670 blog posts published by month since the start of 2022. Start from a different year:

Blog URL
Posts year-to-date
44 (72 posts by this month last year.)
Average posts per month since 2022
14.0

Post details (2022 to today)

Title Author Date Word count HN points
Snyk in 30: Developer-first security democast Jim Armstrong Mar 02, 2023 1538 -
Announcing the 2022 State of Open Source Security report from Snyk and the Linux Foundation Megan Moore Jun 21, 2022 558 -
New OpenSSL critical vulnerability: What you need to know Vandana Verma Sehgal Oct 31, 2022 1282 2
Welcoming Samantha Wessels: Snyk’s New Vice President, EMEA Sales Dino DiMarino Jan 10, 2022 409 -
Modern VS Code extension development: The basics Mdu Sibisi Sep 14, 2023 2775 -
What kind of (security) dog are you? Belyn Lai Aug 25, 2023 756 -
Mitigating DOM clobbering attacks in JavaScript Keshav Malik Aug 07, 2023 1806 -
Improving coverage of cloud resources to reduce infrastructure drift Stephane Jourdan Mar 23, 2022 2878 -
CodeSecDays conference and more complete security coverage with GitGuardian Sarah Conway Aug 10, 2023 989 -
Snyk users don't have to worry about NVD delays Hadas Bloom Mar 13, 2024 734 -
Best practices for creating a modern npm package with security in mind Brian Clark Sep 12, 2022 4985 2
Automate cloud compliance with Snyk IaC Lauren Place Feb 07, 2023 591 -
Discussions on improving security through chaos engineering Mariah Gresham Aug 03, 2023 966 -
How to strengthen security in your CI/CD pipeline James Konik Jul 12, 2023 1800 -
Snyk welcomes Helios, accelerating our ASPM vision with runtime insights Manoj Nair Jan 16, 2024 874 -
Introducing Snyk’s new Risk Score for risk-based prioritization Gur Shafriri, Benji Catabi-Kalman Aug 17, 2023 1514 -
Four easy ways to analyze your Java and Kotlin code Brian Vermeer Aug 13, 2024 1982 -
5 ways to improve security during digital transformation Erin Cullen Apr 10, 2023 1007 -
How to use AI for software development and cybersecurity Simon Maple Aug 30, 2023 1755 -
SnakeYaml 2.0: Solving the unsafe deserialization vulnerability Brian Vermeer Jun 21, 2023 1205 -
Finding YAML Deserialization with Snyk Code Calum Hutton Feb 23, 2023 799 -
Announcing customized role-based access controls for Snyk Daniel Berman Jun 29, 2022 1237 -
Snyk announces new Slack integration Sarah Conway May 30, 2023 610 -
Best practices for using AI in the SDLC Frank Fischer Jul 19, 2023 749 -
DevOpsDays Singapore 2024: Unmasking the security pitfalls in AI-generated code Hiroko Nakano Apr 23, 2024 562 -
Announcing the 2022 State of Cloud Security report from Snyk Megan Moore Sep 13, 2022 757 -
Engineering culture at Snyk: The values that support and drive our teams Sergey Vasilkov May 08, 2023 2259 -
SnykCon recap: Building a developer-focused AppSec program Mariah Gresham Jan 27, 2022 1051 -
"Dirty Pipe" Linux vulnerability and your containerized applications (CVE-2022-0847) Eric Smalling Mar 09, 2022 1180 -
Security lessons with a Snyk Ambassador Andres Haro Oct 11, 2022 941 -
3 tips from Snyk and Dynatrace’s AI security experts Sarah Conway Jan 22, 2024 905 -
Snyk Code, the only security tool chosen by developers in Stack Overflow's 2024 AI Search and Developer Tools survey Liqian Lim (林利蒨) Aug 27, 2024 901 -
Snyk Voices: Returning from maternity leave Tali Wahrhaft May 06, 2022 2557 -
How to prevent NullPointerExceptions in Java Lucien Chemaly Sep 21, 2023 2669 -
The ultimate guide to creating a secure Python package Gourav Singh Bais May 08, 2024 3482 -
Why you need a security companion for AI-generated code Liqian Lim (林利蒨) Oct 25, 2023 1834 -
Building Docker images in Kubernetes Vitalis Ogbonna May 03, 2022 1557 -
Snyk takes over Boston for SnykWeek Megan Moore May 19, 2022 663 -
Reduce risk to your supply chain with a software bill of materials (SBOM) Ryan Searle Jun 07, 2023 881 -
Cybersecurity Venture’s 2023 Software Supply Chain Attack Report Sydney Milligan Oct 10, 2023 816 -
Maximizing IAM security with AWS permissions boundaries and Snyk Wayne Crissman Jun 26, 2023 1019 -
Fun with ciphers in copycat Wordles Micah Silverman Feb 02, 2022 903 -
Data leak in the Netherlands: What developers should learn from this Brian Vermeer Mar 31, 2023 753 -
Identify vulnerabilities in your container images with Snyk’s enhanced Docker Desktop Extension LaToya Muff Apr 11, 2023 363 -
Learning from cloud transformation as we move to AI David Lugo May 21, 2024 976 -
Enabling policy as code (PaC) with OPA and Rego Eric Smalling Jan 19, 2022 1522 -
How to secure an S3 bucket on AWS? Liran Tal Jul 12, 2024 3393 -
Using Pulumi to automate the Snyk Kubernetes integration for containers Pas Apicella Feb 09, 2022 2064 -
How Axel Springer National Media and Tech achieved continuous security with Snyk Nina McClure Sep 03, 2024 952 -
You should be using HTTP Strict Transport Security (HSTS) headers in your Node.js server Raphael Mun Dec 29, 2022 1729 -
Secure Java URL encoding and decoding Jura Gorohovsky Aug 14, 2023 3090 -
Snyk named a Leader, placed highest in Strategy category in The Forrester Wave: Software Composition Analysis (SCA), Q2 2023 report Manoj Nair Jun 13, 2023 770 -
Nightfall AI and Snyk unite to deliver AI-powered secrets scanning for developers LaToya Muff Nov 29, 2023 547 -
SnykCon recap: Automation for better compliance and faster feedback loops Megan Moore Apr 13, 2022 1189 -
Krampus delivers an end-of-year Struts vulnerability Micah Silverman Jan 02, 2024 1667 -
3 tips for rebuilding a Docker image faster (and save CI seconds!) Liran Tal Dec 28, 2023 2564 -
Does AI lead to AppSec hell or nirvana? Erin Cullen Oct 03, 2023 1040 -
Node.js multithreading with worker threads series: worker_threads tutorial James Walker Oct 25, 2022 2310 -
PHP security in Snyk Code now GA DeveloperSteve Coochin Jan 26, 2022 760 -
Announcing Snyk AppRisk: Elevate your AppSec game with ASPM Daniel Berman Dec 12, 2023 1464 -
3 ways AppSec modernization is a game-changer for financial services Katie DeMatteis Sep 03, 2024 782 -
SnykLaunch April '23: C/C++ expansion, cloud and IaC updates, custom container security, new integrations, and more Jim Armstrong Apr 04, 2023 1462 -
New SEC cybersecurity rules put more onus on the CISO, not so much on directors Myke Lyons Aug 03, 2023 1578 -
Enhancing code to cloud security with the Common Configuration Scoring System Wayne Crissman Dec 14, 2023 998 -
Snyk welcomes Enso: Enabling security leaders to scale their AppSec program with ASPM Manoj Nair Jun 07, 2023 972 -
Leaky Vessels: Docker and runc container breakout vulnerabilities (January 2024) Jamie Smith Jan 31, 2024 1729 41
Introducing Snyk’s partnership with Gemini Code Assist David Lugo Apr 09, 2024 682 -
Snyk is named a Strong Performer as a first-time entrant in the Forrester Wave™: Static Application Security Testing (SAST) Q3 2023 Peter McKay Sep 20, 2023 696 -
Day in the life of a food giant CISO Vandana Verma Sehgal Apr 18, 2024 668 -
Join "The Big Fix" to secure your projects with Snyk and earn cool swag Liran Tal Feb 09, 2022 1029 -
Snyk & Atlassian: How to embed security in AI-assisted software development LaToya Muff Feb 14, 2024 1030 -
Integrating Snyk Code SAST results in your ServiceNow workflows Sarah Conway May 07, 2024 514 -
Three reasons to invest in an ASPM solution in 2024 Julia Kraut Dec 12, 2023 610 -
With Love, Your Applications Krysta Williams-Timm Feb 14, 2024 373 -
Snyk named a 2022 Gartner Peer Insights Customers’ Choice for Application Security Testing Tony Sleva Oct 04, 2022 382 -
Three trends shaping software supply chain security today Erin Cullen Aug 22, 2024 923 -
How to add Playwright tests to your pull request CI with GitHub Actions Liran Tal Oct 14, 2022 2546 -
Using insecure npm package manager defaults to steal your macOS keyboard shortcuts Yagiz Nizipli Jun 28, 2023 1102 -
