
Writing unit tests in Java
|
Lewis Gavin |
2022-11-18 |
1,629 |
--
|
|
How to do password hashing in Java applications the right way!
|
Brian Vermeer |
2022-03-24 |
1,911 |
--
|
|
DevSecOps lifecycle coverage with new Snyk and Dynatrace app
|
Sarah Conway |
2023-05-15 |
507 |
--
|
|
2022 Collaboration Partner of the Year: Snyk
|
Sarah Conway |
2022-10-05 |
417 |
--
|
|
How Snyk ensures safe adoption of AI
|
Akanchha Shrivastava |
2024-03-27 |
1,534 |
--
|
|
Signing container images: Comparing Sigstore, Notary, and Docker Content Trust
|
Hrittik Roy |
2023-09-26 |
3,098 |
--
|
|
Real-time threat protection with Snyk and SentinelOne
|
Shivam Jindal |
2023-11-09 |
679 |
--
|
|
Secure JavaScript URL validation
|
Mannan Tirmizi |
2023-05-09 |
1,940 |
6
|
|
Using JLink to create smaller Docker images for your Spring Boot Java …
|
Brian Vermeer |
2023-08-24 |
1,499 |
--
|
|
Adding Snyk security to Jira and Bitbucket Cloud
|
LaToya Muff |
2023-10-25 |
647 |
--
|
|
SDR Series: Meet our APJ team
|
Snyk Team |
2022-04-26 |
1,350 |
--
|
|
Preventing Cross-Site Scripting (XSS) in Java applications with Snyk Code
|
Brian Vermeer |
2023-04-25 |
1,523 |
--
|
|
SocketSleuth: Improving security testing for WebSocket applications
|
Elliot Ward |
2023-09-06 |
843 |
--
|
|
AI-generated security fixes in Snyk Code now available
|
Jim Armstrong |
2023-05-09 |
823 |
--
|
|
Snyk named to CNBC 2023 Disruptor 50 List
|
Peter McKay |
2023-05-09 |
311 |
--
|
|
Exploring 3 types of directory traversal vulnerabilities in C/C++
|
Kirill Efimov |
2022-04-04 |
2,081 |
--
|
|
Navigating the AI-powered development era in financial services
|
Lawrence Crowther |
2024-08-26 |
826 |
--
|
|
Fetch the Flag CTF 2022 writeup: Pay Attention
|
Assaf Ben Josef |
2022-11-10 |
1,058 |
--
|
|
Cloud Security at Blackhat and Defcon 2022
|
Ashish Rajan |
2022-09-06 |
1,896 |
--
|
|
Achieving developer security adoption at Nylas with Snyk
|
Erin Cullen |
2023-12-04 |
762 |
--
|
|
WillowTree roundtable: security for hypergrowth organizations
|
Mariah Gresham |
2022-04-22 |
1,051 |
--
|
|
Fetch the Flag CTF 2022 writeup: git-refs
|
Iulia Manda |
2022-11-10 |
585 |
--
|
|
Top 5 security concerns for infrastructure as code
|
Raphael Mun |
2023-07-14 |
1,565 |
--
|
|
8 tips for securing your CI/CD pipeline with Snyk
|
Eric Smalling |
2023-07-20 |
3,928 |
--
|
|
Timing out synchronous functions with regex
|
Steve Shani |
2023-04-06 |
1,071 |
--
|
|
How Okta empowers devs to find & fix security issues with Snyk
|
Mariah Gresham |
2023-08-25 |
958 |
--
|
|
Make Snyk notifications work for you
|
Michele Wiedemer |
2022-04-06 |
550 |
--
|
|
7 tips to become a successful bug bounty hunter
|
Ben Sadeghipour |
2024-01-25 |
1,246 |
--
|
|
Nine Docker pro tips for Node.js developers
|
Liran Tal |
2024-04-11 |
1,630 |
--
|
|
Announcing IaC+ early access: Secure your infrastructure configurations across the SDLC
|
Lauren Place |
2023-10-03 |
686 |
--
|
|
How to generate an SBOM for JavaScript and Node.js applications
|
Liran Tal |
2023-05-22 |
2,795 |
--
|
|
Build and deploy a Node.js security scanning API to Platformatic Cloud
|
Liran Tal |
2024-01-05 |
2,980 |
--
|
|
Buildkit GRPC SecurityMode privilege check: Build-time container breakout (CVE-2024-23653)
|
Rory McNamara |
2024-01-31 |
946 |
--
|
|
What does Biden's Executive Order on AI safety measures mean for businesses?
|
Liqian Lim (林利蒨) |
2023-11-02 |
2,399 |
--
|
|
Kroger’s approach to supply chain security
|
Brian Piper |
2024-01-02 |
888 |
--
|
|
AppSec spring cleaning checklist
|
Mariah Gresham |
2024-05-13 |
783 |
--
|
|
Enhancing PCI compliance security with SAST and SCA
|
DeveloperSteve Coochin |
2022-02-08 |
1,359 |
--
|
|
Welcoming Diana Brunelle: Snyk’s New Chief People Officer
|
Peter McKay |
2024-07-22 |
336 |
--
|
|
Installing and managing Java on macOS
|
Keshav Malik |
2023-10-12 |
1,464 |
--
|
|
The importance of verifying webhook signatures
|
Marcelo Oliveira |
2023-06-29 |
1,829 |
--
|
|
Three ways Snyk made software supply chains more secure in 2022
|
Jamie Smith |
2023-01-12 |
1,390 |
--
|
|
Improving developer experience with security tools at Pinterest
|
Megan Moore |
2022-07-14 |
1,165 |
--
|
|
Open source maintainer pulls the plug on npm packages colors and faker, …
|
Liran Tal |
2022-01-09 |
1,160 |
1
|
|
Best practices for container isolation
|
Maryann Agofure |
2022-08-29 |
1,562 |
--
|
|
Rego 102: Combining queries with AND/OR and custom messages
|
Jasper Van der Jeugt, Becki Lee |
2023-11-09 |
2,514 |
--
|
|
Best practices for building a production-ready Dockerfile for PHP applications
|
James Walker |
2023-08-22 |
2,507 |
--
|
|
Azure Bicep security fundamentals
|
Mark Johnson |
2022-12-13 |
1,143 |
--
|
|
A guide to input validation with Spring Boot
|
Lucien Chemaly |
2023-09-12 |
2,751 |
--
|
|
Detect infrastructure drift and unmanaged resources with Snyk IaC
|
Stephane Jourdan |
2022-05-09 |
1,485 |
--
|
|
What’s new in CVSS 4.0
|
Paul Lascar |
2023-11-08 |
1,679 |
--
|
|
GitHub “besieged” by malware repositories and repo confusion: Why you'll be ok
|
Liran Tal |
2024-03-12 |
2,102 |
--
|
|
Safer together: Snyk and CISPA collaborate for the greater good
|
Idan Digmi |
2022-06-06 |
853 |
--
|
|
Snyk Code’s autofixing feature, DeepCode AI Fix, just got better
|
Eric Fernandez, Berkay Berabi |
2024-04-23 |
2,452 |
--
|
|
How to build a secure WebSocket server in Python
|
Kingsley Ubah |
2022-07-05 |
2,728 |
--
|
|
How Lunar shifted security left while building a cloud native bank
|
Brian Piper |
2022-01-20 |
759 |
--
|
|
How Snyk helps satisfy White House cybersecurity recommendations
|
Vandana Verma Sehgal |
2022-03-23 |
1,149 |
--
|
|
Generating fake security data with Python and faker-security
|
Michael Aquilina |
2022-04-26 |
859 |
--
|
|
Rediscovering argument injection when using VCS tools — git and mercurial
|
Alessio Della Libera |
2022-08-23 |
2,111 |
3
|
|
Join the Snyk Developer Challenge
|
Brittany Cannon |
2022-08-01 |
479 |
--
|
|
5 tips for adopting AI code assistance securely
|
Liqian Lim (林利蒨) |
2024-05-30 |
856 |
--
|
|
Abusing Ubuntu 24.04 features for root privilege escalation
|
Rory McNamara |
2024-09-09 |
5,975 |
189
|
|
Snyk's AppSec dream team
|
Krysta Williams-Timm |
2024-03-19 |
843 |
--
|
|
Limitations of a single AI model
|
Frank Fischer |
2023-08-07 |
1,401 |
--
|
|
Automate security controls from development to production on Google Cloud
|
David Lugo |
2024-06-18 |
1,073 |
--
|
|
My internship journey at Snyk
|
Caroline Gow |
2023-02-16 |
1,329 |
--
|
|
Copilot amplifies insecure codebases by replicating vulnerabilities in your projects
|
Randall Degges |
2024-02-22 |
1,578 |
--
|
|
Snyk Partner Speak video series with HashiCorp
|
Sarah Conway |
2023-10-04 |
180 |
--
|
|
5 ways to secure Drupal 10
|
Sushnigdha Tripathy |
2022-08-23 |
1,692 |
--
|
|
A day in the life of a CISO: Chris Hughes of Aquia
|
Vandana Verma Sehgal |
2022-11-04 |
851 |
--
|
|
10 Dimensions of Python Static Analysis
