633 blog posts published by month since the start of 2022. Start from a different year:

Blog URL
Posts year-to-date
9 (16 posts by this month last year.)
Average posts per month since 2022
13.2

Post details (2022 to today)

Title Author Date Word count HN points
Snyk in 30: Developer-first security democast Jim Armstrong Mar 02, 2023 1538 -
Announcing the 2022 State of Open Source Security report from Snyk and the Linux Foundation Megan Moore Jun 21, 2022 558 -
New OpenSSL critical vulnerability: What you need to know Vandana Verma Sehgal Oct 31, 2022 1282 2
Welcoming Samantha Wessels: Snyk’s New Vice President, EMEA Sales Dino DiMarino Jan 10, 2022 409 -
Modern VS Code extension development: The basics Mdu Sibisi Sep 14, 2023 2775 -
What kind of (security) dog are you? Belyn Lai Aug 25, 2023 756 -
Mitigating DOM clobbering attacks in JavaScript Keshav Malik Aug 07, 2023 1806 -
Improving coverage of cloud resources to reduce infrastructure drift Stephane Jourdan Mar 23, 2022 2878 -
CodeSecDays conference and more complete security coverage with GitGuardian Sarah Conway Aug 10, 2023 989 -
Snyk users don't have to worry about NVD delays Hadas Bloom Mar 13, 2024 734 -
Best practices for creating a modern npm package with security in mind Brian Clark Sep 12, 2022 4985 2
Automate cloud compliance with Snyk IaC Lauren Place Feb 07, 2023 591 -
Discussions on improving security through chaos engineering Mariah Gresham Aug 03, 2023 966 -
How to strengthen security in your CI/CD pipeline James Konik Jul 12, 2023 1800 -
Snyk welcomes Helios, accelerating our ASPM vision with runtime insights Manoj Nair Jan 16, 2024 874 -
Introducing Snyk’s new Risk Score for risk-based prioritization Gur Shafriri, Benji Catabi-Kalman Aug 17, 2023 1514 -
Four easy ways to analyze your Java and Kotlin code Brian Vermeer Aug 13, 2024 1982 -
5 ways to improve security during digital transformation Erin Cullen Apr 10, 2023 1007 -
How to use AI for software development and cybersecurity Simon Maple Aug 30, 2023 1755 -
SnakeYaml 2.0: Solving the unsafe deserialization vulnerability Brian Vermeer Jun 21, 2023 1205 -
Finding YAML Deserialization with Snyk Code Calum Hutton Feb 23, 2023 799 -
Announcing customized role-based access controls for Snyk Daniel Berman Jun 29, 2022 1237 -
Snyk announces new Slack integration Sarah Conway May 30, 2023 610 -
Best practices for using AI in the SDLC Frank Fischer Jul 19, 2023 749 -
DevOpsDays Singapore 2024: Unmasking the security pitfalls in AI-generated code Hiroko Nakano Apr 23, 2024 562 -
Announcing the 2022 State of Cloud Security report from Snyk Megan Moore Sep 13, 2022 757 -
Engineering culture at Snyk: The values that support and drive our teams Sergey Vasilkov May 08, 2023 2259 -
SnykCon recap: Building a developer-focused AppSec program Mariah Gresham Jan 27, 2022 1051 -
"Dirty Pipe" Linux vulnerability and your containerized applications (CVE-2022-0847) Eric Smalling Mar 09, 2022 1180 -
Security lessons with a Snyk Ambassador Andres Haro Oct 11, 2022 941 -
3 tips from Snyk and Dynatrace’s AI security experts Sarah Conway Jan 22, 2024 905 -
Snyk Code, the only security tool chosen by developers in Stack Overflow's 2024 AI Search and Developer Tools survey Liqian Lim (林利蒨) Aug 27, 2024 901 -
Snyk Voices: Returning from maternity leave Tali Wahrhaft May 06, 2022 2557 -
How to prevent NullPointerExceptions in Java Lucien Chemaly Sep 21, 2023 2669 -
The ultimate guide to creating a secure Python package Gourav Singh Bais May 08, 2024 3482 -
Why you need a security companion for AI-generated code Liqian Lim (林利蒨) Oct 25, 2023 1834 -
Building Docker images in Kubernetes Vitalis Ogbonna May 03, 2022 1557 -
Snyk takes over Boston for SnykWeek Megan Moore May 19, 2022 663 -
Reduce risk to your supply chain with a software bill of materials (SBOM) Ryan Searle Jun 07, 2023 881 -
Cybersecurity Venture’s 2023 Software Supply Chain Attack Report Sydney Milligan Oct 10, 2023 816 -
Maximizing IAM security with AWS permissions boundaries and Snyk Wayne Crissman Jun 26, 2023 1019 -
Fun with ciphers in copycat Wordles Micah Silverman Feb 02, 2022 903 -
Data leak in the Netherlands: What developers should learn from this Brian Vermeer Mar 31, 2023 753 -
Identify vulnerabilities in your container images with Snyk’s enhanced Docker Desktop Extension LaToya Muff Apr 11, 2023 363 -
Learning from cloud transformation as we move to AI David Lugo May 21, 2024 976 -
Enabling policy as code (PaC) with OPA and Rego Eric Smalling Jan 19, 2022 1522 -
How to secure an S3 bucket on AWS? Liran Tal Jul 12, 2024 3393 -
Using Pulumi to automate the Snyk Kubernetes integration for containers Pas Apicella Feb 09, 2022 2064 -
How Axel Springer National Media and Tech achieved continuous security with Snyk Nina McClure Sep 03, 2024 952 -
You should be using HTTP Strict Transport Security (HSTS) headers in your Node.js server Raphael Mun Dec 29, 2022 1729 -
Secure Java URL encoding and decoding Jura Gorohovsky Aug 14, 2023 3090 -
Snyk named a Leader, placed highest in Strategy category in The Forrester Wave: Software Composition Analysis (SCA), Q2 2023 report Manoj Nair Jun 13, 2023 770 -
Nightfall AI and Snyk unite to deliver AI-powered secrets scanning for developers LaToya Muff Nov 29, 2023 547 -
SnykCon recap: Automation for better compliance and faster feedback loops Megan Moore Apr 13, 2022 1189 -
Krampus delivers an end-of-year Struts vulnerability Micah Silverman Jan 02, 2024 1667 -