Protestware is trending in open source: 4 different types and their impact Benji Catabi-Kalman Mar 22, 2022 1185 -
Fetch the Flag CTF 2022 writeup: Roadrunner Giovanni Funchal Nov 10, 2022 1138 -
AI quality: Garbage in, garbage out Michael Biocchi Jun 11, 2024 730 -
How to secure JavaScript applications right from the CLI Gideon Idoko Oct 24, 2023 2412 -
Happy 1st Birthday, Snyk Code! Frank Fischer May 06, 2022 1368 -
10 best practices for securely developing with AI Simon Maple Sep 27, 2023 3204 -
Snyk top 10 code vulnerabilities report Mariah Gresham May 18, 2023 424 1
Analyzing the PwnKit local privilege escalation exploit Kyle Suero Jan 29, 2022 726 -
Setting up the Docker image scan GitHub Action Mohammad-Ali A'râbi May 19, 2023 1076 -
Getting started with PHP static analysis in 2024 Liran Tal Mar 21, 2024 2431 -
Introducing the Snyk App for Compass: A complete view of software component risk LaToya Muff Oct 05, 2023 662 -
How to prevent XPath injection attacks Marcelo Oliveira May 10, 2023 2175 -
Securing your SBOM on Google Cloud David Lugo Mar 28, 2024 983 -
More accurate than GPT-4: How Snyk’s CodeReduce improved the performance of other LLMs Eric Fernandez May 07, 2024 1245 -
These aren’t the npm packages you’re looking for DeveloperSteve Coochin May 04, 2022 1141 -
Snyk’s guide to disclosing pronouns Mariah Gresham, Alex Fallon Jun 09, 2022 774 -
Can AI write secure code? Frank Fischer May 03, 2023 2244 -
Snyk finds 200+ malicious npm packages, including Cobalt Strike dependency confusion attacks Kirill Efimov May 24, 2022 2807 3
Introducing parlay, a tool for enriching SBOMs Gareth Rushgrove Jun 07, 2023 773 -
360 degrees of application security with Snyk Soumen Mukherjee Apr 24, 2024 1273 -
How to keep an HTTP connection alive for 9 hours Micah Silverman Oct 23, 2023 2391 3
Congratulations to Snyk’s 2022 CRN Women of the Channel Carey Stanton May 09, 2022 740 -
How to build a secure API gateway in Node.js Florian Rappl Dec 28, 2022 2647 -
Response to the Enduring Security Framework (ESF) Guide for Developers Gareth Rushgrove Sep 03, 2022 602 -
Creating SBOMs with the Snyk CLI Brian Vermeer Feb 08, 2024 1348 -
Vulnerability: runc process.cwd and leaked fds container breakout (CVE-2024-21626) Rory McNamara Jan 31, 2024 1114 3
Ethical hacking techniques Vandana Verma Sehgal Jun 05, 2023 1713 -
Alert: LaughTilYouCry ransomware sabotages npm package (with puns) Mariah Gresham Apr 01, 2022 529 -
Snykers share wellness tips for mental health awareness month Belyn Lai May 30, 2023 706 -
Snyk Partner Speaks series: True DevSecOps with Snyk and Dynatrace Sarah Conway Jun 08, 2023 177 -
Snyk enhances ServiceNow with comprehensive insights into vulnerabilities in open source software Marco Morales Jan 24, 2023 633 -
The security course missing from higher education Michael Biocchi Jul 12, 2022 955 -
Snyk ranked #20 on 2022 Forbes Cloud 100 list Jeff Yoshimura Aug 09, 2022 341 -
Container images simplified with Ko Eric Smalling Oct 10, 2022 3025 1
Snyk Ranked #19 on 2023 Forbes Cloud 100 List Peter McKay Aug 08, 2023 430 -
Going beyond “shift left” to extend AppSec in all directions Ben Desjardins Jul 09, 2024 968 -
Research with Snyk and Redhunt Labs: Scanning the top 1000 orgs on GitHub Vandana Verma Sehgal Jun 22, 2023 399 -
Snyk Partner Speak Video Series Puts Spotlight on New Integrations Sarah Conway Apr 12, 2023 181 -
How to build a modern DevSecOps culture: Lessons from Jaguar Land Rover and Asda Brian Piper Feb 21, 2024 1209 -
Panel recap: Breaking Bad Security Habits with Corey Quinn Erin Cullen Dec 20, 2022 985 -
Amplifying AAPI Voices to Honor Asian American Pacific Islander Heritage Month Belyn Lai, Yos Pang May 25, 2023 1495 -
NPM security: preventing supply chain attacks Liran Tal Nov 08, 2022 3307 1
Integrating the Snyk Language Server with IntelliJ IDEs Arvyd Paeglit Jun 17, 2024 344 -
Black Hat Asia customer panel recap: How to lead DevSecOps adoption Brian Piper Sep 18, 2023 821 -
Recap: Stress-Free Security for Devs and Ops on AWS David Lugo Apr 03, 2023 1341 -
Polyfill supply chain attack embeds malware in JavaScript CDN assets Liran Tal Jun 26, 2024 1892 -
The npm faker package and the unexpected demise of open source libraries Liran Tal Sep 02, 2022 2339 -
Snyk Fetch the Flag CTF 2023 writeup: Audiopolis John Hammond Nov 30, 2023 278 -
Securing the digital future: Reviewing the Biden-Harris administration's National Cybersecurity Strategy Vandana Verma Sehgal Mar 20, 2023 713 -
A security expert’s view on Gartner’s generative AI insights Liqian Lim (林利蒨) Aug 07, 2024 1729 -
Snyk CLI: Introducing Semantic Versioning and release channels Chintan B. Apr 30, 2024 930 -
Cheat sheet: Meeting security compliance standards Mariah Gresham Sep 15, 2022 784 -
How to make a mock API server in JavaScript David Ekete Oct 20, 2022 2038 1
Call for action: Exploring vulnerabilities in Github Actions Elliot Ward, Rory McNamara, Raul Onitza-Klugman Jun 06, 2024 3977 -
How Snyk can help secure supply chains per Executive Order M-21-30 Vandana Verma Sehgal Sep 29, 2022 1767 1
Session management security: Best practices for protecting user sessions Okoth Pius Jul 11, 2023 2703 1
Data loss prevention for developers Annabel Gauci May 24, 2023 2103 2
Snyk brings infrastructure as code security to HashiCorp Terraform Cloud Marco Morales May 04, 2022 762 -
Top 5 scary AWS misconfigurations Shilpi Bhattacharjee Oct 31, 2022 816 -
Snyk and Atlassian deepen partnership with Snyk security in Jira Software Jill Wilkins Feb 08, 2023 412 -
10 modern Node.js runtime features to start using in 2024 Liran Tal May 29, 2024 5030 2
Snyk and AWS announce native Amazon EKS support directly from the AWS Management Console David Lugo Jun 12, 2024 418 -
5 Node.js security code snippets every backend developer should know Liran Tal Feb 28, 2024 3106 -
Introducing the ASPM Masterclass Erin Cullen Mar 12, 2024 504 -
Dependency injection in Python Lucien Chemaly Oct 31, 2023 2919 -
Snyk Apps now GA: An easy, standardized, and secure framework for building custom integrations Sarah Conway Nov 20, 2023 1108 -
Manage security issues in Jira with Snyk Security in Jira Cloud LaToya Muff Aug 09, 2023 330 -
Securing symmetric encryption algorithms in Java Brian Vermeer Oct 18, 2023 1489 -
Preventing insecure deserialization in Node.js Benson Kuria Macharia Apr 17, 2023 1890 -
Building a security-conscious CI/CD pipeline Peter De Tender Jun 29, 2023 1529 -
Interview with an engineer: Diving into modern SAST Snyk Team May 18, 2022 1355 -
Controlling your server with a reverse shell attack Brian Vermeer Aug 10, 2022 1544 -
Is your team on the *security* naughty or nice list? Mariah Gresham Dec 20, 2023 873 -
Secure your application from Argo CD to Kubernetes JJ Ng Oct 12, 2022 1253 -
How to find and fix XML entity vulnerabilities Michael Sherman Sep 07, 2022 2223 -
How REI built a DevSecOps culture and how Snyk helped Brian Piper Feb 27, 2024 1154 -
Snyk achieves Red Hat Vulnerability Scanner Certification Tomás González Blasini, David Lugo Apr 03, 2023 391 -
Why fuzzing tools should be part of your security toolkit Kuria Macharia Oct 28, 2022 1763 -
How to find and fix Critical WebP zero-day vulnerability CVE-2023-4863 Brian Clark, Eric Smalling, Tim Gowan Oct 05, 2023 1282 -
Weak Hash vulnerability discovered in crypto-js and crypto-es (CVE-2023-46233 & CVE-2023-46133) Jamie Smith Oct 25, 2023 1509 -
2022 Snyk Customer Value Study highlights: The impact of developer-first security Jeff Yoshimura Oct 18, 2022 1061 -
How to update cURL Brian Clark, Eric Smalling Oct 11, 2023 1772 -
AWS top 10 misconfigurations and how to fix them: A cheat sheet Erin Cullen Mar 15, 2023 1546 -
Snyk + International Dog Day: recap Megan Moore Oct 05, 2022 374 -