|
Liran Tal |
2024-07-17 |
4,861 |
--
|
|
A security expert’s view on Gartner’s generative AI insights - Part 2
|
Liqian Lim (林利蒨) |
2024-08-08 |
1,231 |
--
|
|
High severity vulnerability found in libcurl and curl (CVE-2023-38545)
|
Hadas Bloom |
2023-10-04 |
1,104 |
--
|
|
Improved risk assessment with EPSS scores in Snyk
|
Daniel Berman |
2023-05-22 |
1,297 |
--
|
|
Node.js vs. Deno vs. Bun: JavaScript runtime comparison
|
James Konik |
2023-09-05 |
2,966 |
--
|
|
Looking back at Black Hat USA 2022
|
Vandana Verma Sehgal |
2022-09-21 |
903 |
--
|
|
Rego 101: Introduction to Rego
|
Becki Lee |
2023-11-02 |
2,503 |
--
|
|
How LiveRamp used Snyk to remediate Log4Shell
|
Brian Piper |
2022-05-19 |
685 |
--
|
|
Why ASPM is the future of AppSec: Key points from our newest …
|
Sarah Conway |
2024-06-18 |
1,177 |
--
|
|
Exploring WebExtension security vulnerabilities in React Developer Tools and Vue.js devtools
|
Calum Hutton |
2023-11-27 |
1,511 |
--
|
|
Snyk IaC for Terraform Enterprise: Expanding Snyk compatibility with HashiCorp Terraform
|
Sarah Conway |
2022-09-28 |
562 |
--
|
|
7 AppSec tips from Snowflake’s Director of Product Security
|
Brian Piper |
2023-08-31 |
850 |
--
|
|
Breaking caches and bypassing Istio RBAC with HTTP response header injection
|
Rory McNamara |
2024-06-20 |
2,498 |
--
|
|
How to choose a security tool for your AI-generated code
|
Liqian Lim (林利蒨) |
2024-01-09 |
1,774 |
--
|
|
SnykWeek New York: In the cloud
|
Megan Moore |
2022-10-10 |
731 |
--
|
|
File encryption in Python: An in-depth exploration of symmetric and asymmetric techniques
|
Keshav Malik |
2023-11-22 |
2,132 |
--
|
|
How to Dockerize a PHP application securely
|
James Olaogun |
2023-08-02 |
2,389 |
1
|
|
Building a secure GraphQL API with Node.js
|
Lawrence Eagles |
2022-03-29 |
1,901 |
--
|
|
Avoiding SMTP Injection: A Whitebox primer
|
Sam Sanoop |
2022-09-15 |
1,579 |
1
|
|
Best practices for effective attack surface analysis
|
Benson Kuria Macharia |
2023-07-18 |
1,659 |
--
|
|
Secure password hashing in Go
|
Love Bhardwaj |
2023-12-05 |
3,088 |
--
|
|
How Spotify uses Snyk to secure the SDLC
|
Brian Piper |
2022-09-13 |
919 |
--
|
|
Announcing the open beta of Snyk's revamped security reporting
|
Daniel Berman |
2022-11-09 |
1,354 |
--
|
|
Webhook Security Best Practices
|
Gints Dreimanis |
2022-07-06 |
1,168 |
--
|
|
New IaC security workshop from Snyk, HashiCorp, and AWS at KubeCon Europe …
|
Sarah Conway |
2023-04-10 |
1,035 |
--
|
|
Snyk is your security companion for Amazon CodeWhisperer
|
Liqian Lim (林利蒨) |
2023-11-29 |
1,817 |
--
|
|
6 steps for scaling risk-based AppSec programs
|
Julia Kraut |
2023-10-13 |
938 |
--
|
|
Best practices for API gateway security
|
Kuria Macharia |
2022-09-07 |
1,510 |
--
|
|
Power up security collaboration with Snyk and Slack
|
Sarah Conway |
2023-10-23 |
271 |
--
|
|
Exploiting HTTP/2 CONTINUATION frames for DoS attacks
|
Vandana Verma Sehgal |
2024-04-08 |
696 |
--
|
|
Repo Jacking: The Great Source-code Swindle
|
Elliot Ward |
2024-07-25 |
2,516 |
--
|
|
Safely handling containers
|
Tales Casagrande |
2022-06-22 |
729 |
--
|
|
Security implications of cross-origin resource sharing (CORS) in Node.js
|
Victor Ikechukwu |
2023-09-13 |
2,582 |
--
|
|
Using Rego as a generic policy language
|
Dickson Boateng |
2022-06-03 |
1,323 |
--
|
|
Fetch the Flag CTF 2022 writeup: Disposable Message
|
Michael Aquilina |
2022-11-10 |
2,421 |
--
|
|
Fetch the Flag CTF 2022 writeup: Treasure Trove
|
Luke Watts |
2022-11-10 |
572 |
--
|
|
How to write your first unit test in JavaScript
|
Raphael Mun |
2022-10-28 |
1,600 |
2
|
|
Snyk highlights AWS re:Invent 2023
|
David Lugo |
2023-12-14 |
820 |
--
|
|
The Snyk Perpetual Key Rotation Machine
|
Megan Moore |
2023-04-01 |
1,000 |
--
|
|
Developer-centric DAST with Bright Security
|
Vitaly Unic |
2023-04-14 |
1,496 |
--
|
|
Embrace your next cybersecurity career with The Big Fix
|
Liran Tal |
2023-02-22 |
692 |
--
|
|
The XZ backdoor CVE-2024-3094
|
Liran Tal |
2024-03-31 |
1,800 |
--
|
|
How Snyk can help secure supply chains per "A Guide to Implementing …
|
Hiroko Nakano |
2023-08-01 |
566 |
--
|
|
Patches of Pride: Love, inclusivity, & cute pets in celebration of Pride …
|
Ashley Ladd |
2023-06-20 |
463 |
--
|
|
Snyk’s new native integration with Bitbucket Cloud emphasizes dev-first security
|
Sarah Conway |
2022-10-25 |
847 |
--
|
|
Cloud security fundamentals part 3: Empower your developers
|
Drew Wright |
2022-10-21 |
1,044 |
--
|
|
Snyk's AppSec journey in 2022
|
Jason Lane |
2023-01-11 |
1,554 |
--
|
|
Choosing the best Node.js Docker image
|
Liran Tal, Adrian Mouat |
2022-09-30 |
3,033 |
2
|
|
Introducing Snyk Training, our online learning platform
|
Michele Wiedemer |
2022-08-11 |
424 |
--
|
|
10 AWS security considerations when migrating
|
Drew Wright |
2022-11-29 |
1,455 |
--
|
|
Bolstering Snyk's developer security platform in 2022
|
Daniel Berman |
2023-01-09 |
2,059 |
--
|
|
Teaming up with Sysdig to deliver developer and runtime Kubernetes security
|
Jim Armstrong |
2022-02-16 |
679 |
--
|
|
Kicking off 2022 by recognizing DevSecOps leaders
|
Jeff Yoshimura |
2022-01-06 |
1,146 |
--
|
|
Snyk integrates with AWS CloudTrail Lake to simplify security audits
|
David Lugo |
2023-02-01 |
551 |
--
|
|
Fastify plugins as building blocks for a backend Node.js API
|
Liran Tal |
2024-05-28 |
2,479 |
--
|
|
Snyk scanning capabilities are now embedded in Jira Software
|
Sarah Conway |
2023-06-06 |
658 |
--
|
|
InCyber Forum Europe recap: 4 tips from DevSecOps experts
|
Nina McClure |
2024-08-14 |
1,217 |
--
|
|
Exploring the Spring Security authorization bypass (CVE-2022-31692)
|
Brian Vermeer |
2022-12-16 |
1,121 |
--
|
|
Key points from Google and Accenture's ransomware white paper
|
Vandana Verma Sehgal |
2022-11-07 |
1,459 |
--
|
|
Snyk Week of Impact 2023: A week of meaningful contributions and community …
|
Bianca Matei |
2023-11-08 |
567 |
--
|
|
SnykLaunch recap: Custom Base Image Recommendations
|
Jamie Smith |
2023-04-04 |
1,133 |
--
|
|
Demystifying the AWS shared security responsibility model
|
David Lugo |
2023-11-13 |
1,004 |
--
|
|
Mitigating path traversal vulns in Java with Snyk Code
|
Brian Vermeer |
2023-03-06 |
1,044 |
2
|
|
How to integrate ASPM with your application security program
|
Vandana Verma Sehgal |
2023-11-28 |
1,258 |
--
|
|
Top considerations for addressing risks in the OWASP Top 10 for LLMs
|
Simon Maple |
2023-09-07 |
3,135 |
--
|
|
Building an application security battle plan: Home Alone edition
|
Brian Clark |
2022-12-20 |
898 |
--
|
|
Swift deserialization security primer
|
Sam Sanoop |
2023-07-18 |
1,155 |
--
|
|
Implementing TLS in Kubernetes
|
Rubaiat Hossain |
2023-07-31 |
2,063 |
--
|
|
Ruby email rule removed from Snyk Code
|
Frank Fischer |
2022-10-13 |
594 |
--
|
|
Cloud security updates you need to know from re:Invent 2022
|
Ashish Rajan |
2022-12-21 |
2,303 |
--
|
|
How to secure a REST API?