3 tips for rebuilding a Docker image faster (and save CI seconds!) Liran Tal Dec 28, 2023 2564 -
Does AI lead to AppSec hell or nirvana? Erin Cullen Oct 03, 2023 1040 -
Node.js multithreading with worker threads series: worker_threads tutorial James Walker Oct 25, 2022 2310 -
PHP security in Snyk Code now GA DeveloperSteve Coochin Jan 26, 2022 760 -
Announcing Snyk AppRisk: Elevate your AppSec game with ASPM Daniel Berman Dec 12, 2023 1464 -
3 ways AppSec modernization is a game-changer for financial services Katie DeMatteis Sep 03, 2024 782 -
SnykLaunch April '23: C/C++ expansion, cloud and IaC updates, custom container security, new integrations, and more Jim Armstrong Apr 04, 2023 1462 -
New SEC cybersecurity rules put more onus on the CISO, not so much on directors Myke Lyons Aug 03, 2023 1578 -
Enhancing code to cloud security with the Common Configuration Scoring System Wayne Crissman Dec 14, 2023 998 -
Snyk welcomes Enso: Enabling security leaders to scale their AppSec program with ASPM Manoj Nair Jun 07, 2023 972 -
Leaky Vessels: Docker and runc container breakout vulnerabilities (January 2024) Jamie Smith Jan 31, 2024 1729 41
Introducing Snyk’s partnership with Gemini Code Assist David Lugo Apr 09, 2024 682 -
Snyk is named a Strong Performer as a first-time entrant in the Forrester Wave™: Static Application Security Testing (SAST) Q3 2023 Peter McKay Sep 20, 2023 696 -
Day in the life of a food giant CISO Vandana Verma Sehgal Apr 18, 2024 668 -
Join "The Big Fix" to secure your projects with Snyk and earn cool swag Liran Tal Feb 09, 2022 1029 -
Snyk & Atlassian: How to embed security in AI-assisted software development LaToya Muff Feb 14, 2024 1030 -
Integrating Snyk Code SAST results in your ServiceNow workflows Sarah Conway May 07, 2024 514 -
Three reasons to invest in an ASPM solution in 2024 Julia Kraut Dec 12, 2023 610 -
With Love, Your Applications Krysta Williams-Timm Feb 14, 2024 373 -
Snyk named a 2022 Gartner Peer Insights Customers’ Choice for Application Security Testing Tony Sleva Oct 04, 2022 382 -
Three trends shaping software supply chain security today Erin Cullen Aug 22, 2024 923 -
How to add Playwright tests to your pull request CI with GitHub Actions Liran Tal Oct 14, 2022 2546 -
Using insecure npm package manager defaults to steal your macOS keyboard shortcuts Yagiz Nizipli Jun 28, 2023 1102 -
Protestware is trending in open source: 4 different types and their impact Benji Catabi-Kalman Mar 22, 2022 1185 -
Fetch the Flag CTF 2022 writeup: Roadrunner Giovanni Funchal Nov 10, 2022 1138 -
AI quality: Garbage in, garbage out Michael Biocchi Jun 11, 2024 730 -
How to secure JavaScript applications right from the CLI Gideon Idoko Oct 24, 2023 2412 -
Happy 1st Birthday, Snyk Code! Frank Fischer May 06, 2022 1368 -
10 best practices for securely developing with AI Simon Maple Sep 27, 2023 3204 -
Snyk top 10 code vulnerabilities report Mariah Gresham May 18, 2023 424 1
Analyzing the PwnKit local privilege escalation exploit Kyle Suero Jan 29, 2022 726 -
Setting up the Docker image scan GitHub Action Mohammad-Ali A'râbi May 19, 2023 1076 -
Getting started with PHP static analysis in 2024 Liran Tal Mar 21, 2024 2431 -
Introducing the Snyk App for Compass: A complete view of software component risk LaToya Muff Oct 05, 2023 662 -
How to prevent XPath injection attacks Marcelo Oliveira May 10, 2023 2175 -
Securing your SBOM on Google Cloud David Lugo Mar 28, 2024 983 -
More accurate than GPT-4: How Snyk’s CodeReduce improved the performance of other LLMs Eric Fernandez May 07, 2024 1245 -
These aren’t the npm packages you’re looking for DeveloperSteve Coochin May 04, 2022 1141 -
Snyk’s guide to disclosing pronouns Mariah Gresham, Alex Fallon Jun 09, 2022 774 -
Can AI write secure code? Frank Fischer May 03, 2023 2244 -
Snyk finds 200+ malicious npm packages, including Cobalt Strike dependency confusion attacks Kirill Efimov May 24, 2022 2807 3
Introducing parlay, a tool for enriching SBOMs Gareth Rushgrove Jun 07, 2023 773 -
360 degrees of application security with Snyk Soumen Mukherjee Apr 24, 2024 1273 -
How to keep an HTTP connection alive for 9 hours Micah Silverman Oct 23, 2023 2391 3
Congratulations to Snyk’s 2022 CRN Women of the Channel Carey Stanton May 09, 2022 740 -
How to build a secure API gateway in Node.js Florian Rappl Dec 28, 2022 2647 -
Response to the Enduring Security Framework (ESF) Guide for Developers Gareth Rushgrove Sep 03, 2022 602 -
Creating SBOMs with the Snyk CLI Brian Vermeer Feb 08, 2024 1348 -
Vulnerability: runc process.cwd and leaked fds container breakout (CVE-2024-21626) Rory McNamara Jan 31, 2024 1114 3
Ethical hacking techniques Vandana Verma Sehgal Jun 05, 2023 1713 -
Alert: LaughTilYouCry ransomware sabotages npm package (with puns) Mariah Gresham Apr 01, 2022 529 -
Snykers share wellness tips for mental health awareness month Belyn Lai May 30, 2023 706 -
Snyk Partner Speaks series: True DevSecOps with Snyk and Dynatrace Sarah Conway Jun 08, 2023 177 -
Snyk enhances ServiceNow with comprehensive insights into vulnerabilities in open source software Marco Morales Jan 24, 2023 633 -
The security course missing from higher education Michael Biocchi Jul 12, 2022 955 -
Snyk ranked #20 on 2022 Forbes Cloud 100 list Jeff Yoshimura Aug 09, 2022 341 -
Container images simplified with Ko Eric Smalling Oct 10, 2022 3025 1
Snyk Ranked #19 on 2023 Forbes Cloud 100 List Peter McKay Aug 08, 2023 430 -