Handling security vulnerabilities in Spring Boot Brian Vermeer Nov 29, 2023 1451 -
Three considerations for building an effective security program Alex Bovee May 04, 2023 920 -
Top 8 penetration testing tools Benson Kuria Macharia May 25, 2023 1172 -
Snyk Learn and the NIST Cybersecurity Framework (CSF) Michael Biocchi Mar 06, 2024 523 -
Snyk Fetch the Flag CTF 2023 writeup: Protect The Environment John Hammond Nov 30, 2023 243 -
Understanding and mitigating the Jinja2 XSS vulnerability (CVE-2024-22195) Liran Tal Jan 18, 2024 1059 -
Accelerate C/ C++ security with Snyk Marcie Cheung Dec 05, 2023 614 -
Scaling your security team without hiring Drew Wright Nov 02, 2022 984 -
Mastering Python virtual environments: A complete guide to venv, Docker, and securing your code Liran Tal Jan 10, 2024 1589 -
Snyk Fetch the Flag CTF 2023 writeup: I Do Math John Hammond Nov 30, 2023 190 -
8 tips for securing containers from source to runtime Sarah Conway Aug 24, 2022 661 -
How to verify and secure your Mastodon account Liran Tal Dec 05, 2022 946 -
How to protect Node.js apps from CSRF attacks Victor Ikechukwu Oct 17, 2023 3146 -
Snyk integrates with AWS Security Hub to automate security remediation workflows David Lugo Jun 12, 2023 884 -
Command injection vulnerability in Snyk CLI released prior to September 1, 2022 (older than v1.996.0) Gareth Rushgrove Oct 03, 2022 501 -
How to implement SSL/TLS pinning in Node.js Nwani Victory Aug 29, 2023 2298 -
Streamline dependency updates with Mergify and Snyk Liran Tal Aug 23, 2023 1548 -
The Cloud Security Podcast is now powered by Snyk! Ashish Rajan Jul 26, 2022 562 -
5 security best practices for adopting generative AI code assistants like GitHub Copilot Liqian Lim (林利蒨) Mar 05, 2024 1368 -
A denial of service Regex breaks FastAPI security Liran Tal Jul 31, 2024 1878 -
How secure is WebAssembly? 5 security concerns unique to WebAssembly Marcelo Oliveira Jul 28, 2023 1448 2
The Docker project turns 10! Looking back at a decade of containers Eric Smalling Mar 17, 2023 3058 -
Update: OpenSSL high severity vulnerabilities Vandana Verma Sehgal Nov 03, 2022 516 -
Talk to us about Snyk CLI Chintan B., Neil Mackay Jun 06, 2024 859 -
How Mulesoft fosters a developer-first, shift-left culture with Snyk Gerald Crescione Apr 30, 2024 798 -
The art of conditional rendering: Tips and tricks for React and Next.js developers Kumar Harsh Oct 30, 2023 2865 -
Snyk's 2023 State of Open Source Security: Supply chain security, AI, and more Simon Maple Jul 26, 2023 1184 -
Snyk achieves AWS Security Competency David Lugo Nov 15, 2023 514 -
Preventing SQL injection attacks in Node.js Lucien Chemaly Feb 20, 2024 2260 -
Addressing cybersecurity challenges in open source software with the Linux Foundation Mariah Gresham Jul 20, 2022 1033 -
SnykLaunch June ‘23: Insights and DeepCode AI enable faster fixes and prioritization Jim Armstrong Jun 07, 2023 1567 -
Finding and fixing exposed hardcoded secrets in your GitHub project with Snyk Chandler Mayo Jun 25, 2024 902 -
Breaking down the ’critical’ OpenSSL vulnerability Elliot Ward, Raul Onitza-Klugman Nov 04, 2022 1657 -
Does GitOps enhance application security? Vandana Verma Sehgal Aug 21, 2023 1026 -
What are AI hallucinations and why should developers care? Liran Tal Aug 16, 2023 2376 1
Ruby gem installations can expose you to lockfile injection attacks Liran Tal Aug 17, 2022 2317 -
Infrastructure drift and drift detection explained Lauren Place Mar 09, 2022 1362 -
Welcoming Danny Allan and Brian Rogan: Snyk leadership team expands with key appointments to accelerate innovation Peter McKay Feb 06, 2024 492 -
Getting started with React Native security Kingsley Ubah Apr 07, 2022 2306 -
Fetch the Flag CTF 2022 writeup: Logster Sonya Moisset Nov 10, 2022 1063 -
Snyk welcomes Reviewpad: Code, commit, celebrate! Manoj Nair Oct 30, 2023 606 -
Our favorite 2023 Snyk Fetch the Flag CTF writeups from the community Danielle Bradford Nov 21, 2023 183 -
Top 3 security best practices for handling JWTs Liran Tal Dec 18, 2023 2007 -
A quick primer on LDAP injection Eric Kahuha Jun 01, 2023 1379 -
10 GitHub Security Best Practices Brian Vermeer Feb 05, 2024 3532 3
Ruby on Rails Docker for local development environment Mikhail Tereschenko Nov 02, 2022 1770 -
.NET developers alert: Moq NuGET package exfiltrates user emails from git Liran Tal Aug 09, 2023 831 2
Modern VS Code extension development tutorial: Building a secure extension Mdu Sibisi Oct 02, 2023 3917 -
Introducing SUS: Snyk Ultimate Security Megan Moore Apr 01, 2022 592 -
Control your role! Kubernetes RBAC explored James Walker Jul 27, 2023 2123 -
The importance of platform engineers in a security program Elliott Spira Apr 13, 2023 962 -
Snyk Partner Speak Video with ServiceNow: A complete view of application security Sarah Conway May 02, 2023 196 -
Reporting AppSec risk up to your CISO Kate Powers Burke, Ezra Tanzer Feb 13, 2024 1945 -
Securing next-gen development: Lessons from Trust Bank and TASConnect Gerald Crescione Jun 05, 2024 1312 -
Building a secure CI/CD pipeline with GitHub Actions for your Java Application Brian Vermeer Jun 27, 2022 1456 -
Snyk brings developer-first AppSec approach to C/C++ Roy Ram, Neha Shenoy Apr 04, 2023 1094 -
Snyk sponsors Atlassian Team ’22: Bringing developer security to the Atlassian ecosystem Sarah Conway Apr 05, 2022 601 -
The persistent threat: Why major vulnerabilities like Log4Shell and Spring4Shell remain significant Brian Vermeer Aug 29, 2024 1000 -
Writing unit tests in Java Lewis Gavin Nov 18, 2022 1629 -
How to do password hashing in Java applications the right way! Brian Vermeer Mar 24, 2022 1911 -
DevSecOps lifecycle coverage with new Snyk and Dynatrace app Sarah Conway May 15, 2023 507 -
2022 Collaboration Partner of the Year: Snyk Sarah Conway Oct 05, 2022 417 -
How Snyk ensures safe adoption of AI Akanchha Shrivastava Mar 27, 2024 1534 -
Signing container images: Comparing Sigstore, Notary, and Docker Content Trust Hrittik Roy Sep 26, 2023 3098 -
Real-time threat protection with Snyk and SentinelOne Shivam Jindal Nov 09, 2023 679 -
Secure JavaScript URL validation Mannan Tirmizi May 09, 2023 1940 6
Using JLink to create smaller Docker images for your Spring Boot Java application Brian Vermeer Aug 24, 2023 1499 -
Adding Snyk security to Jira and Bitbucket Cloud LaToya Muff Oct 25, 2023 647 -
SDR Series: Meet our APJ team Snyk Team Apr 26, 2022 1350 -
Preventing Cross-Site Scripting (XSS) in Java applications with Snyk Code Brian Vermeer Apr 25, 2023 1523 -
SocketSleuth: Improving security testing for WebSocket applications Elliot Ward Sep 06, 2023 843 -
AI-generated security fixes in Snyk Code now available Jim Armstrong May 09, 2023 823 -
Snyk named to CNBC 2023 Disruptor 50 List Peter McKay May 09, 2023 311 -
Exploring 3 types of directory traversal vulnerabilities in C/C++ Kirill Efimov Apr 04, 2022 2081 -
Navigating the AI-powered development era in financial services Lawrence Crowther Aug 26, 2024 826 -
Fetch the Flag CTF 2022 writeup: Pay Attention Assaf Ben Josef Nov 10, 2022 1058 -
Cloud Security at Blackhat and Defcon 2022 Ashish Rajan Sep 06, 2022 1896 -
Achieving developer security adoption at Nylas with Snyk Erin Cullen Dec 04, 2023 762 -
WillowTree roundtable: security for hypergrowth organizations Mariah Gresham Apr 22, 2022 1051 -
Fetch the Flag CTF 2022 writeup: git-refs Iulia Manda Nov 10, 2022 585 -
Top 5 security concerns for infrastructure as code Raphael Mun Jul 14, 2023 1565 -
8 tips for securing your CI/CD pipeline with Snyk Eric Smalling Jul 20, 2023 3928 -
Timing out synchronous functions with regex Steve Shani Apr 06, 2023 1071 -
How Okta empowers devs to find & fix security issues with Snyk Mariah Gresham Aug 25, 2023 958 -
Make Snyk notifications work for you Michele Wiedemer Apr 06, 2022 550 -