|
Liran Tal |
2024-06-27 |
2,768 |
--
|
|
Implementing TLS/SSL in Python
|
Kingsley Ubah |
2022-10-16 |
1,489 |
--
|
|
2022 Container Security Trends Report: Exploring ownership, education, expertise, and more
|
Megan Moore |
2022-04-27 |
737 |
--
|
|
Getting started with query parameterization
|
Mary Gathoni |
2023-10-24 |
2,337 |
--
|
|
Fetch the Flag CTF 2022 writeup: Not So Smart Fridge
|
Antonio Gomes |
2022-11-10 |
1,026 |
--
|
|
How Atlassian used Snyk to solve Log4Shell
|
Sarah Conway |
2022-11-16 |
813 |
--
|
|
10 best practices to containerize Node.js web applications with Docker
|
Liran Tal, Yoni Goldberg |
2022-09-15 |
6,338 |
--
|
|
Finding and fixing insecure direct object references in Python
|
Keshav Malik |
2023-07-19 |
1,509 |
--
|
|
Preventing SQL injection in C# with Entity Framework
|
Brian Vermeer |
2024-07-30 |
1,273 |
--
|
|
Snyk and StackHawk form strategic alliance to equip app teams with modern, …
|
David Lugo |
2022-05-02 |
716 |
--
|
|
Securing the web (forward)
|
Daniel Appelquist |
2023-03-27 |
1,233 |
--
|
|
Lessons learned from the Argo CD zero-day vulnerability (CVE-2022-24348)
|
Eric Smalling |
2022-02-10 |
1,375 |
--
|
|
Securing cloud infrastructure for PCI review
|
DeveloperSteve Coochin |
2022-03-03 |
2,080 |
--
|
|
Snyk AppRisk Pro: A holistic approach to application risk management
|
Daniel Berman |
2024-05-01 |
1,597 |
--
|
|
Securing container applications using the Snyk CLI
|
Hadar Mutai |
2022-08-30 |
489 |
--
|
|
Secure AI tool adoption: Perceptions and realities
|
Alex Salkever |
2024-06-04 |
733 |
--
|
|
Mental Health Awareness Month: How losing my father changed me
|
Tim Leroy |
2022-05-31 |
957 |
--
|
|
Building Vue 3 components with Tailwind CSS
|
Mary Gathoni |
2023-02-21 |
2,017 |
--
|
|
Automatic source locations with Rego
|
Jasper Van der Jeugt |
2024-02-12 |
2,614 |
--
|
|
New year ushers in new wave of Snyk Technology Alliance Partner Program …
|
Sarah Conway |
2023-01-12 |
444 |
--
|
|
Allyship and advocacy: Celebrating Disability Pride Month at Snyk
|
Alex Fallon |
2022-07-27 |
1,764 |
--
|
|
4 AI coding risks and how to address them
|
Liqian Lim (林利蒨) |
2024-06-13 |
1,200 |
--
|
|
Announcing the Snyk Business trial: Security across the SDLC
|
Mariah Gresham |
2022-02-15 |
612 |
--
|
|
Why “vulnerability management” falls short in modern application security
|
Daniel Berman |
2024-06-13 |
988 |
--
|
|
Leaky Vessels deep dive: Escaping from Docker one syscall at a time
|
Rory McNamara |
2024-02-06 |
10,279 |
4
|
|
Critical WebP 0-day security CVE-2023-4863 impacts wider software ecosystem
|
Brian Clark, Eric Smalling, Jonathan Moses |
2023-09-28 |
1,825 |
--
|
|
OSPO security evolution: The Kübler-Ross Model of open source
|
Dan Appelquist |
2023-01-12 |
783 |
--
|
|
Snyk integrates with Amazon EventBridge to enable secure AppDev at scale
|
David Lugo |
2023-06-12 |
735 |
--
|
|
Proxy authentication in Snyk CLI for Windows
|
Steve Winton |
2022-10-06 |
297 |
--
|
|
Snyk Fetch the Flag CTF 2023 writeup: Silent Cartographer
|
John Hammond |
2023-11-30 |
362 |
--
|
|
Application vulnerability management best practices
|
Mariah Gresham |
2024-08-06 |
1,240 |
--
|
|
Snyk recognized as an Emerging Segment Leader in Application Security in Snowflake's …
|
LaToya Muff |
2023-12-11 |
658 |
--
|
|
Gitpod remote code execution 0-day vulnerability via WebSockets
|
Elliot Ward |
2023-02-27 |
2,121 |
1
|
|
A day in the life of an ethical hacker
|
Sonya Moisset |
2023-06-05 |
2,679 |
--
|
|
How to prevent open redirect vulnerabilities in Laravel
|
Kevin Kimani |
2023-12-27 |
1,696 |
--
|
|
Bringing cloud native application security full circle
|
Erin Cullen |
2022-06-08 |
845 |
--
|
|
Find and fix HTTP/2 rapid reset zero-day vulnerability CVE-2023-44487
|
Jamie Smith, Kriti Dogra, Anthony Larkin |
2023-10-11 |
1,225 |
--
|
|
Six takeaways from our ASPM masterclass series
|
Erin Cullen |
2024-04-10 |
1,110 |
--
|
|
Snyk increases investment in partners with new Snyk Technology Alliance Partner Program
|
Cara Sampson |
2022-04-27 |
1,502 |
--
|
|
3 tips for effective developer security training
|
Mariah Gresham |
2022-12-01 |
1,127 |
--
|
|
Snyk transformed cloud security in 2022 with developer-first solution
|
Lauren Place |
2023-01-11 |
1,211 |
--
|
|
Snyk Fetch the Flag CTF 2023 writeup: Off the SETUID
|
Carlos Polop |
2023-11-30 |
1,710 |
--
|
|
Three expert tips for cultivating secure software development practices
|
Simon Maple |
2023-03-01 |
896 |
--
|
|
Spring4Shell: The zero-day RCE in the Spring Framework explained
|
Brian Vermeer |
2022-04-01 |
927 |
--
|
|
Node.js multithreading with worker threads: pros and cons
|
James Walker |
2023-02-27 |
2,120 |
2
|
|
Announcing Snyk’s new Global Service Provider program
|
Cyndi Doyle |
2022-02-23 |
696 |
--
|
|
Code injection in Python: examples and prevention
|
Lucien Chemaly |
2023-12-06 |
1,807 |
--
|
|
Improving GraphQL security with static analysis and Snyk Code
|
Sam Sanoop |
2022-04-12 |
1,528 |
--
|
|
SnykHer celebrates International Women’s Day 2022
|
Jess Katz |
2022-03-07 |
697 |
--
|
|
Visibly invisible malicious Node.js packages: When configuration niche meets invisible characters
|
Aviad Hahami |
2022-02-28 |
1,240 |
--
|
|
PulseMeter Report: Software supply chains
|
Erin Cullen |
2023-03-21 |
708 |
--
|
|
4 best practices for cultivating developer security adoption
|
Erin Cullen |
2023-04-20 |
897 |
--
|
|
Applying the principle of least privilege to Kubernetes using RBAC
|
Jekayin-Oluwa Olabemiwo |
2022-08-29 |
1,734 |
--
|
|
Cloud Security Podcast awarded SANS Podcast of the Year
|
Jeff Yoshimura |
2022-12-19 |
830 |
--
|
|
A stepping stone towards holistic application risk and compliance management of the …
|
Ben Desjardins |
2024-07-11 |
1,834 |
--
|
|
Top 5 VS Code extensions for security
|
Brian Clark |
2023-08-24 |
1,654 |
--
|
|
Celebrating Juneteenth at Snyk
|
Sherica Bryan |
2023-06-16 |
858 |
--
|
|
Vulnerabilities in NodeJS C/C++ add-on extensions
|
Alessio Della Libera |
2024-08-14 |
2,808 |
--
|
|
Code injection vulnerabilities (CVSSv3 5.8) found in Snyk CLI and IDE plugins
|
Carm Janneteau |
2022-11-30 |
585 |
--
|
|
5 "no experience needed" tips for building secure applications
|
Liran Tal |
2022-12-27 |
997 |
--
|
|
How to install Ruby in a macOS for local development
|
Liran Tal |
2022-09-27 |
1,579 |
--
|
|
Fix cloud security issues faster and at the source with Snyk IaC
|
Anthony Larkin |
2023-04-04 |
632 |
--
|
|
Improving the UI/UX of the Snyk VS Code extension
|
Andy Gongea |
2023-11-21 |
702 |
--
|
|
Best practices for Kubernetes Secrets management
|
Eric Kahuha |
2022-11-16 |
1,777 |
--
|
|
Snyk Learn now aligns with the NIST NICE Workforce Framework
|
Michael Biocchi |
2023-06-07 |
471 |
--
|
|
Common SAML vulnerabilities and how to remediate them
|
Sam Sanoop |
2023-12-19 |
966 |
--
|
|
The Secure Developer: Security champions recap
|
Sam Hepburn |
2023-06-14 |
1,365 |
--
|
|
How community participation can enhance your development career
|
Randall Degges |
2022-11-15 |
1,117 |
--
|
|
Introducing the new Snyk UI
|
Steve Winton |
2022-09-29 |
383 |
--
|
|
What can you do with an enriched SBOM? A parlay quickstart guide
|
Gareth Rushgrove |
2023-06-07 |
1,077 |
--
|
|
Snyk named a Leader in 2023 Gartner® Magic Quadrant™ for Application Security …
|
Manoj Nair |
2023-05-23 |
949 |
--
|
|
An unintimidating introduction to the dark arts of C/C++ vulnerabilities
|
Aviad Hahami |
2022-04-15 |
1,513 |
--
|
|
Preventing server-side request forgery in Node.js applications
|
David Ekete |
2024-02-20 |
1,759 |
--
|
|
Symmetric vs. asymmetric encryption: Practical Python examples
|
Josh Amata |
2024-05-15 |
4,010 |
--
|
|
Improving code quality with linting in Python
|
Keshav Malik |
2022-10-12 |
1,767 |
2
|
|
Keeping Docker secrets secure (even if you’re not using Kubernetes)
|
Marcelo Oliveira |
2022-08-24 |
1,484 |
--
|
|
dompdf security alert: RCE vulnerability found in popular PHP PDF library
|
DeveloperSteve Coochin |
2022-03-18 |
1,185 |
--
|
|
5 best practices for React with TypeScript security
|
Marcelo Oliveira |
2022-12-08 |
1,755 |
--
|
|
Snyk named a 2023 Gartner Peer Insights™ Customers’ Choice for Application Security …
|
Ciana Abdollahian |
2023-12-04 |
622 |
--
|
|
How to use GitHub Actions environment variables
|
Lewis Gavin |
2022-11-22 |
1,877 |
--
|
|
Preventing broken access control in express Node.js applications
|
Ben Smitthimedhin |
2024-05-22 |
2,923 |
--
|
|
The SecurityManager is getting removed in Java: What that means for you
|
Mdu Sibisi |
2023-06-15 |
2,238 |
--
|
|
Welcoming Karyn Smith: Snyk’s new Chief Legal Officer
|
Peter McKay |
2022-02-07 |
539 |
--
|
|
Building an npm package compatible with ESM and CJS in 2024
|
Liran Tal |
2024-04-18 |
1,082 |
--
|
|
Investing in our planet: One tree planted for each new Snyker
|
Tori Hay Lindahl |
2022-04-22 |
444 |
--
|
|
Extend the power of your AppSec data with the new Snyk and …
|
Guy Plotnik |
2024-08-06 |
1,095 |
--
|
|
Meet (and join) our newest Snyk Ambassadors – Fall 2022 edition!