Going beyond “shift left” to extend AppSec in all directions Ben Desjardins Jul 09, 2024 968 -
Research with Snyk and Redhunt Labs: Scanning the top 1000 orgs on GitHub Vandana Verma Sehgal Jun 22, 2023 399 -
Snyk Partner Speak Video Series Puts Spotlight on New Integrations Sarah Conway Apr 12, 2023 181 -
How to build a modern DevSecOps culture: Lessons from Jaguar Land Rover and Asda Brian Piper Feb 21, 2024 1209 -
Panel recap: Breaking Bad Security Habits with Corey Quinn Erin Cullen Dec 20, 2022 985 -
Amplifying AAPI Voices to Honor Asian American Pacific Islander Heritage Month Belyn Lai, Yos Pang May 25, 2023 1495 -
NPM security: preventing supply chain attacks Liran Tal Nov 08, 2022 3307 1
Integrating the Snyk Language Server with IntelliJ IDEs Arvyd Paeglit Jun 17, 2024 344 -
Black Hat Asia customer panel recap: How to lead DevSecOps adoption Brian Piper Sep 18, 2023 821 -
Recap: Stress-Free Security for Devs and Ops on AWS David Lugo Apr 03, 2023 1341 -
Polyfill supply chain attack embeds malware in JavaScript CDN assets Liran Tal Jun 26, 2024 1892 -
The npm faker package and the unexpected demise of open source libraries Liran Tal Sep 02, 2022 2339 -
Snyk Fetch the Flag CTF 2023 writeup: Audiopolis John Hammond Nov 30, 2023 278 -
Securing the digital future: Reviewing the Biden-Harris administration's National Cybersecurity Strategy Vandana Verma Sehgal Mar 20, 2023 713 -
A security expert’s view on Gartner’s generative AI insights Liqian Lim (林利蒨) Aug 07, 2024 1729 -
Snyk CLI: Introducing Semantic Versioning and release channels Chintan B. Apr 30, 2024 930 -
Cheat sheet: Meeting security compliance standards Mariah Gresham Sep 15, 2022 784 -
How to make a mock API server in JavaScript David Ekete Oct 20, 2022 2038 1
Call for action: Exploring vulnerabilities in Github Actions Elliot Ward, Rory McNamara, Raul Onitza-Klugman Jun 06, 2024 3977 -
How Snyk can help secure supply chains per Executive Order M-21-30 Vandana Verma Sehgal Sep 29, 2022 1767 1
Session management security: Best practices for protecting user sessions Okoth Pius Jul 11, 2023 2703 1
Data loss prevention for developers Annabel Gauci May 24, 2023 2103 2
Snyk brings infrastructure as code security to HashiCorp Terraform Cloud Marco Morales May 04, 2022 762 -
Top 5 scary AWS misconfigurations Shilpi Bhattacharjee Oct 31, 2022 816 -
Snyk and Atlassian deepen partnership with Snyk security in Jira Software Jill Wilkins Feb 08, 2023 412 -
10 modern Node.js runtime features to start using in 2024 Liran Tal May 29, 2024 5030 2
Snyk and AWS announce native Amazon EKS support directly from the AWS Management Console David Lugo Jun 12, 2024 418 -
5 Node.js security code snippets every backend developer should know Liran Tal Feb 28, 2024 3106 -
Introducing the ASPM Masterclass Erin Cullen Mar 12, 2024 504 -
Dependency injection in Python Lucien Chemaly Oct 31, 2023 2919 -
Snyk Apps now GA: An easy, standardized, and secure framework for building custom integrations Sarah Conway Nov 20, 2023 1108 -
Manage security issues in Jira with Snyk Security in Jira Cloud LaToya Muff Aug 09, 2023 330 -
Securing symmetric encryption algorithms in Java Brian Vermeer Oct 18, 2023 1489 -
Preventing insecure deserialization in Node.js Benson Kuria Macharia Apr 17, 2023 1890 -
Building a security-conscious CI/CD pipeline Peter De Tender Jun 29, 2023 1529 -
Interview with an engineer: Diving into modern SAST Snyk Team May 18, 2022 1355 -
Controlling your server with a reverse shell attack Brian Vermeer Aug 10, 2022 1544 -
Is your team on the *security* naughty or nice list? Mariah Gresham Dec 20, 2023 873 -
Secure your application from Argo CD to Kubernetes JJ Ng Oct 12, 2022 1253 -
How to find and fix XML entity vulnerabilities Michael Sherman Sep 07, 2022 2223 -
How REI built a DevSecOps culture and how Snyk helped Brian Piper Feb 27, 2024 1154 -
Snyk achieves Red Hat Vulnerability Scanner Certification Tomás González Blasini, David Lugo Apr 03, 2023 391 -
Why fuzzing tools should be part of your security toolkit Kuria Macharia Oct 28, 2022 1763 -
How to find and fix Critical WebP zero-day vulnerability CVE-2023-4863 Brian Clark, Eric Smalling, Tim Gowan Oct 05, 2023 1282 -
Weak Hash vulnerability discovered in crypto-js and crypto-es (CVE-2023-46233 & CVE-2023-46133) Jamie Smith Oct 25, 2023 1509 -
2022 Snyk Customer Value Study highlights: The impact of developer-first security Jeff Yoshimura Oct 18, 2022 1061 -
How to update cURL Brian Clark, Eric Smalling Oct 11, 2023 1772 -
AWS top 10 misconfigurations and how to fix them: A cheat sheet Erin Cullen Mar 15, 2023 1546 -
Snyk + International Dog Day: recap Megan Moore Oct 05, 2022 374 -
Handling security vulnerabilities in Spring Boot Brian Vermeer Nov 29, 2023 1451 -
Three considerations for building an effective security program Alex Bovee May 04, 2023 920 -
Top 8 penetration testing tools Benson Kuria Macharia May 25, 2023 1172 -
Snyk Learn and the NIST Cybersecurity Framework (CSF) Michael Biocchi Mar 06, 2024 523 -
Snyk Fetch the Flag CTF 2023 writeup: Protect The Environment John Hammond Nov 30, 2023 243 -
Understanding and mitigating the Jinja2 XSS vulnerability (CVE-2024-22195) Liran Tal Jan 18, 2024 1059 -
Accelerate C/ C++ security with Snyk Marcie Cheung Dec 05, 2023 614 -
Scaling your security team without hiring Drew Wright Nov 02, 2022 984 -
Mastering Python virtual environments: A complete guide to venv, Docker, and securing your code Liran Tal Jan 10, 2024 1589 -