7 tips to become a successful bug bounty hunter Ben Sadeghipour Jan 25, 2024 1246 -
Nine Docker pro tips for Node.js developers Liran Tal Apr 11, 2024 1630 -
Announcing IaC+ early access: Secure your infrastructure configurations across the SDLC Lauren Place Oct 03, 2023 686 -
How to generate an SBOM for JavaScript and Node.js applications Liran Tal May 22, 2023 2795 -
Build and deploy a Node.js security scanning API to Platformatic Cloud Liran Tal Jan 05, 2024 2980 -
Buildkit GRPC SecurityMode privilege check: Build-time container breakout (CVE-2024-23653) Rory McNamara Jan 31, 2024 946 -
What does Biden's Executive Order on AI safety measures mean for businesses? Liqian Lim (林利蒨) Nov 02, 2023 2399 -
Kroger’s approach to supply chain security Brian Piper Jan 02, 2024 888 -
AppSec spring cleaning checklist Mariah Gresham May 13, 2024 783 -
Enhancing PCI compliance security with SAST and SCA DeveloperSteve Coochin Feb 08, 2022 1359 -
Welcoming Diana Brunelle: Snyk’s New Chief People Officer Peter McKay Jul 22, 2024 336 -
Installing and managing Java on macOS Keshav Malik Oct 12, 2023 1464 -
The importance of verifying webhook signatures Marcelo Oliveira Jun 29, 2023 1829 -
Three ways Snyk made software supply chains more secure in 2022 Jamie Smith Jan 12, 2023 1390 -
Improving developer experience with security tools at Pinterest Megan Moore Jul 14, 2022 1165 -
Open source maintainer pulls the plug on npm packages colors and faker, now what? Liran Tal Jan 09, 2022 1160 1
Best practices for container isolation Maryann Agofure Aug 29, 2022 1562 -
Rego 102: Combining queries with AND/OR and custom messages Jasper Van der Jeugt, Becki Lee Nov 09, 2023 2514 -
Best practices for building a production-ready Dockerfile for PHP applications James Walker Aug 22, 2023 2507 -
Azure Bicep security fundamentals Mark Johnson Dec 13, 2022 1143 -
A guide to input validation with Spring Boot Lucien Chemaly Sep 12, 2023 2751 -
Detect infrastructure drift and unmanaged resources with Snyk IaC Stephane Jourdan May 09, 2022 1485 -
What’s new in CVSS 4.0 Paul Lascar Nov 08, 2023 1679 -
GitHub “besieged” by malware repositories and repo confusion: Why you'll be ok Liran Tal Mar 12, 2024 2102 -
Safer together: Snyk and CISPA collaborate for the greater good Idan Digmi Jun 06, 2022 853 -
Snyk Code’s autofixing feature, DeepCode AI Fix, just got better Eric Fernandez, Berkay Berabi Apr 23, 2024 2452 -
How to build a secure WebSocket server in Python Kingsley Ubah Jul 05, 2022 2728 -
How Lunar shifted security left while building a cloud native bank Brian Piper Jan 20, 2022 759 -
How Snyk helps satisfy White House cybersecurity recommendations Vandana Verma Sehgal Mar 23, 2022 1149 -
Generating fake security data with Python and faker-security Michael Aquilina Apr 26, 2022 859 -
Rediscovering argument injection when using VCS tools — git and mercurial Alessio Della Libera Aug 23, 2022 2111 3
Join the Snyk Developer Challenge Brittany Cannon Aug 01, 2022 479 -
5 tips for adopting AI code assistance securely Liqian Lim (林利蒨) May 30, 2024 856 -
Abusing Ubuntu 24.04 features for root privilege escalation Rory McNamara Sep 09, 2024 5975 189
Snyk's AppSec dream team Krysta Williams-Timm Mar 19, 2024 843 -
Limitations of a single AI model Frank Fischer Aug 07, 2023 1401 -
Automate security controls from development to production on Google Cloud David Lugo Jun 18, 2024 1073 -
My internship journey at Snyk Caroline Gow Feb 16, 2023 1329 -
Copilot amplifies insecure codebases by replicating vulnerabilities in your projects Randall Degges Feb 22, 2024 1578 -
Snyk Partner Speak video series with HashiCorp Sarah Conway Oct 04, 2023 180 -
5 ways to secure Drupal 10 Sushnigdha Tripathy Aug 23, 2022 1692 -
A day in the life of a CISO: Chris Hughes of Aquia Vandana Verma Sehgal Nov 04, 2022 851 -
10 Dimensions of Python Static Analysis Liran Tal Jul 17, 2024 4861 -
A security expert’s view on Gartner’s generative AI insights - Part 2 Liqian Lim (林利蒨) Aug 08, 2024 1231 -
High severity vulnerability found in libcurl and curl (CVE-2023-38545) Hadas Bloom Oct 04, 2023 1104 -
Improved risk assessment with EPSS scores in Snyk Daniel Berman May 22, 2023 1297 -
Node.js vs. Deno vs. Bun: JavaScript runtime comparison James Konik Sep 05, 2023 2966 -
Looking back at Black Hat USA 2022 Vandana Verma Sehgal Sep 21, 2022 903 -
Rego 101: Introduction to Rego Becki Lee Nov 02, 2023 2503 -
How LiveRamp used Snyk to remediate Log4Shell Brian Piper May 19, 2022 685 -
Why ASPM is the future of AppSec: Key points from our newest whitepaper Sarah Conway Jun 18, 2024 1177 -
Exploring WebExtension security vulnerabilities in React Developer Tools and Vue.js devtools Calum Hutton Nov 27, 2023 1511 -
Snyk IaC for Terraform Enterprise: Expanding Snyk compatibility with HashiCorp Terraform Sarah Conway Sep 28, 2022 562 -
7 AppSec tips from Snowflake’s Director of Product Security Brian Piper Aug 31, 2023 850 -
Breaking caches and bypassing Istio RBAC with HTTP response header injection Rory McNamara Jun 20, 2024 2498 -
How to choose a security tool for your AI-generated code Liqian Lim (林利蒨) Jan 09, 2024 1774 -
SnykWeek New York: In the cloud Megan Moore Oct 10, 2022 731 -
File encryption in Python: An in-depth exploration of symmetric and asymmetric techniques Keshav Malik Nov 22, 2023 2132 -
How to Dockerize a PHP application securely James Olaogun Aug 02, 2023 2389 1
Building a secure GraphQL API with Node.js Lawrence Eagles Mar 29, 2022 1901 -
Avoiding SMTP Injection: A Whitebox primer Sam Sanoop Sep 15, 2022 1579 1
Best practices for effective attack surface analysis Benson Kuria Macharia Jul 18, 2023 1659 -
Secure password hashing in Go Love Bhardwaj Dec 05, 2023 3088 -
How Spotify uses Snyk to secure the SDLC Brian Piper Sep 13, 2022 919 -
Announcing the open beta of Snyk's revamped security reporting Daniel Berman Nov 09, 2022 1354 -
Webhook Security Best Practices Gints Dreimanis Jul 06, 2022 1168 -
New IaC security workshop from Snyk, HashiCorp, and AWS at KubeCon Europe 2023 and on-demand Sarah Conway Apr 10, 2023 1035 -
Snyk is your security companion for Amazon CodeWhisperer Liqian Lim (林利蒨) Nov 29, 2023 1817 -
6 steps for scaling risk-based AppSec programs Julia Kraut Oct 13, 2023 938 -
Best practices for API gateway security Kuria Macharia Sep 07, 2022 1510 -
Power up security collaboration with Snyk and Slack Sarah Conway Oct 23, 2023 271 -
Exploiting HTTP/2 CONTINUATION frames for DoS attacks Vandana Verma Sehgal Apr 08, 2024 696 -
Repo Jacking: The Great Source-code Swindle Elliot Ward Jul 25, 2024 2516 -
Safely handling containers Tales Casagrande Jun 22, 2022 729 -
Security implications of cross-origin resource sharing (CORS) in Node.js Victor Ikechukwu Sep 13, 2023 2582 -
Using Rego as a generic policy language Dickson Boateng Jun 03, 2022 1323 -
Fetch the Flag CTF 2022 writeup: Disposable Message Michael Aquilina Nov 10, 2022 2421 -
Fetch the Flag CTF 2022 writeup: Treasure Trove Luke Watts Nov 10, 2022 572 -
How to write your first unit test in JavaScript Raphael Mun Oct 28, 2022 1600 2
Snyk highlights AWS re:Invent 2023 David Lugo Dec 14, 2023 820 -
The Snyk Perpetual Key Rotation Machine Megan Moore Apr 01, 2023 1000 -
Developer-centric DAST with Bright Security Vitaly Unic Apr 14, 2023 1496 -
Embrace your next cybersecurity career with The Big Fix Liran Tal Feb 22, 2023 692 -
The XZ backdoor CVE-2024-3094 Liran Tal Mar 31, 2024 1800 -
How Snyk can help secure supply chains per "A Guide to Implementing the Software Bill of Materials (SBOM) for Software Management"’ by Japan's METI Hiroko Nakano Aug 01, 2023 566 -
Patches of Pride: Love, inclusivity, & cute pets in celebration of Pride month Ashley Ladd Jun 20, 2023 463 -
Snyk’s new native integration with Bitbucket Cloud emphasizes dev-first security Sarah Conway Oct 25, 2022 847 -