|
Gerald Crescione |
2022-09-19 |
861 |
--
|
|
Vulnerability disclosure: Which comes first, the security bug in PHP or the …
|
Liran Tal |
2023-12-19 |
841 |
--
|
|
Snyk sponsors Snowflake Summit
|
LaToya Muff |
2024-06-04 |
569 |
--
|
|
An investigation into code injection vulnerabilities caused by generative AI
|
Jack Hair |
2024-04-16 |
983 |
--
|
|
Lessons from OpenSSL vulnerabilities part 1: Preparing your supply chain for the …
|
Jamie Smith |
2023-04-19 |
1,133 |
--
|
|
Manage security issues in Jira with Snyk Security in Jira Cloud
|
LaToya Muff |
2023-08-09 |
330 |
--
|
|
Lessons from OpenSSL vulnerabilities part 2: Finding and fixing supply chain vulnerabilities
|
Jamie Smith |
2023-04-26 |
1,977 |
--
|
|
5 tips to supercharge app security from code to cloud
|
Sonya Moisset |
2023-08-08 |
2,759 |
--
|
|
The dangers of setattr: Avoiding Mass Assignment vulnerabilities in Python
|
Jack Hair |
2023-02-15 |
1,334 |
--
|
|
Understanding DNS attacks: Identifying and patching vulnerabilities
|
Nihad Hassan |
2022-10-26 |
2,002 |
--
|
|
Build a software bill of materials (SBOM) for open source supply chain …
|
Liran Tal |
2022-03-14 |
2,599 |
--
|
|
Enterprise security: Digital transformation and risk management with Anheuser-Busch Inbev and Manulife
|
Brian Piper |
2022-02-03 |
875 |
--
|
|
Buildkit mount cache race: Build-time race condition container breakout (CVE-2024-23651)
|
Rory McNamara |
2024-01-31 |
1,022 |
--
|
|
AWS re:Inforce 2022 recap
|
Shilpi Bhattacharjee |
2022-08-08 |
2,487 |
--
|
|
Snyk and Bitbucket best practices cheat sheet
|
Marco Morales |
2022-03-03 |
915 |
--
|
|
XS leaks: What they are and how to avoid them
|
Gino Diño |
2023-07-17 |
2,287 |
1
|
|
SAS and Snyk discuss the future of AI for development and security …
|
Brian Piper |
2023-10-09 |
848 |
--
|
|
Snyk Open Source adds C/C++ security scanning for unmanaged dependencies
|
Michal Brutvan |
2022-04-05 |
768 |
--
|
|
How Onna Technologies uses Snyk & Sysdig to secure the SDLC while …
|
Brian Piper |
2022-09-12 |
1,297 |
--
|
|
Suspicious Maintainer Unveils Threads of npm Supply Chain Attack
|
Liran Tal |
2024-07-16 |
1,524 |
--
|
|
Cloud security fundamentals part 1: Know your environment
|
Drew Wright |
2022-10-07 |
1,098 |
--
|
|
New Year's security resolutions for 2024 from Snyk DevRel, SecRel, and friends
|
Micah Silverman |
2024-01-18 |
1,188 |
--
|
|
Buildkit build-time container teardown arbitrary delete (CVE-2024-23652)
|
Rory McNamara |
2024-01-31 |
879 |
--
|
|
What you should know about PHP code security
|
Liran Tal |
2024-09-04 |
1,773 |
--
|
|
Secure your software supply chain with the new Snyk Vulnerability Intelligence for …
|
Sarah Conway |
2023-11-07 |
531 |
--
|
|
Snyk documentation: Our journey so far
|
David Bailey |
2024-02-29 |
978 |
--
|
|
Snyk and ServiceNow collaborate on new SBOM solution
|
Sarah Conway |
2023-05-16 |
470 |
--
|
|
Celebrating Father’s Day at Snyk
|
Snyk Team |
2022-06-17 |
93 |
--
|
|
CTF secrets revealed: TopLang challenge from SnykCon 2021 explained
|
Michael Aquilina |
2022-01-06 |
2,987 |
--
|
|
Agent hijacking: The true impact of prompt injection attacks
|
Elliot Ward, Rory McNamara, Mateo Rojas-Carulla, Sam Watts, Eric Allen |
2024-08-28 |
2,758 |
--
|
|
Mimic your mental model with Project Collections
|
Waleed Arshad |
2023-06-27 |
745 |
--
|
|
Rego 103: Types of values and rules
|
Jasper Van der Jeugt, Becki Lee |
2023-11-16 |
3,425 |
--
|
|
Introducing new Snyk AppRisk integrations: Enhancing application risk management with development context
|
Daniel Berman |
2024-08-01 |
890 |
--
|
|
A developer-centric approach to software
|
Mariah Gresham |
2022-02-18 |
1,108 |
--
|
|
Understanding Kubernetes Pod Security Standards
|
Gino Diño |
2023-06-20 |
1,389 |
--
|
|
Avoiding mass assignment vulnerabilities in Node.js
|
Benson Kuria Macharia |
2023-03-28 |
2,321 |
--
|
|
Snyk Fetch the Flag CTF 2023 writeup: Honey Baked Messages
|
John Hammond |
2023-11-30 |
298 |
--
|
|
Snyk is now also hosted in the EU providing regional data residency
|
Daniel Berman |
2022-06-28 |
633 |
--
|
|
Essential Node.js backend examples for developers in 2024
|
Liran Tal |
2024-06-12 |
2,643 |
--
|
|
Celebrating Asian American and Pacific Islander Heritage Month
|
Snyk Team |
2022-05-27 |
1,141 |
--
|
|
A developer’s best friend: Lessons learned from our canine companions about AI …
|
Krysta Williams-Timm |
2024-08-26 |
803 |
--
|
|
10 React security best practices
|
Liran Tal |
2022-07-18 |
1,130 |
2
|
|
Preventing XSS in Django
|
Liran Tal |
2023-03-13 |
1,932 |
--
|
|
Snyk Code now secures AI builds with support for LLM sources
|
Liqian Lim (林利蒨), Ranko Cupovic |
2024-06-25 |
571 |
--
|
|
Spring4Shell extends to Glassfish and Payara: same vulnerability, new exploit
|
Brian Vermeer |
2022-04-08 |
1,015 |
--
|
|
Announcing Insights: Helping you focus on top risks for your organization
|
Daniel Berman |
2023-06-07 |
1,737 |
--
|
|
Priorities from the OpenSSF Secure Open Source Software Summit 2023
|
Dan Appelquist |
2023-10-04 |
381 |
--
|
|
Under the C: A glance at C/C++ vulnerabilities in Python land
|
Aviad Hahami |
2022-04-28 |
1,289 |
--
|
|
How open source C++ code can introduce security risks
|
Snyk Security Research Team |
2022-08-22 |
1,353 |
--
|
|
Introducing the Snyk Partner Solutions Directory for discovering Snyk technology integrations
|
Cara Sampson |
2023-04-03 |
996 |
--
|
|
Snyk’s Evolution: A Message From CEO Peter McKay
|
Peter McKay |
2023-04-13 |
549 |
--
|
|
How to install Java on macOS
|
Liran Tal |
2024-04-17 |
2,820 |
--
|
|
CISO playbook: 3 things to consider when establishing a security culture
|
Simon Maple |
2023-03-09 |
1,249 |
--
|
|
GitHub Copilot code security: XSS in React
|
Liran Tal |
2023-10-19 |
2,044 |
--
|
|
Setting up SSL/TLS for Kubernetes Ingress
|
Peter De Tender |
2022-11-17 |
2,245 |
--
|
|
Security success in the Bay Area with Slack
|
Mariah Gresham |
2023-05-17 |
878 |
--
|
|
Snyk expands in Asia-Pacific (APAC) with new datacenter in Sydney, Australia
|
Daniel Berman |
2022-11-30 |
715 |
--
|
|
How to setup Deno Dev Container on GitHub Codespaces?