Snyk Fetch the Flag CTF 2023 writeup: I Do Math John Hammond Nov 30, 2023 190 -
8 tips for securing containers from source to runtime Sarah Conway Aug 24, 2022 661 -
How to verify and secure your Mastodon account Liran Tal Dec 05, 2022 946 -
How to protect Node.js apps from CSRF attacks Victor Ikechukwu Oct 17, 2023 3146 -
Snyk integrates with AWS Security Hub to automate security remediation workflows David Lugo Jun 12, 2023 884 -
Command injection vulnerability in Snyk CLI released prior to September 1, 2022 (older than v1.996.0) Gareth Rushgrove Oct 03, 2022 501 -
How to implement SSL/TLS pinning in Node.js Nwani Victory Aug 29, 2023 2298 -
Streamline dependency updates with Mergify and Snyk Liran Tal Aug 23, 2023 1548 -
The Cloud Security Podcast is now powered by Snyk! Ashish Rajan Jul 26, 2022 562 -
5 security best practices for adopting generative AI code assistants like GitHub Copilot Liqian Lim (林利蒨) Mar 05, 2024 1368 -
A denial of service Regex breaks FastAPI security Liran Tal Jul 31, 2024 1878 -
How secure is WebAssembly? 5 security concerns unique to WebAssembly Marcelo Oliveira Jul 28, 2023 1448 2
The Docker project turns 10! Looking back at a decade of containers Eric Smalling Mar 17, 2023 3058 -
Update: OpenSSL high severity vulnerabilities Vandana Verma Sehgal Nov 03, 2022 516 -
Talk to us about Snyk CLI Chintan B., Neil Mackay Jun 06, 2024 859 -
How Mulesoft fosters a developer-first, shift-left culture with Snyk Gerald Crescione Apr 30, 2024 798 -
The art of conditional rendering: Tips and tricks for React and Next.js developers Kumar Harsh Oct 30, 2023 2865 -
Snyk's 2023 State of Open Source Security: Supply chain security, AI, and more Simon Maple Jul 26, 2023 1184 -
Snyk achieves AWS Security Competency David Lugo Nov 15, 2023 514 -
Preventing SQL injection attacks in Node.js Lucien Chemaly Feb 20, 2024 2260 -
Addressing cybersecurity challenges in open source software with the Linux Foundation Mariah Gresham Jul 20, 2022 1033 -
SnykLaunch June ‘23: Insights and DeepCode AI enable faster fixes and prioritization Jim Armstrong Jun 07, 2023 1567 -
Finding and fixing exposed hardcoded secrets in your GitHub project with Snyk Chandler Mayo Jun 25, 2024 902 -
Breaking down the ’critical’ OpenSSL vulnerability Elliot Ward, Raul Onitza-Klugman Nov 04, 2022 1657 -
Does GitOps enhance application security? Vandana Verma Sehgal Aug 21, 2023 1026 -
What are AI hallucinations and why should developers care? Liran Tal Aug 16, 2023 2376 1
Ruby gem installations can expose you to lockfile injection attacks Liran Tal Aug 17, 2022 2317 -
Infrastructure drift and drift detection explained Lauren Place Mar 09, 2022 1362 -
Welcoming Danny Allan and Brian Rogan: Snyk leadership team expands with key appointments to accelerate innovation Peter McKay Feb 06, 2024 492 -
Getting started with React Native security Kingsley Ubah Apr 07, 2022 2306 -
Fetch the Flag CTF 2022 writeup: Logster Sonya Moisset Nov 10, 2022 1063 -
Snyk welcomes Reviewpad: Code, commit, celebrate! Manoj Nair Oct 30, 2023 606 -
Our favorite 2023 Snyk Fetch the Flag CTF writeups from the community Danielle Bradford Nov 21, 2023 183 -
Top 3 security best practices for handling JWTs Liran Tal Dec 18, 2023 2007 -
A quick primer on LDAP injection Eric Kahuha Jun 01, 2023 1379 -
10 GitHub Security Best Practices Brian Vermeer Feb 05, 2024 3532 3
Ruby on Rails Docker for local development environment Mikhail Tereschenko Nov 02, 2022 1770 -
.NET developers alert: Moq NuGET package exfiltrates user emails from git Liran Tal Aug 09, 2023 831 2
Modern VS Code extension development tutorial: Building a secure extension Mdu Sibisi Oct 02, 2023 3917 -
Introducing SUS: Snyk Ultimate Security Megan Moore Apr 01, 2022 592 -
Control your role! Kubernetes RBAC explored James Walker Jul 27, 2023 2123 -
The importance of platform engineers in a security program Elliott Spira Apr 13, 2023 962 -
Snyk Partner Speak Video with ServiceNow: A complete view of application security Sarah Conway May 02, 2023 196 -
Reporting AppSec risk up to your CISO Kate Powers Burke, Ezra Tanzer Feb 13, 2024 1945 -
Securing next-gen development: Lessons from Trust Bank and TASConnect Gerald Crescione Jun 05, 2024 1312 -
Building a secure CI/CD pipeline with GitHub Actions for your Java Application Brian Vermeer Jun 27, 2022 1456 -
Snyk brings developer-first AppSec approach to C/C++ Roy Ram, Neha Shenoy Apr 04, 2023 1094 -
Snyk sponsors Atlassian Team ’22: Bringing developer security to the Atlassian ecosystem Sarah Conway Apr 05, 2022 601 -
The persistent threat: Why major vulnerabilities like Log4Shell and Spring4Shell remain significant Brian Vermeer Aug 29, 2024 1000 -
Writing unit tests in Java Lewis Gavin Nov 18, 2022 1629 -
How to do password hashing in Java applications the right way! Brian Vermeer Mar 24, 2022 1911 -
DevSecOps lifecycle coverage with new Snyk and Dynatrace app Sarah Conway May 15, 2023 507 -
2022 Collaboration Partner of the Year: Snyk Sarah Conway Oct 05, 2022 417 -
How Snyk ensures safe adoption of AI Akanchha Shrivastava Mar 27, 2024 1534 -
Signing container images: Comparing Sigstore, Notary, and Docker Content Trust Hrittik Roy Sep 26, 2023 3098 -
Real-time threat protection with Snyk and SentinelOne Shivam Jindal Nov 09, 2023 679 -
Secure JavaScript URL validation Mannan Tirmizi May 09, 2023 1940 6
Using JLink to create smaller Docker images for your Spring Boot Java application Brian Vermeer Aug 24, 2023 1499 -