Cloud security fundamentals part 3: Empower your developers Drew Wright Oct 21, 2022 1044 -
Snyk's AppSec journey in 2022 Jason Lane Jan 11, 2023 1554 -
Choosing the best Node.js Docker image Liran Tal, Adrian Mouat Sep 30, 2022 3033 2
Introducing Snyk Training, our online learning platform Michele Wiedemer Aug 11, 2022 424 -
10 AWS security considerations when migrating Drew Wright Nov 29, 2022 1455 -
Bolstering Snyk's developer security platform in 2022 Daniel Berman Jan 09, 2023 2059 -
Teaming up with Sysdig to deliver developer and runtime Kubernetes security Jim Armstrong Feb 16, 2022 679 -
Kicking off 2022 by recognizing DevSecOps leaders Jeff Yoshimura Jan 06, 2022 1146 -
Snyk integrates with AWS CloudTrail Lake to simplify security audits David Lugo Feb 01, 2023 551 -
Fastify plugins as building blocks for a backend Node.js API Liran Tal May 28, 2024 2479 -
Snyk scanning capabilities are now embedded in Jira Software Sarah Conway Jun 06, 2023 658 -
InCyber Forum Europe recap: 4 tips from DevSecOps experts Nina McClure Aug 14, 2024 1217 -
Exploring the Spring Security authorization bypass (CVE-2022-31692) Brian Vermeer Dec 16, 2022 1121 -
Key points from Google and Accenture's ransomware white paper Vandana Verma Sehgal Nov 07, 2022 1459 -
Snyk Week of Impact 2023: A week of meaningful contributions and community engagement Bianca Matei Nov 08, 2023 567 -
SnykLaunch recap: Custom Base Image Recommendations Jamie Smith Apr 04, 2023 1133 -
Demystifying the AWS shared security responsibility model David Lugo Nov 13, 2023 1004 -
Mitigating path traversal vulns in Java with Snyk Code Brian Vermeer Mar 06, 2023 1044 2
How to integrate ASPM with your application security program Vandana Verma Sehgal Nov 28, 2023 1258 -
Top considerations for addressing risks in the OWASP Top 10 for LLMs Simon Maple Sep 07, 2023 3135 -
Building an application security battle plan: Home Alone edition Brian Clark Dec 20, 2022 898 -
Swift deserialization security primer Sam Sanoop Jul 18, 2023 1155 -
Implementing TLS in Kubernetes Rubaiat Hossain Jul 31, 2023 2063 -
Ruby email rule removed from Snyk Code Frank Fischer Oct 13, 2022 594 -
Cloud security updates you need to know from re:Invent 2022 Ashish Rajan Dec 21, 2022 2303 -
How to secure a REST API? Liran Tal Jun 27, 2024 2768 -
Implementing TLS/SSL in Python Kingsley Ubah Oct 16, 2022 1489 -
2022 Container Security Trends Report: Exploring ownership, education, expertise, and more Megan Moore Apr 27, 2022 737 -
Getting started with query parameterization Mary Gathoni Oct 24, 2023 2337 -
Fetch the Flag CTF 2022 writeup: Not So Smart Fridge Antonio Gomes Nov 10, 2022 1026 -
How Atlassian used Snyk to solve Log4Shell Sarah Conway Nov 16, 2022 813 -
10 best practices to containerize Node.js web applications with Docker Liran Tal, Yoni Goldberg Sep 15, 2022 6338 -
Finding and fixing insecure direct object references in Python Keshav Malik Jul 19, 2023 1509 -
Preventing SQL injection in C# with Entity Framework Brian Vermeer Jul 30, 2024 1273 -
Snyk and StackHawk form strategic alliance to equip app teams with modern, developer-first security testing David Lugo May 02, 2022 716 -
Securing the web (forward) Daniel Appelquist Mar 27, 2023 1233 -
Lessons learned from the Argo CD zero-day vulnerability (CVE-2022-24348) Eric Smalling Feb 10, 2022 1375 -
Securing cloud infrastructure for PCI review DeveloperSteve Coochin Mar 03, 2022 2080 -
Snyk AppRisk Pro: A holistic approach to application risk management Daniel Berman May 01, 2024 1597 -
Securing container applications using the Snyk CLI Hadar Mutai Aug 30, 2022 489 -
Secure AI tool adoption: Perceptions and realities Alex Salkever Jun 04, 2024 733 -
Mental Health Awareness Month: How losing my father changed me Tim Leroy May 31, 2022 957 -
Building Vue 3 components with Tailwind CSS Mary Gathoni Feb 21, 2023 2017 -
Automatic source locations with Rego Jasper Van der Jeugt Feb 12, 2024 2614 -
New year ushers in new wave of Snyk Technology Alliance Partner Program members Sarah Conway Jan 12, 2023 444 -
Allyship and advocacy: Celebrating Disability Pride Month at Snyk Alex Fallon Jul 27, 2022 1764 -
4 AI coding risks and how to address them Liqian Lim (林利蒨) Jun 13, 2024 1200 -
Announcing the Snyk Business trial: Security across the SDLC Mariah Gresham Feb 15, 2022 612 -
Why “vulnerability management” falls short in modern application security Daniel Berman Jun 13, 2024 988 -
Leaky Vessels deep dive: Escaping from Docker one syscall at a time Rory McNamara Feb 06, 2024 10279 4
Critical WebP 0-day security CVE-2023-4863 impacts wider software ecosystem Brian Clark, Eric Smalling, Jonathan Moses Sep 28, 2023 1825 -
OSPO security evolution: The Kübler-Ross Model of open source Dan Appelquist Jan 12, 2023 783 -
Snyk integrates with Amazon EventBridge to enable secure AppDev at scale David Lugo Jun 12, 2023 735 -
Proxy authentication in Snyk CLI for Windows Steve Winton Oct 06, 2022 297 -
Snyk Fetch the Flag CTF 2023 writeup: Silent Cartographer John Hammond Nov 30, 2023 362 -
Application vulnerability management best practices Mariah Gresham Aug 06, 2024 1240 -
Snyk recognized as an Emerging Segment Leader in Application Security in Snowflake's Next Generation of Cybersecurity Applications report LaToya Muff Dec 11, 2023 658 -
Gitpod remote code execution 0-day vulnerability via WebSockets Elliot Ward Feb 27, 2023 2121 1
A day in the life of an ethical hacker Sonya Moisset Jun 05, 2023 2679 -
How to prevent open redirect vulnerabilities in Laravel Kevin Kimani Dec 27, 2023 1696 -
Bringing cloud native application security full circle Erin Cullen Jun 08, 2022 845 -
Find and fix HTTP/2 rapid reset zero-day vulnerability CVE-2023-44487 Jamie Smith, Kriti Dogra, Anthony Larkin Oct 11, 2023 1225 -
Six takeaways from our ASPM masterclass series Erin Cullen Apr 10, 2024 1110 -
Snyk increases investment in partners with new Snyk Technology Alliance Partner Program Cara Sampson Apr 27, 2022 1502 -
3 tips for effective developer security training Mariah Gresham Dec 01, 2022 1127 -
Snyk transformed cloud security in 2022 with developer-first solution Lauren Place Jan 11, 2023 1211 -
Snyk Fetch the Flag CTF 2023 writeup: Off the SETUID Carlos Polop Nov 30, 2023 1710 -
Three expert tips for cultivating secure software development practices Simon Maple Mar 01, 2023 896 -
Spring4Shell: The zero-day RCE in the Spring Framework explained Brian Vermeer Apr 01, 2022 927 -
Node.js multithreading with worker threads: pros and cons James Walker Feb 27, 2023 2120 2
Announcing Snyk’s new Global Service Provider program Cyndi Doyle Feb 23, 2022 696 -
Code injection in Python: examples and prevention Lucien Chemaly Dec 06, 2023 1807 -
Improving GraphQL security with static analysis and Snyk Code Sam Sanoop Apr 12, 2022 1528 -
SnykHer celebrates International Women’s Day 2022 Jess Katz Mar 07, 2022 697 -
Visibly invisible malicious Node.js packages: When configuration niche meets invisible characters Aviad Hahami Feb 28, 2022 1240 -
PulseMeter Report: Software supply chains Erin Cullen Mar 21, 2023 708 -
4 best practices for cultivating developer security adoption Erin Cullen Apr 20, 2023 897 -
Applying the principle of least privilege to Kubernetes using RBAC Jekayin-Oluwa Olabemiwo Aug 29, 2022 1734 -
Cloud Security Podcast awarded SANS Podcast of the Year Jeff Yoshimura Dec 19, 2022 830 -
A stepping stone towards holistic application risk and compliance management of the Digital Operational Resiliency Act (DORA) Ben Desjardins Jul 11, 2024 1834 -
Top 5 VS Code extensions for security Brian Clark Aug 24, 2023 1654 -
Celebrating Juneteenth at Snyk Sherica Bryan Jun 16, 2023 858 -
Vulnerabilities in NodeJS C/C++ add-on extensions Alessio Della Libera Aug 14, 2024 2808 -
Code injection vulnerabilities (CVSSv3 5.8) found in Snyk CLI and IDE plugins Carm Janneteau Nov 30, 2022 585 -