|
Liran Tal |
2024-07-18 |
2,097 |
--
|
|
Welcoming Kathleen Murphy and Zach Nelson to the Snyk Board of Directors
|
Peter McKay |
2022-01-24 |
448 |
--
|
|
Magento security requires additional patch to fix sanitization vulnerability
|
DeveloperSteve Coochin |
2022-02-24 |
711 |
--
|
|
Modernizing SAST rules maintenance to catch vulnerabilities faster
|
Frank Fischer |
2022-04-19 |
928 |
--
|
|
Command injection in Python: examples and prevention
|
Rubaiat Hossain |
2023-12-21 |
2,558 |
--
|
|
Meet (and join) our newest Snyk Ambassadors!
|
Waleed Arshad |
2022-03-28 |
1,783 |
--
|
|
Best practices for managing Java dependencies
|
Brian Vermeer |
2022-08-26 |
1,826 |
5
|
|
How to avoid web cache poisoning attacks
|
Najia Gul |
2023-09-11 |
2,155 |
--
|
|
How to secure Python Flask applications
|
Gourav Singh Bais |
2024-05-21 |
4,209 |
--
|
|
Fetch the Flag CTF 2023 sneak peek
|
Danielle Bradford |
2023-09-06 |
187 |
--
|
|
A DevSecOps solution for your apps on AWS from Snyk
|
David Lugo |
2023-11-28 |
900 |
--
|
|
Ignoring vulnerabilities with Snyk
|
Daniel Berman |
2022-05-03 |
1,845 |
--
|
|
Implementing TLS in Java
|
Himanish Munjal |
2022-11-09 |
2,166 |
--
|
|
Best practices for containerizing Go applications with Docker
|
Jekayin-Oluwa Olabemiwo |
2022-03-23 |
2,117 |
--
|
|
Snyk named as a top cybersecurity company in inaugural Fortune Cyber 60 …
|
Snyk Team |
2023-12-18 |
337 |
--
|
|
New years resolution: Don’t show my security tokens when hacking my demo …
|
Brian Vermeer |
2022-01-12 |
721 |
--
|
|
Snyk finds PyPi malware that steals Discord and Roblox credential and payment …
|
Raul Onitza-Klugman |
2022-08-16 |
1,689 |
--
|
|
A definitive guide to Ruby gems dependency management
|
Liran Tal |
2022-08-05 |
2,618 |
1
|
|
Security vs. Development: A game of priorities
|
Andrew MacKenzie |
2023-11-06 |
1,009 |
--
|
|
Identifying Insecure C Code with Valgrind and Fixing with Snyk Code
|
Liran Tal |
2024-09-24 |
1,373 |
--
|
|
Meet the new host for The Secure Developer podcast
|
Mariah Gresham |
2024-05-09 |
469 |
--
|
|
How to mitigate security issues in GenAI code and LLM integrations
|
Liran Tal |
2024-09-11 |
2,394 |
--
|
|
Announcing new Snyk AppRisk integration with Orca Security
|
Daniel Berman |
2024-09-11 |
809 |
--
|
|
Want to avoid a data breach? Employ secrets detection
|
Liran Tal |
2024-09-16 |
2,539 |
--
|
|
Promise queues and batching concurrent tasks in Deno
|
Liran Tal |
2024-09-25 |
3,378 |
--
|
|
AWS re:Invent 2022: How Neiman Marcus transitioned to developer-first security
|
Megan Moore |
2022-12-12 |
1,231 |
--
|
|
5 reasons why developers at FinServ institutions are outpacing their security teammates
|
Katie DeMatteis |
2024-09-09 |
822 |
--
|
|
Dive into AI and LLM learning with the new Snyk Learn learning …
|
Michael Biocchi |
2024-09-18 |
310 |
--
|
|
Welcoming Gary Olson: Snyk’s new Chief Revenue Officer
|
Peter McKay |
2024-03-04 |
444 |
--
|
|
How SAS secures their AI-generated code
|
Gerald Crescione |
2024-04-15 |
1,874 |
--
|
|
The journey to AppSec gold: Lessons we can learn from the Olympians
|
Krysta Williams-Timm |
2024-08-15 |
714 |
--
|
|
Tools for infrastructure drift detection
|
William Beuil |
2022-03-15 |
2,480 |
--
|
|
3 best practices to make the most of Snyk AppRisk Essentials
|
Daniel Berman |
2024-09-19 |
1,801 |
--
|
|
10 best practices to build a Java container with Docker
|
Brian Vermeer |
2022-08-24 |
4,147 |
--
|
|
Infosec Europe session: 4 tips for safer AI adoption
|
Gerald Crescione |
2024-08-01 |
1,103 |
--
|
|
How to prevent log injection vulnerability in JavaScript and Node.js applications
|
Liran Tal |
2024-09-26 |
1,504 |
--
|
|
Securing a DevOps pipeline with Snyk, Bitbucket, and AWS
|
Marco Morales |
2022-01-04 |
456 |
--
|
|
SurveyMonkey talks with Snyk about developer security during hypergrowth
|
Megan Moore |
2022-05-05 |
1,381 |
--
|
|
Meet Snyk for Government: Our developer security solution with FedRAMP ATO
|
Danny Allan |
2024-09-17 |
502 |
--
|
|
Zero-day RCE vulnerability found in CUPS - Common UNIX Printing System
|
Jim Armstrong |
2024-09-27 |
1,224 |
--
|
|
Going beyond reachability to prioritize what matters most
|
Jamie Smith |
2024-10-01 |
1,149 |
--
|
|
Proactive AppSec continuous vulnerability management for developers and security teams
|
Liran Tal |
2024-10-02 |
1,804 |
--
|
|
Snyk named a 2024 Gartner Peer Insights™ Customers’ Choice for Application Security …
|
Nina McClure |
2024-10-02 |
723 |
--
|
|
The mysterious supply chain concern of string-width-cjs npm package
|
Liran Tal |
2024-10-03 |
1,455 |
--
|
|
SnykLaunch Oct 2024: Enhanced PR experience, extended visibility, AI-powered security, holistic risk …
|
Anthony Larkin |
2024-10-08 |
1,489 |
--
|
|
A look into your engineering interview at Snyk
|
Philip Beevers |
2024-10-09 |
750 |
--
|
|
Foundations of trust: Securing the future of AI-generated code
|
Danny Allan |
2024-10-10 |
888 |
--
|
|
Analyze Taint Analysis Faster with Improved Contextual Dataflow in Snyk Code
|
Liran Tal |
2024-10-10 |
875 |
--
|
|
Automatically fix code vulnerabilities with AI
|
Micah Silverman |
2024-10-14 |
1,132 |
--
|
|
How Snyk is prioritizing developer experience
|
Anthony Larkin |
2024-10-16 |
860 |
--
|
|
Snyk announces commitment to Service for America, bringing security education access to …
|
Michael Biocchi |
2024-10-17 |
394 |
--
|
|
Ensuring comprehensive security testing in DevOps pipelines
|
Jim Armstrong |
2024-10-17 |
1,317 |
--
|
|
Introducing: Extensive AppSec visibility with Snyk Analytics
|
Nastasha Casale |
2024-10-17 |
952 |
--
|
|
Elevating Views of Risk: Holistic Application Risk Management with Snyk
|
Daniel Berman |
2024-10-22 |
1,601 |
--
|
|
Women - Kickstart your Application Security Career!
|
Vandana Verma Sehgal |
2024-10-22 |
1,020 |
--
|
|
Find, auto-fix, and prioritize intelligently, with Snyk's AI-powered code security tools
|
Liqian Lim (林利蒨) |
2024-10-24 |
2,083 |
--
|
|
Vulnerability-Free C and C++ Development in Automotive Manufacturing and Software Defined Vehicles …
|
Liran Tal |
2024-10-23 |
1,469 |
--
|
|
Best Practices for Continuous Vulnerability Management
|
Liran Tal |
2024-10-29 |
1,698 |
--
|
|
Top 5 SAST Auto-fixing Tools and How They Compare
|
Liqian Lim (林利蒨) |
2024-10-29 |
966 |
--
|
|
Lottie Player npm package compromised for crypto wallet theft
|
Liran Tal |
2024-10-31 |
825 |
2
|
|
If you don’t know about HTTP Archive’s Web Almanac yet, you should!