Adding Snyk security to Jira and Bitbucket Cloud LaToya Muff Oct 25, 2023 647 -
SDR Series: Meet our APJ team Snyk Team Apr 26, 2022 1350 -
Preventing Cross-Site Scripting (XSS) in Java applications with Snyk Code Brian Vermeer Apr 25, 2023 1523 -
SocketSleuth: Improving security testing for WebSocket applications Elliot Ward Sep 06, 2023 843 -
AI-generated security fixes in Snyk Code now available Jim Armstrong May 09, 2023 823 -
Snyk named to CNBC 2023 Disruptor 50 List Peter McKay May 09, 2023 311 -
Exploring 3 types of directory traversal vulnerabilities in C/C++ Kirill Efimov Apr 04, 2022 2081 -
Navigating the AI-powered development era in financial services Lawrence Crowther Aug 26, 2024 826 -
Fetch the Flag CTF 2022 writeup: Pay Attention Assaf Ben Josef Nov 10, 2022 1058 -
Cloud Security at Blackhat and Defcon 2022 Ashish Rajan Sep 06, 2022 1896 -
Achieving developer security adoption at Nylas with Snyk Erin Cullen Dec 04, 2023 762 -
WillowTree roundtable: security for hypergrowth organizations Mariah Gresham Apr 22, 2022 1051 -
Fetch the Flag CTF 2022 writeup: git-refs Iulia Manda Nov 10, 2022 585 -
Top 5 security concerns for infrastructure as code Raphael Mun Jul 14, 2023 1565 -
8 tips for securing your CI/CD pipeline with Snyk Eric Smalling Jul 20, 2023 3928 -
Timing out synchronous functions with regex Steve Shani Apr 06, 2023 1071 -
How Okta empowers devs to find & fix security issues with Snyk Mariah Gresham Aug 25, 2023 958 -
Make Snyk notifications work for you Michele Wiedemer Apr 06, 2022 550 -
7 tips to become a successful bug bounty hunter Ben Sadeghipour Jan 25, 2024 1246 -
Nine Docker pro tips for Node.js developers Liran Tal Apr 11, 2024 1630 -
Announcing IaC+ early access: Secure your infrastructure configurations across the SDLC Lauren Place Oct 03, 2023 686 -
How to generate an SBOM for JavaScript and Node.js applications Liran Tal May 22, 2023 2795 -
Build and deploy a Node.js security scanning API to Platformatic Cloud Liran Tal Jan 05, 2024 2980 -
Buildkit GRPC SecurityMode privilege check: Build-time container breakout (CVE-2024-23653) Rory McNamara Jan 31, 2024 946 -
What does Biden's Executive Order on AI safety measures mean for businesses? Liqian Lim (林利蒨) Nov 02, 2023 2399 -
Kroger’s approach to supply chain security Brian Piper Jan 02, 2024 888 -
AppSec spring cleaning checklist Mariah Gresham May 13, 2024 783 -
Enhancing PCI compliance security with SAST and SCA DeveloperSteve Coochin Feb 08, 2022 1359 -
Welcoming Diana Brunelle: Snyk’s New Chief People Officer Peter McKay Jul 22, 2024 336 -
Installing and managing Java on macOS Keshav Malik Oct 12, 2023 1464 -
The importance of verifying webhook signatures Marcelo Oliveira Jun 29, 2023 1829 -
Three ways Snyk made software supply chains more secure in 2022 Jamie Smith Jan 12, 2023 1390 -
Improving developer experience with security tools at Pinterest Megan Moore Jul 14, 2022 1165 -
Open source maintainer pulls the plug on npm packages colors and faker, now what? Liran Tal Jan 09, 2022 1160 1
Best practices for container isolation Maryann Agofure Aug 29, 2022 1562 -
Rego 102: Combining queries with AND/OR and custom messages Jasper Van der Jeugt, Becki Lee Nov 09, 2023 2514 -
Best practices for building a production-ready Dockerfile for PHP applications James Walker Aug 22, 2023 2507 -
Azure Bicep security fundamentals Mark Johnson Dec 13, 2022 1143 -
A guide to input validation with Spring Boot Lucien Chemaly Sep 12, 2023 2751 -
Detect infrastructure drift and unmanaged resources with Snyk IaC Stephane Jourdan May 09, 2022 1485 -
What’s new in CVSS 4.0 Paul Lascar Nov 08, 2023 1679 -
GitHub “besieged” by malware repositories and repo confusion: Why you'll be ok Liran Tal Mar 12, 2024 2102 -
Safer together: Snyk and CISPA collaborate for the greater good Idan Digmi Jun 06, 2022 853 -
Snyk Code’s autofixing feature, DeepCode AI Fix, just got better Eric Fernandez, Berkay Berabi Apr 23, 2024 2452 -
How to build a secure WebSocket server in Python Kingsley Ubah Jul 05, 2022 2728 -
How Lunar shifted security left while building a cloud native bank Brian Piper Jan 20, 2022 759 -
How Snyk helps satisfy White House cybersecurity recommendations Vandana Verma Sehgal Mar 23, 2022 1149 -
Generating fake security data with Python and faker-security Michael Aquilina Apr 26, 2022 859 -
Rediscovering argument injection when using VCS tools — git and mercurial Alessio Della Libera Aug 23, 2022 2111 3
Join the Snyk Developer Challenge Brittany Cannon Aug 01, 2022 479 -
5 tips for adopting AI code assistance securely Liqian Lim (林利蒨) May 30, 2024 856 -
Abusing Ubuntu 24.04 features for root privilege escalation Rory McNamara Sep 09, 2024 5975 189
Snyk's AppSec dream team Krysta Williams-Timm Mar 19, 2024 843 -
Limitations of a single AI model Frank Fischer Aug 07, 2023 1401 -
Automate security controls from development to production on Google Cloud David Lugo Jun 18, 2024 1073 -
My internship journey at Snyk Caroline Gow Feb 16, 2023 1329 -
Copilot amplifies insecure codebases by replicating vulnerabilities in your projects Randall Degges Feb 22, 2024 1578 -
Snyk Partner Speak video series with HashiCorp Sarah Conway Oct 04, 2023 180 -
5 ways to secure Drupal 10 Sushnigdha Tripathy Aug 23, 2022 1692 -
A day in the life of a CISO: Chris Hughes of Aquia Vandana Verma Sehgal Nov 04, 2022 851 -
10 Dimensions of Python Static Analysis Liran Tal Jul 17, 2024 4861 -