5 "no experience needed" tips for building secure applications Liran Tal Dec 27, 2022 997 -
How to install Ruby in a macOS for local development Liran Tal Sep 27, 2022 1579 -
Fix cloud security issues faster and at the source with Snyk IaC Anthony Larkin Apr 04, 2023 632 -
Improving the UI/UX of the Snyk VS Code extension Andy Gongea Nov 21, 2023 702 -
Best practices for Kubernetes Secrets management Eric Kahuha Nov 16, 2022 1777 -
Snyk Learn now aligns with the NIST NICE Workforce Framework Michael Biocchi Jun 07, 2023 471 -
Common SAML vulnerabilities and how to remediate them Sam Sanoop Dec 19, 2023 966 -
The Secure Developer: Security champions recap Sam Hepburn Jun 14, 2023 1365 -
How community participation can enhance your development career Randall Degges Nov 15, 2022 1117 -
Introducing the new Snyk UI Steve Winton Sep 29, 2022 383 -
What can you do with an enriched SBOM? A parlay quickstart guide Gareth Rushgrove Jun 07, 2023 1077 -
Snyk named a Leader in 2023 Gartner® Magic Quadrant™ for Application Security Testing Manoj Nair May 23, 2023 949 -
An unintimidating introduction to the dark arts of C/C++ vulnerabilities Aviad Hahami Apr 15, 2022 1513 -
Preventing server-side request forgery in Node.js applications David Ekete Feb 20, 2024 1759 -
Symmetric vs. asymmetric encryption: Practical Python examples Josh Amata May 15, 2024 4010 -
Improving code quality with linting in Python Keshav Malik Oct 12, 2022 1767 2
Keeping Docker secrets secure (even if you’re not using Kubernetes) Marcelo Oliveira Aug 24, 2022 1484 -
dompdf security alert: RCE vulnerability found in popular PHP PDF library DeveloperSteve Coochin Mar 18, 2022 1185 -
5 best practices for React with TypeScript security Marcelo Oliveira Dec 08, 2022 1755 -
Snyk named a 2023 Gartner Peer Insights™ Customers’ Choice for Application Security Testing Ciana Abdollahian Dec 04, 2023 622 -
How to use GitHub Actions environment variables Lewis Gavin Nov 22, 2022 1877 -
Preventing broken access control in express Node.js applications Ben Smitthimedhin May 22, 2024 2923 -
The SecurityManager is getting removed in Java: What that means for you Mdu Sibisi Jun 15, 2023 2238 -
Welcoming Karyn Smith: Snyk’s new Chief Legal Officer Peter McKay Feb 07, 2022 539 -
Building an npm package compatible with ESM and CJS in 2024 Liran Tal Apr 18, 2024 1082 -
Investing in our planet: One tree planted for each new Snyker Tori Hay Lindahl Apr 22, 2022 444 -
Extend the power of your AppSec data with the new Snyk and Snowflake integration Guy Plotnik Aug 06, 2024 1095 -
Meet (and join) our newest Snyk Ambassadors – Fall 2022 edition! Gerald Crescione Sep 19, 2022 861 -
Vulnerability disclosure: Which comes first, the security bug in PHP or the CVE? Liran Tal Dec 19, 2023 841 -
Snyk sponsors Snowflake Summit LaToya Muff Jun 04, 2024 569 -
An investigation into code injection vulnerabilities caused by generative AI Jack Hair Apr 16, 2024 983 -
Lessons from OpenSSL vulnerabilities part 1: Preparing your supply chain for the next critical vulnerability Jamie Smith Apr 19, 2023 1133 -
Manage security issues in Jira with Snyk Security in Jira Cloud LaToya Muff Aug 09, 2023 330 -
Lessons from OpenSSL vulnerabilities part 2: Finding and fixing supply chain vulnerabilities Jamie Smith Apr 26, 2023 1977 -
5 tips to supercharge app security from code to cloud Sonya Moisset Aug 08, 2023 2759 -
The dangers of setattr: Avoiding Mass Assignment vulnerabilities in Python Jack Hair Feb 15, 2023 1334 -
Understanding DNS attacks: Identifying and patching vulnerabilities Nihad Hassan Oct 26, 2022 2002 -
Build a software bill of materials (SBOM) for open source supply chain security Liran Tal Mar 14, 2022 2599 -
Enterprise security: Digital transformation and risk management with Anheuser-Busch Inbev and Manulife Brian Piper Feb 03, 2022 875 -
Buildkit mount cache race: Build-time race condition container breakout (CVE-2024-23651) Rory McNamara Jan 31, 2024 1022 -
AWS re:Inforce 2022 recap Shilpi Bhattacharjee Aug 08, 2022 2487 -
Snyk and Bitbucket best practices cheat sheet Marco Morales Mar 03, 2022 915 -
XS leaks: What they are and how to avoid them Gino Diño Jul 17, 2023 2287 1
SAS and Snyk discuss the future of AI for development and security teams Brian Piper Oct 09, 2023 848 -
Snyk Open Source adds C/C++ security scanning for unmanaged dependencies Michal Brutvan Apr 05, 2022 768 -
How Onna Technologies uses Snyk & Sysdig to secure the SDLC while saving time and money Brian Piper Sep 12, 2022 1297 -
Suspicious Maintainer Unveils Threads of npm Supply Chain Attack Liran Tal Jul 16, 2024 1524 -
Cloud security fundamentals part 1: Know your environment Drew Wright Oct 07, 2022 1098 -
New Year's security resolutions for 2024 from Snyk DevRel, SecRel, and friends Micah Silverman Jan 18, 2024 1188 -
Buildkit build-time container teardown arbitrary delete (CVE-2024-23652) Rory McNamara Jan 31, 2024 879 -
What you should know about PHP code security Liran Tal Sep 04, 2024 1773 -
Secure your software supply chain with the new Snyk Vulnerability Intelligence for SBOM ServiceNow integration Sarah Conway Nov 07, 2023 531 -
Snyk documentation: Our journey so far David Bailey Feb 29, 2024 978 -
Snyk and ServiceNow collaborate on new SBOM solution Sarah Conway May 16, 2023 470 -
Celebrating Father’s Day at Snyk Snyk Team Jun 17, 2022 93 -
CTF secrets revealed: TopLang challenge from SnykCon 2021 explained Michael Aquilina Jan 06, 2022 2987 -
Agent hijacking: The true impact of prompt injection attacks Elliot Ward, Rory McNamara, Mateo Rojas-Carulla, Sam Watts, Eric Allen Aug 28, 2024 2758 -
Mimic your mental model with Project Collections Waleed Arshad Jun 27, 2023 745 -
Rego 103: Types of values and rules Jasper Van der Jeugt, Becki Lee Nov 16, 2023 3425 -
Introducing new Snyk AppRisk integrations: Enhancing application risk management with development context Daniel Berman Aug 01, 2024 890 -
A developer-centric approach to software Mariah Gresham Feb 18, 2022 1108 -
Understanding Kubernetes Pod Security Standards Gino Diño Jun 20, 2023 1389 -
Avoiding mass assignment vulnerabilities in Node.js Benson Kuria Macharia Mar 28, 2023 2321 -
Snyk Fetch the Flag CTF 2023 writeup: Honey Baked Messages John Hammond Nov 30, 2023 298 -
Snyk is now also hosted in the EU providing regional data residency Daniel Berman Jun 28, 2022 633 -
Essential Node.js backend examples for developers in 2024 Liran Tal Jun 12, 2024 2643 -
Celebrating Asian American and Pacific Islander Heritage Month Snyk Team May 27, 2022 1141 -
A developer’s best friend: Lessons learned from our canine companions about AI code security Krysta Williams-Timm Aug 26, 2024 803 -
10 React security best practices Liran Tal Jul 18, 2022 1130 2
Preventing XSS in Django Liran Tal Mar 13, 2023 1932 -
Snyk Code now secures AI builds with support for LLM sources Liqian Lim (林利蒨), Ranko Cupovic Jun 25, 2024 571 -
Spring4Shell extends to Glassfish and Payara: same vulnerability, new exploit Brian Vermeer Apr 08, 2022 1015 -
Announcing Insights: Helping you focus on top risks for your organization Daniel Berman Jun 07, 2023 1737 -
Priorities from the OpenSSF Secure Open Source Software Summit 2023 Dan Appelquist Oct 04, 2023 381 -
Under the C: A glance at C/C++ vulnerabilities in Python land Aviad Hahami Apr 28, 2022 1289 -
How open source C++ code can introduce security risks Snyk Security Research Team Aug 22, 2022 1353 -
Introducing the Snyk Partner Solutions Directory for discovering Snyk technology integrations Cara Sampson Apr 03, 2023 996 -
Snyk’s Evolution: A Message From CEO Peter McKay Peter McKay Apr 13, 2023 549 -
How to install Java on macOS Liran Tal Apr 17, 2024 2820 -
CISO playbook: 3 things to consider when establishing a security culture Simon Maple Mar 09, 2023 1249 -