|
Brian Clark |
2024-11-01 |
710 |
--
|
|
Snyk Recharge days: Making time to take time
|
Adriana Bokel Herde |
2023-05-17 |
710 |
--
|
|
GitFlops: The Dangers of Terraform Automation Platforms
|
Elliot Ward |
2024-11-07 |
1,831 |
--
|
|
Extending Developer Security with Dev-First Dynamic Testing
|
Manoj Nair |
2024-11-12 |
1,565 |
--
|
|
How ASPM boosts visibility to manage application risk
|
Daniel Berman |
2024-11-12 |
1,144 |
--
|
|
5 Disaster Recovery Testing Methodologies
|
Liran Tal |
2022-09-23 |
610 |
--
|
|
Understanding command injection vulnerabilities in Go
|
Liran Tal |
2024-11-14 |
1,891 |
1
|
|
5 Best Practices for Container security
|
Liran Tal |
2022-07-19 |
985 |
--
|
|
Snyk named a Customer Favorite in The Forrester Wave™: Software Composition Analysis …
|
Peter McKay |
2024-11-13 |
460 |
--
|
|
Phony PyPi package imitates known developer
|
Elliot Ward |
2022-10-05 |
1,031 |
2
|
|
An Introduction to capture the flag
|
Sonya Moisset |
2023-09-13 |
828 |
--
|
|
6 Kubernetes Tools That Can Help Secure Containers at Runtime
|
Liran Tal |
2022-06-08 |
481 |
--
|
|
Women in security: Inspiring leaders of today and tomorrow
|
Jonaki Egenolf |
2024-11-19 |
433 |
--
|
|
How to prioritize vulnerabilities based on risk
|
Daniel Berman |
2024-11-19 |
1,153 |
--
|
|
A commitment to future generations: Snyk’s 2024 Student Edition Capture The Flag …
|
Michael Biocchi |
2024-11-21 |
332 |
--
|
|
Why a solid DevOps foundation is vital for effective DevSecOps
|
Ben Desjardins |
2024-11-27 |
1,117 |
--
|
|
Measuring AppSec success: Key KPIs that demonstrate value
|
Daniel Berman |
2024-11-26 |
1,479 |
--
|
|
Seven steps to close coverage gaps with ASPM
|
Daniel Berman |
2024-12-03 |
1,023 |
--
|
|
2024 Open Source Security Report: Slowing Progress and New Challenges for DevSecOps
|
Jamie Smith |
2024-12-03 |
973 |
--
|
|
Empowering women in security: The impact of mentorship
|
Erin Cullen |
2024-11-27 |
696 |
--
|
|
Snyk-generated SBOMs now include license details for the open source libraries in …
|
Jamie Smith |
2024-12-09 |
906 |
--
|
|
How to mitigate SSRF vulnerabilities in Go
|
Liran Tal |
2024-12-10 |
910 |
--
|
|
Snyk’s risk-based approach to prioritization
|
Daniel Berman |
2024-12-11 |
1,082 |
--
|
|
Ultralytics AI Pwn Request Supply Chain Attack
|
Stephen Thoemmes |
2024-12-11 |
1,375 |
--
|
|
10 SDLC best practices to implement today
|
Jamie Smith |
2022-01-14 |
1,304 |
--
|
|
Microservices security: 6 best practice tips
|
Jamie Smith |
2022-02-10 |
1,226 |
--
|
|
Vulnerability vs Weakness: Understanding Key Differences in AppSec
|
Daniel Berman |
2023-11-17 |
1,934 |
--
|
|
7 Best practices for disaster recovery testing
|
Liran Tal |
2022-09-23 |
805 |
--
|
|
Ethical Hacking: Top Tools
|
Vandana Verma Sehgal |
2023-06-01 |
1,601 |
--
|
|
Top 8 AWS Security Best Practices
|
Liran Tal |
2022-10-18 |
1,835 |
--
|
|
Hiring a virtual CISO to help your security team
|
Manoj Nair |
2022-03-09 |
1,019 |
--
|
|
The 4 best DevSecOps tools for a secure DevOps workflow
|
Liran Tal |
2024-01-23 |
1,583 |
--
|
|
Essential AI Tools to Boost Developer Productivity and Security
|
Liqian Lim (林利蒨) |
2024-03-01 |
1,385 |
--
|
|
4 Advantages of using AI code review
|
Rory McNamara |
2023-11-29 |
1,152 |
--
|
|
Python Code Review Tools
|
Liran Tal |
2022-08-12 |
1,276 |
--
|
|
Unlocking the power of multi-cloud security
|
Vandana Verma Sehgal |
2023-04-25 |
1,147 |
--
|
|
Supply Chain Security Risks & Best Practice
|
Liran Tal |
2023-04-04 |
1,102 |
--
|
|
Getting started at a new organization
|
Manoj Nair |
2022-01-27 |
791 |
--
|
|
OWASP API Security Top 10 Risks
|
Liran Tal |
2022-09-23 |
1,816 |
--
|
|
8 proven code review best practices for developers
|
Liran Tal |
2022-01-14 |
1,316 |
--
|
|
How to implement DevSecOps in 4 steps
|
Jamie Smith |
2023-06-22 |
1,316 |
--
|
|
Software Supply Chain Security Tools: Types, Features & Considerations
|
Jamie Smith |
2023-08-02 |
1,306 |
--
|
|
C++ in the wild: Which industries use C++?
|
Liran Tal |
2022-04-29 |
1,070 |
--
|
|
Developer-first supply chain security
|
Jamie Smith |
2023-09-19 |
1,330 |
--
|
|
Top 5 Docker Security Vulnerabilities
|
Liran Tal |
2022-10-31 |
1,036 |
--
|
|
Asset-first application security: What is it and how can it help
|
Daniel Berman |
2023-11-03 |
1,156 |
--
|
|
The Importance of Container Monitoring
|
Jamie Smith |
2022-03-02 |
1,013 |
--
|
|
Cloud security challenges
|
Rory McNamara |
2022-05-19 |
2,423 |
--
|
|
Defense in Depth
|
Daniel Berman |
2024-02-29 |
1,430 |
--
|
|
Top AWS Security Risks & Prevention
|
Rory McNamara |
2023-03-02 |
1,256 |
--
|
|
Top 8 DevSecOps Best Practices - Build Securely
|
Liran Tal |
2022-09-26 |
1,074 |
--
|
|
Secrets Management: Tools & Best Practice
|
Jamie Smith |
2023-06-26 |
1,318 |
--
|
|
Product Security vs. Application Security: What’s the Difference?
|
Rory McNamara |
2023-07-21 |
1,390 |
--
|
|
6 tips for managing your open source components
|
Liran Tal |
2022-04-26 |
1,364 |
--
|
|
4 Enterprise-level security best practices
|
Manoj Nair |
2023-07-20 |
617 |
--
|
|
7 best Java code review tools for developers
|
Liran Tal |
2022-01-14 |
1,375 |
--
|
|
AppSec Maturity Models
|
Rory McNamara |
2024-03-08 |
1,120 |
--
|
|
Cybersecurity Hygiene 101
|
Liran Tal |
2023-03-02 |
1,594 |
--
|
|
High profile AWS breaches & how to avoid them
|
Jamie Smith |
2023-06-07 |
1,197 |
--
|
|
API Security Guide
|
Liran Tal |
2023-04-25 |
1,338 |
--
|
|
Did you make the *security* naughty or nice list this year?
|
Mariah Gresham |
2024-12-18 |
590 |
--
|
|
4 tips for securing GenAI-assisted development
|
Sarah Conway |
2024-12-18 |
859 |
--
|
|
New year, new security goals: Improve your AppSec in 2025
|
Mariah Gresham |
2025-01-01 |
729 |
--
|
|
Securing the Digital Future: AppSec Best Practices in Digital Banking
|
Hiroko Nakano |
2025-01-06 |
587 |
--
|
|
Securing GenAI Development with Snyk
|
Liqian Lim (林利蒨) |
2025-01-09 |
697 |
--
|
|
Snyk Recognized as Trusted Partner and Innovator by JPMorganChase
|
Ken Mellert |
2025-01-14 |
294 |
--
|
|
BFI’s Journey in Digital Transformation: A Fireside Chat on Elevating Application Security …
|
Hiroko Nakano |
2025-01-15 |
506 |
--
|
|
Snyk Security Labs Testing Update: Cursor.com AI Code Editor
|
Danny Allan |
2025-01-14 |
688 |
6
|
|
Understanding the EU’s Cyber Resilience Act (CRA)
|
Ben Desjardins |
2025-01-22 |
1,105 |
--
|
|
Sneak Peek into Fetch the Flag CTF 2025
|
Gina Fitzpatrick |
2025-01-21 |
293 |
--
|
|
Reviving DevSecOps: How Snyk’s new framework builds trust and collaboration
|
Ben Desjardins |
2025-01-23 |
793 |
--
|
|
Introducing Snyk Accelerate powered by Accenture
|
Taylor Buie |
2025-01-28 |
1,079 |
--
|
|
Consolidate Security Findings with Snyk and Google Security Command Center
|
Daniel Berman |
2025-02-06 |
701 |
--
|
|
Do not pass GO - Malicious Package Alert
|
Vandana Verma Sehgal |
2025-02-12 |
477 |
--
|
|
The First Round of Changes to Match Snyk's Design Language
|
Snyk Team |
2025-01-23 |
703 |
--
|
|
Can Snyk Find Weak Cryptographic Algorithms? Bye Bye MD5
|
Liran Tal |
2025-02-25 |
582 |
--
|
|
Celebrating Black History Month 2025 at Snyk
|
Snyk Team |
2025-02-26 |
708 |
--
|
|
Snyk’s Fetch the Flag CTF is More Than Just a CTF
|
John Hammond |
2025-02-20 |
784 |
--
|
|
Incorporating security by design: Managing risk in DevSecOps
|
Ben Desjardins |
2025-02-25 |
844 |
--
|
|
Does Claude 3.7 Sonnet Generate Insecure Code?
|
Stephen Thoemmes |
2025-02-26 |
571 |
--
|
|
Solving Security Challenges with Snyk Code and Symbolic AI
|
Liran Tal |
2025-02-27 |
916 |
--
|
|
Leveraging Generative AI with DevSecOps for Enhanced Security
|
Stephen Thoemmes |
2025-02-27 |
1,059 |
--
|
|
ChatGPT and Secure Coding: Benefits and Security Vulnerabilities of ChatGPT-Generated Code
|
Stephen Thoemmes |
2025-03-04 |
907 |
--
|
|
Can Snyk Detect JWT Security Issues?