A security expert’s view on Gartner’s generative AI insights - Part 2 Liqian Lim (林利蒨) Aug 08, 2024 1231 -
High severity vulnerability found in libcurl and curl (CVE-2023-38545) Hadas Bloom Oct 04, 2023 1104 -
Improved risk assessment with EPSS scores in Snyk Daniel Berman May 22, 2023 1297 -
Node.js vs. Deno vs. Bun: JavaScript runtime comparison James Konik Sep 05, 2023 2966 -
Looking back at Black Hat USA 2022 Vandana Verma Sehgal Sep 21, 2022 903 -
Rego 101: Introduction to Rego Becki Lee Nov 02, 2023 2503 -
How LiveRamp used Snyk to remediate Log4Shell Brian Piper May 19, 2022 685 -
Why ASPM is the future of AppSec: Key points from our newest whitepaper Sarah Conway Jun 18, 2024 1177 -
Exploring WebExtension security vulnerabilities in React Developer Tools and Vue.js devtools Calum Hutton Nov 27, 2023 1511 -
Snyk IaC for Terraform Enterprise: Expanding Snyk compatibility with HashiCorp Terraform Sarah Conway Sep 28, 2022 562 -
7 AppSec tips from Snowflake’s Director of Product Security Brian Piper Aug 31, 2023 850 -
Breaking caches and bypassing Istio RBAC with HTTP response header injection Rory McNamara Jun 20, 2024 2498 -
How to choose a security tool for your AI-generated code Liqian Lim (林利蒨) Jan 09, 2024 1774 -
SnykWeek New York: In the cloud Megan Moore Oct 10, 2022 731 -
File encryption in Python: An in-depth exploration of symmetric and asymmetric techniques Keshav Malik Nov 22, 2023 2132 -
How to Dockerize a PHP application securely James Olaogun Aug 02, 2023 2389 1
Building a secure GraphQL API with Node.js Lawrence Eagles Mar 29, 2022 1901 -
Avoiding SMTP Injection: A Whitebox primer Sam Sanoop Sep 15, 2022 1579 1
Best practices for effective attack surface analysis Benson Kuria Macharia Jul 18, 2023 1659 -
Secure password hashing in Go Love Bhardwaj Dec 05, 2023 3088 -
How Spotify uses Snyk to secure the SDLC Brian Piper Sep 13, 2022 919 -
Announcing the open beta of Snyk's revamped security reporting Daniel Berman Nov 09, 2022 1354 -
Webhook Security Best Practices Gints Dreimanis Jul 06, 2022 1168 -
New IaC security workshop from Snyk, HashiCorp, and AWS at KubeCon Europe 2023 and on-demand Sarah Conway Apr 10, 2023 1035 -
Snyk is your security companion for Amazon CodeWhisperer Liqian Lim (林利蒨) Nov 29, 2023 1817 -
6 steps for scaling risk-based AppSec programs Julia Kraut Oct 13, 2023 938 -
Best practices for API gateway security Kuria Macharia Sep 07, 2022 1510 -
Power up security collaboration with Snyk and Slack Sarah Conway Oct 23, 2023 271 -
Exploiting HTTP/2 CONTINUATION frames for DoS attacks Vandana Verma Sehgal Apr 08, 2024 696 -
Repo Jacking: The Great Source-code Swindle Elliot Ward Jul 25, 2024 2516 -
Safely handling containers Tales Casagrande Jun 22, 2022 729 -
Security implications of cross-origin resource sharing (CORS) in Node.js Victor Ikechukwu Sep 13, 2023 2582 -
Using Rego as a generic policy language Dickson Boateng Jun 03, 2022 1323 -
Fetch the Flag CTF 2022 writeup: Disposable Message Michael Aquilina Nov 10, 2022 2421 -
Fetch the Flag CTF 2022 writeup: Treasure Trove Luke Watts Nov 10, 2022 572 -
How to write your first unit test in JavaScript Raphael Mun Oct 28, 2022 1600 2
Snyk highlights AWS re:Invent 2023 David Lugo Dec 14, 2023 820 -
The Snyk Perpetual Key Rotation Machine Megan Moore Apr 01, 2023 1000 -
Developer-centric DAST with Bright Security Vitaly Unic Apr 14, 2023 1496 -
Embrace your next cybersecurity career with The Big Fix Liran Tal Feb 22, 2023 692 -
The XZ backdoor CVE-2024-3094 Liran Tal Mar 31, 2024 1800 -
How Snyk can help secure supply chains per "A Guide to Implementing the Software Bill of Materials (SBOM) for Software Management"’ by Japan's METI Hiroko Nakano Aug 01, 2023 566 -
Patches of Pride: Love, inclusivity, & cute pets in celebration of Pride month Ashley Ladd Jun 20, 2023 463 -
Snyk’s new native integration with Bitbucket Cloud emphasizes dev-first security Sarah Conway Oct 25, 2022 847 -
Cloud security fundamentals part 3: Empower your developers Drew Wright Oct 21, 2022 1044 -
Snyk's AppSec journey in 2022 Jason Lane Jan 11, 2023 1554 -
Choosing the best Node.js Docker image Liran Tal, Adrian Mouat Sep 30, 2022 3033 2
Introducing Snyk Training, our online learning platform Michele Wiedemer Aug 11, 2022 424 -
10 AWS security considerations when migrating Drew Wright Nov 29, 2022 1455 -
Bolstering Snyk's developer security platform in 2022 Daniel Berman Jan 09, 2023 2059 -
Teaming up with Sysdig to deliver developer and runtime Kubernetes security Jim Armstrong Feb 16, 2022 679 -
Kicking off 2022 by recognizing DevSecOps leaders Jeff Yoshimura Jan 06, 2022 1146 -
Snyk integrates with AWS CloudTrail Lake to simplify security audits David Lugo Feb 01, 2023 551 -
Fastify plugins as building blocks for a backend Node.js API Liran Tal May 28, 2024 2479 -
Snyk scanning capabilities are now embedded in Jira Software Sarah Conway Jun 06, 2023 658 -
InCyber Forum Europe recap: 4 tips from DevSecOps experts Nina McClure Aug 14, 2024 1217 -
Exploring the Spring Security authorization bypass (CVE-2022-31692) Brian Vermeer Dec 16, 2022 1121 -
Key points from Google and Accenture's ransomware white paper Vandana Verma Sehgal Nov 07, 2022 1459 -
Snyk Week of Impact 2023: A week of meaningful contributions and community engagement Bianca Matei Nov 08, 2023 567 -
SnykLaunch recap: Custom Base Image Recommendations Jamie Smith Apr 04, 2023 1133 -
Demystifying the AWS shared security responsibility model David Lugo Nov 13, 2023 1004 -