GitHub Copilot code security: XSS in React Liran Tal Oct 19, 2023 2044 -
Setting up SSL/TLS for Kubernetes Ingress Peter De Tender Nov 17, 2022 2245 -
Security success in the Bay Area with Slack Mariah Gresham May 17, 2023 878 -
Snyk expands in Asia-Pacific (APAC) with new datacenter in Sydney, Australia Daniel Berman Nov 30, 2022 715 -
How to setup Deno Dev Container on GitHub Codespaces? Liran Tal Jul 18, 2024 2097 -
Welcoming Kathleen Murphy and Zach Nelson to the Snyk Board of Directors Peter McKay Jan 24, 2022 448 -
Magento security requires additional patch to fix sanitization vulnerability DeveloperSteve Coochin Feb 24, 2022 711 -
Modernizing SAST rules maintenance to catch vulnerabilities faster Frank Fischer Apr 19, 2022 928 -
Command injection in Python: examples and prevention Rubaiat Hossain Dec 21, 2023 2558 -
Meet (and join) our newest Snyk Ambassadors! Waleed Arshad Mar 28, 2022 1783 -
Best practices for managing Java dependencies Brian Vermeer Aug 26, 2022 1826 5
How to avoid web cache poisoning attacks Najia Gul Sep 11, 2023 2155 -
How to secure Python Flask applications Gourav Singh Bais May 21, 2024 4209 -
Fetch the Flag CTF 2023 sneak peek Danielle Bradford Sep 06, 2023 187 -
A DevSecOps solution for your apps on AWS from Snyk David Lugo Nov 28, 2023 900 -
Ignoring vulnerabilities with Snyk Daniel Berman May 03, 2022 1845 -
Implementing TLS in Java Himanish Munjal Nov 09, 2022 2166 -
Best practices for containerizing Go applications with Docker Jekayin-Oluwa Olabemiwo Mar 23, 2022 2117 -
Snyk named as a top cybersecurity company in inaugural Fortune Cyber 60 2023 list Snyk Team Dec 18, 2023 337 -
New years resolution: Don’t show my security tokens when hacking my demo application on stage Brian Vermeer Jan 12, 2022 721 -
Snyk finds PyPi malware that steals Discord and Roblox credential and payment info Raul Onitza-Klugman Aug 16, 2022 1689 -
A definitive guide to Ruby gems dependency management Liran Tal Aug 05, 2022 2618 1
Security vs. Development: A game of priorities Andrew MacKenzie Nov 06, 2023 1009 -
Identifying Insecure C Code with Valgrind and Fixing with Snyk Code Liran Tal Sep 24, 2024 1373 -
Meet the new host for The Secure Developer podcast Mariah Gresham May 09, 2024 469 -
How to mitigate security issues in GenAI code and LLM integrations Liran Tal Sep 11, 2024 2394 -
Announcing new Snyk AppRisk integration with Orca Security Daniel Berman Sep 11, 2024 809 -
Want to avoid a data breach? Employ secrets detection Liran Tal Sep 16, 2024 2539 -
Promise queues and batching concurrent tasks in Deno Liran Tal Sep 25, 2024 3378 -
AWS re:Invent 2022: How Neiman Marcus transitioned to developer-first security Megan Moore Dec 12, 2022 1231 -
5 reasons why developers at FinServ institutions are outpacing their security teammates Katie DeMatteis Sep 09, 2024 822 -
Dive into AI and LLM learning with the new Snyk Learn learning path Michael Biocchi Sep 18, 2024 310 -
Welcoming Gary Olson: Snyk’s new Chief Revenue Officer Peter McKay Mar 04, 2024 444 -
How SAS secures their AI-generated code Gerald Crescione Apr 15, 2024 1874 -
The journey to AppSec gold: Lessons we can learn from the Olympians Krysta Williams-Timm Aug 15, 2024 714 -
Tools for infrastructure drift detection William Beuil Mar 15, 2022 2480 -
3 best practices to make the most of Snyk AppRisk Essentials Daniel Berman Sep 19, 2024 1801 -
10 best practices to build a Java container with Docker Brian Vermeer Aug 24, 2022 4147 -
Infosec Europe session: 4 tips for safer AI adoption Gerald Crescione Aug 01, 2024 1103 -
How to prevent log injection vulnerability in JavaScript and Node.js applications Liran Tal Sep 26, 2024 1504 -
Securing a DevOps pipeline with Snyk, Bitbucket, and AWS Marco Morales Jan 04, 2022 456 -
SurveyMonkey talks with Snyk about developer security during hypergrowth Megan Moore May 05, 2022 1381 -
Meet Snyk for Government: Our developer security solution with FedRAMP ATO Danny Allan Sep 17, 2024 502 -
Zero-day RCE vulnerability found in CUPS - Common UNIX Printing System Jim Armstrong Sep 27, 2024 1224 -
Going beyond reachability to prioritize what matters most Jamie Smith Oct 01, 2024 1149 -
Proactive AppSec continuous vulnerability management for developers and security teams Liran Tal Oct 02, 2024 1804 -
Snyk named a 2024 Gartner Peer Insights™ Customers’ Choice for Application Security Testing for the 3rd consecutive year Nina McClure Oct 02, 2024 723 -
The mysterious supply chain concern of string-width-cjs npm package Liran Tal Oct 03, 2024 1455 -
SnykLaunch Oct 2024: Enhanced PR experience, extended visibility, AI-powered security, holistic risk management Anthony Larkin Oct 08, 2024 1489 -
A look into your engineering interview at Snyk Philip Beevers Oct 09, 2024 750 -
Foundations of trust: Securing the future of AI-generated code Danny Allan Oct 10, 2024 888 -
Analyze Taint Analysis Faster with Improved Contextual Dataflow in Snyk Code Liran Tal Oct 10, 2024 875 -
Automatically fix code vulnerabilities with AI Micah Silverman Oct 14, 2024 1132 -
How Snyk is prioritizing developer experience Anthony Larkin Oct 16, 2024 860 -
Snyk announces commitment to Service for America, bringing security education access to all Michael Biocchi Oct 17, 2024 394 -
Ensuring comprehensive security testing in DevOps pipelines Jim Armstrong Oct 17, 2024 1317 -
Introducing: Extensive AppSec visibility with Snyk Analytics Nastasha Casale Oct 17, 2024 952 -
Elevating Views of Risk: Holistic Application Risk Management with Snyk Daniel Berman Oct 22, 2024 1601 -
Women - Kickstart your Application Security Career! Vandana Verma Sehgal Oct 22, 2024 1020 -
Find, auto-fix, and prioritize intelligently, with Snyk's AI-powered code security tools Liqian Lim (林利蒨) Oct 24, 2024 2083 -
Vulnerability-Free C and C++ Development in Automotive Manufacturing and Software Defined Vehicles (SDV) Liran Tal Oct 23, 2024 1469 -
Best Practices for Continuous Vulnerability Management Liran Tal Oct 29, 2024 1698 -
Top 5 SAST Auto-fixing Tools and How They Compare Liqian Lim (林利蒨) Oct 29, 2024 966 -
Lottie Player npm package compromised for crypto wallet theft Liran Tal Oct 31, 2024 825 2
If you don’t know about HTTP Archive’s Web Almanac yet, you should! Brian Clark Nov 01, 2024 710 -
Snyk Recharge days: Making time to take time Adriana Bokel Herde May 17, 2023 710 -
GitFlops: The Dangers of Terraform Automation Platforms Elliot Ward Nov 07, 2024 1831 -
Extending Developer Security with Dev-First Dynamic Testing Manoj Nair Nov 12, 2024 1565 -
How ASPM boosts visibility to manage application risk Daniel Berman Nov 12, 2024 1144 -
5 Disaster Recovery Testing Methodologies Liran Tal Sep 23, 2022 610 -
Understanding command injection vulnerabilities in Go Liran Tal Nov 14, 2024 1891 1
5 Best Practices for Container security Liran Tal Jul 19, 2022 985 -
Snyk named a Customer Favorite in The Forrester Wave™: Software Composition Analysis Software, Q4 2024 Report Peter McKay Nov 13, 2024 460 -
Phony PyPi package imitates known developer Elliot Ward Oct 05, 2022 1031 2
An Introduction to capture the flag Sonya Moisset Sep 13, 2023 828 -
6 Kubernetes Tools That Can Help Secure Containers at Runtime Liran Tal Jun 08, 2022 481 -
Women in security: Inspiring leaders of today and tomorrow Jonaki Egenolf Nov 19, 2024 433 -
How to prioritize vulnerabilities based on risk Daniel Berman Nov 19, 2024 1153 -
A commitment to future generations: Snyk’s 2024 Student Edition Capture The Flag Recap Michael Biocchi Nov 21, 2024 332 -
Why a solid DevOps foundation is vital for effective DevSecOps Ben Desjardins Nov 27, 2024 1117 -
Measuring AppSec success: Key KPIs that demonstrate value Daniel Berman Nov 26, 2024 1479 -
Seven steps to close coverage gaps with ASPM Daniel Berman Dec 03, 2024 1023 -