|
Liran Tal |
2025-03-04 |
1,201 |
--
|
|
The rising trend of malicious packages in open source ecosystems
|
Idan Digmi |
2023-03-23 |
1,000 |
--
|
|
Learn about API security risks with the new Snyk Learn Learning Path
|
Michael Biocchi |
2025-03-06 |
319 |
--
|
|
Fetch the Flag CTF 2025 Community Writeups
|
Gina Fitzpatrick |
2025-03-05 |
240 |
--
|
|
Introducing Snyk Accelerate with Accenture
|
Taylor Buie |
2025-01-28 |
880 |
--
|
|
6 Software Composition Analysis (SCA) best practices
|
Liran Tal |
2022-04-27 |
1,010 |
--
|
|
AI Code Generation: Code Security & Quality, Benefits, Risks & Top Tools
|
Stephen Thoemmes |
2025-03-11 |
1,122 |
--
|
|
Snyk and ServiceNow: Streamlining Vulnerability Management with ServiceNow VR Assignment Rules
|
Sarah Conway |
2025-03-12 |
556 |
--
|
|
DevSecOps Automation Framework
|
Ben Desjardins |
2025-03-11 |
795 |
--
|
|
Snyk Helps Secure the Golang Bento Project
|
Phill Garrett |
2025-03-12 |
401 |
--
|
|
AI Risk Management: Benefits, Challenges, and Best Practices
|
Stephen Thoemmes |
2025-03-13 |
968 |
--
|
|
Responding and remediating: Best practices for handling security alerts
|
Ben Desjardins |
2025-03-13 |
874 |
--
|
|
Building a Culture of Secure Coding: Empowering Developers to Build Resilient Software
|
Akanchha Shrivastava |
2025-03-18 |
1,499 |
--
|
|
Unburdening Developers From Vulnerability Fatigue with Snyk Delta Findings
|
Liran Tal |
2025-03-18 |
1,337 |
--
|
|
Reconstructing the TJ Actions Changed Files GitHub Actions Compromise
|
Micah Silverman |
2025-03-17 |
2,139 |
--
|
|
Overcoming AppSec Challenges in FinServ: How CIBC Balances Speed, Security, and Compliance
|
Snyk Team |
2025-03-20 |
523 |
--
|
|
CVE-2025-29927 Authorization Bypass in Next.js Middleware
|
Liran Tal |
2025-03-23 |
681 |
--
|
|
What is a Data Poisoning Attack?
|
Stephen Thoemmes |
2025-03-25 |
852 |
--
|
|
Governance in DevSecOps: Measuring and Improving Security Outcomes
|
Ben Desjardins |
2025-03-27 |
1,053 |
--
|
|
Get Off My Lawn and Fix Your Vulnerabilities!
|
Randall Degges |
2025-04-01 |
816 |
--
|
|
Q&A Session with Snyk & John Hammond: Your Fetch the Flag Questions, …
|
Gina Fitzpatrick |
2025-04-01 |
733 |
--
|
|
Snyk Security Solution Now Integrated into Google Cloud's Gemini Code Assist
|
Liqian Lim (林利蒨) |
2025-04-09 |
1,426 |
--
|
|
Snyk’s Statement on the MITRE CVEs Program Funding Update
|
Danny Allan |
2025-04-16 |
362 |
--
|
|
Snyk Partners with Nova8 to Empower Secure Development Across Latin America
|
Michael Daniels |
2025-04-15 |
735 |
--
|
|
Snyk Ushers in the Future of DAST: AI-Driven Security for the Age …
|
Manoj Nair |
2025-04-22 |
880 |
--
|
|
Black Hat Asia 2025: My Journey as a Reviewer, Speaker & Community …
|
Vandana Verma Sehgal |
2025-04-28 |
938 |
--
|
|
Secure AI-Generated Code at Speed with Snyk and ServiceNow
|
Sarah Conway |
2025-05-01 |
707 |
--
|
|
Learn About Open Source Security Risks With the New Snyk Learn Learning …
|
Michael Biocchi |
2025-05-05 |
327 |
--
|
|
Driving AI Security Innovation: Snyk Enhances Global Channel & GSI Partner Program
|
Cyndi Doyle |
2025-05-08 |
606 |
--
|
|
Security Testing for Single-Page Applications (SPAs)
|
Tiago Mendo |
2025-05-21 |
995 |
--
|
|
Snyk @ RSAC 2025
|
Snyk Team |
2025-05-12 |
686 |
--
|
|
Snyk Report shows 88% of CISOs are concerned with current state of …
|
Snyk Team |
2025-05-22 |
873 |
--
|
|
Snyk Learn in the Exosphere: Securing Space at HackSpaceCon
|
Michael Biocchi |
2025-05-23 |
693 |
--
|
|
Scaling Security Education with Snyk's New Learn Add-on
|
Michael Biocchi |
2025-05-29 |
596 |
--
|
|
AI Trust in Action: How Snyk Agent Redefines Secure Development
|
Brendan Hann |
2025-06-02 |
1,296 |
--
|
|
Welcome to Snyk Labs: Charting the Course for AI-Native Security
|
Manoj Nair |
2025-05-28 |
415 |
--
|
|
AI Is Reshaping Software. Is Your Security Strategy Keeping Up?
|
Snyk Team |
2025-05-29 |
906 |
--
|
|
Introducing the Snyk AI Trust Platform
|
Brendan Hann |
2025-05-28 |
1,700 |
--
|
|
Welcome-to-The New Era of AI-Driven Development
|
Snyk Team |
2025-05-29 |
478 |
--
|
|
From Risk to Resilience: Achieving HIPAA Standards in Your App
|
Tiago Mendo |
2025-06-04 |
831 |
--
|
|
The Future of Developer Upskilling Is Human-Led, AI-Supported
|
Kate Powers Burke |
2025-06-04 |
912 |
--
|
|
Humans at the Center: Redefining the Role of Developers in an AI-Powered …
|
Snyk Team |
2025-06-05 |
625 |
--
|
|
Snyk for Government Achieves FedRAMP Moderate Authorization: A Milestone for Secure Government …
|
Danny Allan |
2025-06-05 |
683 |
--
|
|
Transform Your AppSec Program With the Power of Snyk Analytics
|
Nastasha Casale |
2025-06-11 |
1,294 |
--
|
|
Build Fast, Stay Secure: Guardrails for AI Coding Assistants
|
Ezra Tanzer |
2025-06-11 |
1,466 |
--
|
|
Finding Software Flaws Early in the Development Process Provides Clear ROI
|
Nuno Loureiro |
2025-06-11 |
771 |
--
|
|
Why ANZ Technology Leaders Are Rethinking How AI, Speed, and Security Intersect
|
Lawrence Crowther |
2025-06-15 |
892 |
--
|
|
The New Threat Landscape: AI-Native Apps and Agentic Workflows
|
Snyk Team |
2025-06-18 |
606 |
--
|
|
Snyk and Continue Partner to Embed AI-Powered Security into Every Step of …
|
Sarah Conway |
2025-11-18 |
721 |
--
|
|
Scaling AI Security: How Evo Complements New Agentic Tools
|
John Carione |
2025-11-24 |
1,663 |
--
|
|
Organizations Achieve 288% ROI with The Snyk AI Trust Platform, According to …
|
Peter McKay |
2025-11-12 |
740 |
--
|
|
Maintainers of ESLint Prettier Plugin Attacked via npm Supply Chain Malware
|
Liran Tal |
2025-07-22 |
649 |
--
|
|
Snyk Named a Leader in the 2025 Gartner® Magic Quadrant™ for Application …
|
Ben Desjardins |
2025-10-14 |
468 |
--
|
|
Secure by Design: The Future of Threat Modeling for AI-Native Applications
|
John Carione |
2025-11-11 |
1,309 |
--
|
|
Snyk Joins CISA's Secure by Design Pledge
|
Brian Campbell |
2025-08-05 |
1,513 |
--
|
|
Secure at Inception: Introducing New Tools for Securing AI-Native Development
|
Daniel Berman and Liran Tal |
2025-08-04 |
1,554 |
--
|
|
Human + AI: The Next Era of Snyk's Vulnerability Curation
|
Tal Dromi |
2025-07-14 |
1,399 |
--
|
|
Why We Built Evo — From My Heart
|
Manoj Nair |
2025-10-22 |
725 |
--
|
|
Old AI Security vs Evo: Watch Agentic Security Replace Weeks of Manual …
|
Manoj Nair |
2025-12-16 |
887 |
--
|
|
Navigating Enterprise AI Implementation: Risks, Rewards, and Where to Start
|
Matt Jarvis |
2025-07-21 |
834 |
--
|
|
Run AutoMCP To Supercharge Your AI Agent with Libraries MCP Servers
|
Liran Tal |
2025-12-03 |
858 |
--
|
|
Snyk and Cognition partner to enhance security for AI-native development
|
Sarah Conway |
2025-10-15 |
466 |
--
|
|
The Hidden Costs of False Positives in Healthtech Security
|
Nuno Loureiro |
2025-08-05 |
1,198 |
--
|
|
Meeting the AI Mandates with Confidence: Why Federal Teams Trust Snyk
|
Phoebe Nerdahl |
2025-08-07 |
708 |
--
|
|
Fixing Fix Fatigue: Building Developer Trust for Secure AI Code
|
Ezra Tanzer |
2025-06-30 |
1,146 |
--
|
|