Mitigating path traversal vulns in Java with Snyk Code Brian Vermeer Mar 06, 2023 1044 2
How to integrate ASPM with your application security program Vandana Verma Sehgal Nov 28, 2023 1258 -
Top considerations for addressing risks in the OWASP Top 10 for LLMs Simon Maple Sep 07, 2023 3135 -
Building an application security battle plan: Home Alone edition Brian Clark Dec 20, 2022 898 -
Swift deserialization security primer Sam Sanoop Jul 18, 2023 1155 -
Implementing TLS in Kubernetes Rubaiat Hossain Jul 31, 2023 2063 -
Ruby email rule removed from Snyk Code Frank Fischer Oct 13, 2022 594 -
Cloud security updates you need to know from re:Invent 2022 Ashish Rajan Dec 21, 2022 2303 -
How to secure a REST API? Liran Tal Jun 27, 2024 2768 -
Implementing TLS/SSL in Python Kingsley Ubah Oct 16, 2022 1489 -
2022 Container Security Trends Report: Exploring ownership, education, expertise, and more Megan Moore Apr 27, 2022 737 -
Getting started with query parameterization Mary Gathoni Oct 24, 2023 2337 -
Fetch the Flag CTF 2022 writeup: Not So Smart Fridge Antonio Gomes Nov 10, 2022 1026 -
How Atlassian used Snyk to solve Log4Shell Sarah Conway Nov 16, 2022 813 -
10 best practices to containerize Node.js web applications with Docker Liran Tal, Yoni Goldberg Sep 15, 2022 6338 -
Finding and fixing insecure direct object references in Python Keshav Malik Jul 19, 2023 1509 -
Preventing SQL injection in C# with Entity Framework Brian Vermeer Jul 30, 2024 1273 -
Snyk and StackHawk form strategic alliance to equip app teams with modern, developer-first security testing David Lugo May 02, 2022 716 -
Securing the web (forward) Daniel Appelquist Mar 27, 2023 1233 -
Lessons learned from the Argo CD zero-day vulnerability (CVE-2022-24348) Eric Smalling Feb 10, 2022 1375 -
Securing cloud infrastructure for PCI review DeveloperSteve Coochin Mar 03, 2022 2080 -
Snyk AppRisk Pro: A holistic approach to application risk management Daniel Berman May 01, 2024 1597 -
Securing container applications using the Snyk CLI Hadar Mutai Aug 30, 2022 489 -
Secure AI tool adoption: Perceptions and realities Alex Salkever Jun 04, 2024 733 -
Mental Health Awareness Month: How losing my father changed me Tim Leroy May 31, 2022 957 -
Building Vue 3 components with Tailwind CSS Mary Gathoni Feb 21, 2023 2017 -
Automatic source locations with Rego Jasper Van der Jeugt Feb 12, 2024 2614 -
New year ushers in new wave of Snyk Technology Alliance Partner Program members Sarah Conway Jan 12, 2023 444 -
Allyship and advocacy: Celebrating Disability Pride Month at Snyk Alex Fallon Jul 27, 2022 1764 -
4 AI coding risks and how to address them Liqian Lim (林利蒨) Jun 13, 2024 1200 -
Announcing the Snyk Business trial: Security across the SDLC Mariah Gresham Feb 15, 2022 612 -
Why “vulnerability management” falls short in modern application security Daniel Berman Jun 13, 2024 988 -
Leaky Vessels deep dive: Escaping from Docker one syscall at a time Rory McNamara Feb 06, 2024 10279 4
Critical WebP 0-day security CVE-2023-4863 impacts wider software ecosystem Brian Clark, Eric Smalling, Jonathan Moses Sep 28, 2023 1825 -
OSPO security evolution: The Kübler-Ross Model of open source Dan Appelquist Jan 12, 2023 783 -
Snyk integrates with Amazon EventBridge to enable secure AppDev at scale David Lugo Jun 12, 2023 735 -
Proxy authentication in Snyk CLI for Windows Steve Winton Oct 06, 2022 297 -
Snyk Fetch the Flag CTF 2023 writeup: Silent Cartographer John Hammond Nov 30, 2023 362 -
Application vulnerability management best practices Mariah Gresham Aug 06, 2024 1240 -
Snyk recognized as an Emerging Segment Leader in Application Security in Snowflake's Next Generation of Cybersecurity Applications report LaToya Muff Dec 11, 2023 658 -
Gitpod remote code execution 0-day vulnerability via WebSockets Elliot Ward Feb 27, 2023 2121 1
A day in the life of an ethical hacker Sonya Moisset Jun 05, 2023 2679 -
How to prevent open redirect vulnerabilities in Laravel Kevin Kimani Dec 27, 2023 1696 -
Bringing cloud native application security full circle Erin Cullen Jun 08, 2022 845 -
Find and fix HTTP/2 rapid reset zero-day vulnerability CVE-2023-44487 Jamie Smith, Kriti Dogra, Anthony Larkin Oct 11, 2023 1225 -
Six takeaways from our ASPM masterclass series Erin Cullen Apr 10, 2024 1110 -
Snyk increases investment in partners with new Snyk Technology Alliance Partner Program Cara Sampson Apr 27, 2022 1502 -
3 tips for effective developer security training Mariah Gresham Dec 01, 2022 1127 -
Snyk transformed cloud security in 2022 with developer-first solution Lauren Place Jan 11, 2023 1211 -
Snyk Fetch the Flag CTF 2023 writeup: Off the SETUID Carlos Polop Nov 30, 2023 1710 -
Three expert tips for cultivating secure software development practices Simon Maple Mar 01, 2023 896 -
Spring4Shell: The zero-day RCE in the Spring Framework explained Brian Vermeer Apr 01, 2022 927 -
Node.js multithreading with worker threads: pros and cons James Walker Feb 27, 2023 2120 2
Announcing Snyk’s new Global Service Provider program Cyndi Doyle Feb 23, 2022 696 -
Code injection in Python: examples and prevention Lucien Chemaly Dec 06, 2023 1807 -
Improving GraphQL security with static analysis and Snyk Code Sam Sanoop Apr 12, 2022 1528 -
SnykHer celebrates International Women’s Day 2022 Jess Katz Mar 07, 2022 697 -
Visibly invisible malicious Node.js packages: When configuration niche meets invisible characters Aviad Hahami Feb 28, 2022 1240 -