2024 Open Source Security Report: Slowing Progress and New Challenges for DevSecOps Jamie Smith Dec 03, 2024 973 -
Empowering women in security: The impact of mentorship Erin Cullen Nov 27, 2024 696 -
Snyk-generated SBOMs now include license details for the open source libraries in your projects Jamie Smith Dec 09, 2024 906 -
How to mitigate SSRF vulnerabilities in Go Liran Tal Dec 10, 2024 910 -
Snyk’s risk-based approach to prioritization Daniel Berman Dec 11, 2024 1082 -
Ultralytics AI Pwn Request Supply Chain Attack Stephen Thoemmes Dec 11, 2024 1375 -
10 SDLC best practices to implement today Jamie Smith Jan 14, 2022 1304 -
Microservices security: 6 best practice tips Jamie Smith Feb 10, 2022 1226 -
Vulnerability vs Weakness: Understanding Key Differences in AppSec Daniel Berman Nov 17, 2023 1934 -
7 Best practices for disaster recovery testing Liran Tal Sep 23, 2022 805 -
Ethical Hacking: Top Tools Vandana Verma Sehgal Jun 01, 2023 1601 -
Top 8 AWS Security Best Practices Liran Tal Oct 18, 2022 1835 -
Hiring a virtual CISO to help your security team Manoj Nair Mar 09, 2022 1019 -
The 4 best DevSecOps tools for a secure DevOps workflow Liran Tal Jan 23, 2024 1583 -
Essential AI Tools to Boost Developer Productivity and Security Liqian Lim (林利蒨) Mar 01, 2024 1385 -
4 Advantages of using AI code review Rory McNamara Nov 29, 2023 1152 -
Python Code Review Tools Liran Tal Aug 12, 2022 1276 -
Unlocking the power of multi-cloud security Vandana Verma Sehgal Apr 25, 2023 1147 -
Supply Chain Security Risks & Best Practice Liran Tal Apr 04, 2023 1102 -
Getting started at a new organization Manoj Nair Jan 27, 2022 791 -
OWASP API Security Top 10 Risks Liran Tal Sep 23, 2022 1816 -
8 proven code review best practices for developers Liran Tal Jan 14, 2022 1316 -
How to implement DevSecOps in 4 steps Jamie Smith Jun 22, 2023 1316 -
Software Supply Chain Security Tools: Types, Features & Considerations Jamie Smith Aug 02, 2023 1306 -
C++ in the wild: Which industries use C++? Liran Tal Apr 29, 2022 1070 -
Developer-first supply chain security Jamie Smith Sep 19, 2023 1330 -
Top 5 Docker Security Vulnerabilities Liran Tal Oct 31, 2022 1036 -
Asset-first application security: What is it and how can it help Daniel Berman Nov 03, 2023 1156 -
The Importance of Container Monitoring Jamie Smith Mar 02, 2022 1013 -
Cloud security challenges Rory McNamara May 19, 2022 2423 -
Defense in Depth Daniel Berman Feb 29, 2024 1430 -
Top AWS Security Risks & Prevention Rory McNamara Mar 02, 2023 1256 -
Top 8 DevSecOps Best Practices - Build Securely Liran Tal Sep 26, 2022 1074 -
Secrets Management: Tools & Best Practice Jamie Smith Jun 26, 2023 1318 -
Product Security vs. Application Security: What’s the Difference? Rory McNamara Jul 21, 2023 1390 -
6 tips for managing your open source components Liran Tal Apr 26, 2022 1364 -
4 Enterprise-level security best practices Manoj Nair Jul 20, 2023 617 -
7 best Java code review tools for developers Liran Tal Jan 14, 2022 1375 -
AppSec Maturity Models Rory McNamara Mar 08, 2024 1120 -
Cybersecurity Hygiene 101 Liran Tal Mar 02, 2023 1594 -
High profile AWS breaches & how to avoid them Jamie Smith Jun 07, 2023 1197 -
API Security Guide Liran Tal Apr 25, 2023 1338 -
Did you make the *security* naughty or nice list this year? Mariah Gresham Dec 18, 2024 590 -
4 tips for securing GenAI-assisted development Sarah Conway Dec 18, 2024 859 -
New year, new security goals: Improve your AppSec in 2025 Mariah Gresham Jan 01, 2025 729 -
Securing the Digital Future: AppSec Best Practices in Digital Banking Hiroko Nakano Jan 06, 2025 587 -
Securing GenAI Development with Snyk Liqian Lim (林利蒨) Jan 09, 2025 697 -
Snyk Recognized as Trusted Partner and Innovator by JPMorganChase Ken Mellert Jan 14, 2025 294 -
BFI’s Journey in Digital Transformation: A Fireside Chat on Elevating Application Security and Developer Experience Hiroko Nakano Jan 15, 2025 506 -
Snyk Security Labs Testing Update: Cursor.com AI Code Editor Danny Allan Jan 14, 2025 688 6
Understanding the EU’s Cyber Resilience Act (CRA) Ben Desjardins Jan 22, 2025 1105 -
Sneak Peek into Fetch the Flag CTF 2025 Gina Fitzpatrick Jan 21, 2025 293 -
Reviving DevSecOps: How Snyk’s new framework builds trust and collaboration Ben Desjardins Jan 23, 2025 793 -
Introducing Snyk Accelerate powered by Accenture Taylor Buie Jan 28, 2025 1079 -
Consolidate Security Findings with Snyk and Google Security Command Center Daniel Berman Feb 06, 2025 701 -
Do not pass GO - Malicious Package Alert Vandana Verma Sehgal Feb 12, 2025 477 -
The First Round of Changes to Match Snyk's Design Language Snyk Team Jan 23, 2025 703 -
Can Snyk Find Weak Cryptographic Algorithms? Bye Bye MD5 Liran Tal Feb 25, 2025 582 -
Celebrating Black History Month 2025 at Snyk Snyk Team Feb 26, 2025 708 -
Snyk’s Fetch the Flag CTF is More Than Just a CTF John Hammond Feb 20, 2025 784 -
Incorporating security by design: Managing risk in DevSecOps Ben Desjardins Feb 25, 2025 844 -
Does Claude 3.7 Sonnet Generate Insecure Code? Stephen Thoemmes Feb 26, 2025 571 -
Solving Security Challenges with Snyk Code and Symbolic AI Liran Tal Feb 27, 2025 916 -
Leveraging Generative AI with DevSecOps for Enhanced Security Stephen Thoemmes Feb 27, 2025 1059 -
ChatGPT and Secure Coding: Benefits and Security Vulnerabilities of ChatGPT-Generated Code Stephen Thoemmes Mar 04, 2025 907 -
Can Snyk Detect JWT Security Issues? Liran Tal Mar 04, 2025 1201 -
The rising trend of malicious packages in open source ecosystems Idan Digmi Mar 23, 2023 1000 -
Learn about API security risks with the new Snyk Learn Learning Path Michael Biocchi Mar 06, 2025 319 -
Fetch the Flag CTF 2025 Community Writeups Gina Fitzpatrick Mar 05, 2025 240 -
Introducing Snyk Accelerate with Accenture Taylor Buie Jan 28, 2025 880 -
6 Software Composition Analysis (SCA) best practices Liran Tal Apr 27, 2022 1010 -
AI Code Generation: Code Security & Quality, Benefits, Risks & Top Tools Stephen Thoemmes Mar 11, 2025 1122 -
Snyk and ServiceNow: Streamlining Vulnerability Management with ServiceNow VR Assignment Rules Sarah Conway Mar 12, 2025 556 -
DevSecOps Automation Framework Ben Desjardins Mar 11, 2025 795 -
Snyk Helps Secure the Golang Bento Project Phill Garrett Mar 12, 2025 401 -
AI Risk Management: Benefits, Challenges, and Best Practices Stephen Thoemmes Mar 13, 2025 968 -
Responding and remediating: Best practices for handling security alerts Ben Desjardins Mar 13, 2025 874 -
Building a Culture of Secure Coding: Empowering Developers to Build Resilient Software Akanchha Shrivastava Mar 18, 2025 1499 -
Unburdening Developers From Vulnerability Fatigue with Snyk Delta Findings Liran Tal Mar 18, 2025 1337 -
Reconstructing the TJ Actions Changed Files GitHub Actions Compromise Micah Silverman Mar 17, 2025 2139 -
Overcoming AppSec Challenges in FinServ: How CIBC Balances Speed, Security, and Compliance Snyk Team Mar 20, 2025 523 -
CVE-2025-29927 Authorization Bypass in Next.js Middleware Liran Tal Mar 23, 2025 681 -
What is a Data Poisoning Attack? Stephen Thoemmes Mar 25, 2025 852 -
Governance in DevSecOps: Measuring and Improving Security Outcomes Ben Desjardins Mar 27, 2025 1053 -
Get Off My Lawn and Fix Your Vulnerabilities! Randall Degges Apr 01, 2025 816 -
Q&A Session with Snyk & John Hammond: Your Fetch the Flag Questions, Answered Gina Fitzpatrick Apr 01, 2025 733 -
Snyk Security Solution Now Integrated into Google Cloud's Gemini Code Assist Liqian Lim (林利蒨) Apr 09, 2025 1426 -
Snyk’s Statement on the MITRE CVEs Program Funding Update Danny Allan Apr 16, 2025 362 -
Snyk Partners with Nova8 to Empower Secure Development Across Latin America Michael Daniels Apr 15, 2025 735 -
Snyk Ushers in the Future of DAST: AI-Driven Security for the Age of AI-Driven Development Manoj Nair Apr 22, 2025 880 -