Cursor IDE Malware Extension Compromise in $500k Crypto Heist
|
Liran Tal |
2025-07-21 |
595 |
--
|
|
Snyk Studio: Now for All Customers, Powering Secure AI Development at Scale
|
Daniel Berman |
2025-11-04 |
1,844 |
--
|
|
When “Private" Isn't: The Security Risk of GPT Chats Leaking to Search …
|
Sonya Moisset |
2025-08-01 |
729 |
--
|
|
What an 'Aha' Moment with an Org Admin Token Taught One DevSecCon …
|
Alysa Turner |
2025-09-04 |
697 |
--
|
|
SHA1-Hulud, npm supply chain incident
|
Brian Vermeer |
2025-11-24 |
642 |
--
|
|
Increasing Agility & Flexibility: How Mercato Solutions tackles the application security vs. …
|
Nina McClure |
2025-10-16 |
910 |
--
|
|
Zero-day Extensive NPM Package Compromise - Shai Hulud Supply Chain Attack
|
Brian Clark |
2025-09-15 |
1,141 |
--
|
|
Why Threat Modeling Is Now Even More Critical for AI-Native Applications
|
Snyk Team |
2025-11-20 |
1,029 |
--
|
|
Beyond the Hype: 5 Major Reasons to Attend DevSecCon 2025
|
Ben Desjardins |
2025-10-15 |
972 |
--
|
|
Anthem Awards 2025: Snyk Learn Recognized for Commitment to Secure AI Development
|
Michael Biocchi |
2025-11-19 |
548 |
--
|
|
Building AI Trust with Snyk Code and Snyk Agent Fix
|
Liqian Lim (林利蒨) and Brendan Hann |
2025-06-23 |
1,305 |
--
|
|
Why AI Trust Will Shape Your Next Decade of Software Development
|
Brendan Hann |
2025-06-24 |
713 |
--
|
|
When Speed Meets Security: Snyk Studio for Kiro
|
Sarah Conway |
2025-12-01 |
856 |
--
|
|
The Agentic OODA Loop: How AI and Humans Learn to Defend Together
|
Manoj Nair |
2025-11-10 |
1,598 |
--
|
|
Snyk Studio brings security scanning and automated fixes to Factory's Droids
|
Sarah Conway |
2025-11-05 |
687 |
--
|
|
Snyk Ranked #51 on 2025 Forbes Cloud 100 List
|
Peter McKay |
2025-09-22 |
439 |
--
|
|
Beyond the Scan: The Future of Snyk Container
|
Brendan Hann and Pratip Banerji |
2025-11-04 |
1,395 |
--
|
|
npm Supply Chain Attack via Open Source maintainer compromise
|
Brian Clark |
2025-09-08 |
801 |
--
|
|
The Holiday Whisper: Shai-Hulud 3.0
|
Lion Kontorer |
2025-12-29 |
809 |
--
|
|
Secure Your AI Workflows: New Governance & Visibility Features from Snyk
|
Kate Powers Burke and Brendan Hann |
2025-09-18 |
820 |
--
|
|
Speaking Different Languages: How to Align Dev and Sec Teams Effectively
|
Tiago Mendo |
2025-09-16 |
1,269 |
--
|
|
DevSecCon 2025 Recap: Securing the AI Revolution Together
|
Ben Desjardins |
2025-10-23 |
1,627 |
--
|
|
From Hype to Trust: Building the Foundations of Secure AI Development
|
Manoj Nair |
2025-07-21 |
828 |
--
|
|
Fend Off AI Fatigue with the Snyk AI Trust Platform
|
Brendan Hann |
2025-07-29 |
634 |
--
|
|
Beyond Automation: Securing Low-Code Agentic AI with MCP Guardrails
|
Pas Apicella |
2025-11-19 |
787 |
--
|
|
How Snyk Studio for Qodo Is Closing the AI Security Gap
|
Sarah Conway |
2025-11-21 |
755 |
--
|
|
AI Agents in Cybersecurity: Revolutionizing AppSec
|
Stephen Thoemmes |
2025-08-14 |
1,223 |
--
|
|
Phishing Campaign Leveraging the NPM Ecosystem
|
Liran Tal |
2025-10-10 |
1,766 |
--
|
|
Snyk Log Sniffer: AI-Powered Audit Log Insights for Security Leaders
|
Liran Tal |
2025-11-26 |
988 |
--
|
|
Announcing a Dedicated Snyk API & Web Infrastructure Instance for Asia-Pacific
|
Snyk Team |
2025-06-17 |
669 |
--
|
|
Accelerating innovation with AWS: Snyk selected as an AWS Pattern Partner
|
Sarah Conway |
2025-12-03 |
1,228 |
--
|
|
Snyk Supercharges API Discovery with New Akamai Integration
|
Nuno Loureiro |
2025-08-06 |
656 |
--
|
|
Automated Package-Publication Incident IndonesianFoods in the NPM Ecosystem Linked to Crypto Reward-Farming …
|
Stephen Thoemmes |
2025-11-13 |
1,159 |
--
|
|
Prioritize with Snyk’s Open Source Vulnerability Experience
|
Ryan McMorrow |
2025-08-20 |
598 |
--
|
|
How Snyk Learn Helps You Meet PCI DSS v4.0 Developer Training Requirements
|
Michael Biocchi and Celia Jenkins |
2025-09-23 |
1,105 |
--
|
|
From Ideas to Impact: How the Bay Area Is Shaping the Future …
|
Manoj Nair |
2025-08-06 |
993 |
--
|
|
Snyk Named a Leader in the 2025 Forrester SAST Wave: SAST Solutions, …
|
Ben Desjardins |
2025-09-09 |
586 |
--
|
|
How Snyk Helps Federal Agencies Prepare for the Genesis Mission Era of …
|
Phoebe Nerdahl |
2025-12-09 |
668 |
--
|
|
Evo Adds CycloneDX Support to Give Full AI Visibility
|
John Carione |
2025-12-19 |
1,003 |
--
|
|
Minimizing False Positives: Enhancing Security Efficiency
|
Tiago Mendo |
2025-07-02 |
1,047 |
--
|
|
Scan your AI-generated code from Cursor using Model Context Protocol (MCP)
|
Manoj Nair |
2025-06-23 |
284 |
--
|
|
The Ultimate Guide to Upcoming CTFs: From Beginner to Elite Hacker in …
|
Stephen Thoemmes |
2025-09-29 |
2,456 |
--
|
|
Agentic Container Security with Snyk MCP Server
|
Liran Tal |
2025-08-13 |
931 |
--
|
|
Snyk
|
-- |
2025-12-31 |
108 |
--
|
|
Security Advisory: Critical RCE Vulnerabilities in React Server Components (CVE-2025-55182)
|
Stephen Thoemmes |
2025-12-03 |
1,073 |
--
|
|
From Code to Agents: Proactively Securing AI-Native Apps with Cursor and Snyk
|
Manoj Nair and Luca Beurer-Kellner and Krysztof Huszcza |
2025-12-22 |
1,248 |
--
|
|
Malicious MCP Server on npm postmark-mcp Harvests Emails
|
Liran Tal |
2025-09-25 |
3,282 |
--
|
|
Understanding CRA Compliance: Overcoming Challenges with an Integrated Security Testing Approach
|
Snyk Team |
2025-06-26 |
1,019 |
--
|
|
From Two Years to Two Weeks: How Labelbox Erased Its Security Debt …
|
Snyk Team |
2025-09-18 |
1,029 |
--
|
|
Weaponizing AI Coding Agents for Malware in the Nx Malicious Package Security …
|
Liran Tal |
2025-08-27 |
2,191 |
--
|
|
Secure by Default: Why Snyk and Augment Code are the New Standard …
|
Lindsay Kitendaugh |
2026-01-07 |
438 |
--
|
|
Beyond Detection: Building a Resilient Software Supply Chain (Lessons from the Shai-Hulud …
|
Liran Tal |
2026-01-08 |
1,075 |
--
|
|
ServiceNow's Virtual Agent Vulnerability Shows Why AI Security Needs Traditional AppSec Foundations
|
Stephen Thoemmes |
2026-01-14 |
1,453 |
--
|
|
Live From Davos: The End of Human-Speed Security
|
Peter McKay |
2026-01-20 |
1,002 |
--
|
|
4 Reasons Why CTFs Are One of the Best Ways to Grow …
|
Ben Sadeghipour (NahamSec) |
2026-01-27 |
651 |
--
|
|
2026 State of Agentic AI Adoption
|
-- |
2026-02-03 |
164 |
--
|
|
The Prescriptive Path to Operationalizing AI Security
|
Brian Rogan |
2026-02-03 |
3,144 |
--
|
|
Introducing the AI Security Fabric: Empowering Software Builders in the Era of …
|
Manoj Nair |
2026-02-03 |
1,747 |
--
|
|
Snyk Advisor is Reshaping Package Intelligence on Snyk Security Database
|
Noa Yaffe-Ermoza |
2026-02-02 |
568 |
--
|
|
280+ Leaky Skills: How OpenClaw & ClawHub Are Exposing API Keys and …
|
Luca Beurer-Kellner and Aleksei Kudrinskii and Marco Milanta and Kristian Bonde Nielsen and Hemang Sarkar and Liran Tal |
2026-02-05 |
1,732 |
--
|
|
Snyk Finds Prompt Injection in 36%, 1467 Malicious Payloads in a ToxicSkills …
|
Luca Beurer-Kellner and Aleksei Kudrinskii and Marco Milanta and Kristian Bonde Nielsen and Hemang Sarkar and Liran Tal |
2026-02-05 |
3,267 |
--
|