PulseMeter Report: Software supply chains Erin Cullen Mar 21, 2023 708 -
4 best practices for cultivating developer security adoption Erin Cullen Apr 20, 2023 897 -
Applying the principle of least privilege to Kubernetes using RBAC Jekayin-Oluwa Olabemiwo Aug 29, 2022 1734 -
Cloud Security Podcast awarded SANS Podcast of the Year Jeff Yoshimura Dec 19, 2022 830 -
A stepping stone towards holistic application risk and compliance management of the Digital Operational Resiliency Act (DORA) Ben Desjardins Jul 11, 2024 1834 -
Top 5 VS Code extensions for security Brian Clark Aug 24, 2023 1654 -
Celebrating Juneteenth at Snyk Sherica Bryan Jun 16, 2023 858 -
Vulnerabilities in NodeJS C/C++ add-on extensions Alessio Della Libera Aug 14, 2024 2808 -
Code injection vulnerabilities (CVSSv3 5.8) found in Snyk CLI and IDE plugins Carm Janneteau Nov 30, 2022 585 -
5 "no experience needed" tips for building secure applications Liran Tal Dec 27, 2022 997 -
How to install Ruby in a macOS for local development Liran Tal Sep 27, 2022 1579 -
Fix cloud security issues faster and at the source with Snyk IaC Anthony Larkin Apr 04, 2023 632 -
Improving the UI/UX of the Snyk VS Code extension Andy Gongea Nov 21, 2023 702 -
Best practices for Kubernetes Secrets management Eric Kahuha Nov 16, 2022 1777 -
Snyk Learn now aligns with the NIST NICE Workforce Framework Michael Biocchi Jun 07, 2023 471 -
Common SAML vulnerabilities and how to remediate them Sam Sanoop Dec 19, 2023 966 -
The Secure Developer: Security champions recap Sam Hepburn Jun 14, 2023 1365 -
How community participation can enhance your development career Randall Degges Nov 15, 2022 1117 -
Introducing the new Snyk UI Steve Winton Sep 29, 2022 383 -
What can you do with an enriched SBOM? A parlay quickstart guide Gareth Rushgrove Jun 07, 2023 1077 -
Snyk named a Leader in 2023 Gartner® Magic Quadrant™ for Application Security Testing Manoj Nair May 23, 2023 949 -
An unintimidating introduction to the dark arts of C/C++ vulnerabilities Aviad Hahami Apr 15, 2022 1513 -
Preventing server-side request forgery in Node.js applications David Ekete Feb 20, 2024 1759 -
Symmetric vs. asymmetric encryption: Practical Python examples Josh Amata May 15, 2024 4010 -
Improving code quality with linting in Python Keshav Malik Oct 12, 2022 1767 2
Keeping Docker secrets secure (even if you’re not using Kubernetes) Marcelo Oliveira Aug 24, 2022 1484 -
dompdf security alert: RCE vulnerability found in popular PHP PDF library DeveloperSteve Coochin Mar 18, 2022 1185 -
5 best practices for React with TypeScript security Marcelo Oliveira Dec 08, 2022 1755 -
Snyk named a 2023 Gartner Peer Insights™ Customers’ Choice for Application Security Testing Ciana Abdollahian Dec 04, 2023 622 -
How to use GitHub Actions environment variables Lewis Gavin Nov 22, 2022 1877 -
Preventing broken access control in express Node.js applications Ben Smitthimedhin May 22, 2024 2923 -
The SecurityManager is getting removed in Java: What that means for you Mdu Sibisi Jun 15, 2023 2238 -
Welcoming Karyn Smith: Snyk’s new Chief Legal Officer Peter McKay Feb 07, 2022 539 -
Building an npm package compatible with ESM and CJS in 2024 Liran Tal Apr 18, 2024 1082 -
Investing in our planet: One tree planted for each new Snyker Tori Hay Lindahl Apr 22, 2022 444 -
Extend the power of your AppSec data with the new Snyk and Snowflake integration Guy Plotnik Aug 06, 2024 1095 -
Meet (and join) our newest Snyk Ambassadors – Fall 2022 edition! Gerald Crescione Sep 19, 2022 861 -
Vulnerability disclosure: Which comes first, the security bug in PHP or the CVE? Liran Tal Dec 19, 2023 841 -
Snyk sponsors Snowflake Summit LaToya Muff Jun 04, 2024 569 -
An investigation into code injection vulnerabilities caused by generative AI Jack Hair Apr 16, 2024 983 -
Lessons from OpenSSL vulnerabilities part 1: Preparing your supply chain for the next critical vulnerability Jamie Smith Apr 19, 2023 1133 -
Manage security issues in Jira with Snyk Security in Jira Cloud LaToya Muff Aug 09, 2023 330 -
Lessons from OpenSSL vulnerabilities part 2: Finding and fixing supply chain vulnerabilities Jamie Smith Apr 26, 2023 1977 -
5 tips to supercharge app security from code to cloud Sonya Moisset Aug 08, 2023 2759 -
The dangers of setattr: Avoiding Mass Assignment vulnerabilities in Python Jack Hair Feb 15, 2023 1334 -
Understanding DNS attacks: Identifying and patching vulnerabilities Nihad Hassan Oct 26, 2022 2002 -
Build a software bill of materials (SBOM) for open source supply chain security Liran Tal Mar 14, 2022 2599 -
Enterprise security: Digital transformation and risk management with Anheuser-Busch Inbev and Manulife Brian Piper Feb 03, 2022 875 -
Buildkit mount cache race: Build-time race condition container breakout (CVE-2024-23651) Rory McNamara Jan 31, 2024 1022 -
AWS re:Inforce 2022 recap Shilpi Bhattacharjee Aug 08, 2022 2487 -
Snyk and Bitbucket best practices cheat sheet Marco Morales Mar 03, 2022 915 -
XS leaks: What they are and how to avoid them Gino Diño Jul 17, 2023 2287 1
SAS and Snyk discuss the future of AI for development and security teams Brian Piper Oct 09, 2023 848 -
Snyk Open Source adds C/C++ security scanning for unmanaged dependencies Michal Brutvan Apr 05, 2022 768 -
How Onna Technologies uses Snyk & Sysdig to secure the SDLC while saving time and money Brian Piper Sep 12, 2022 1297 -
Suspicious Maintainer Unveils Threads of npm Supply Chain Attack Liran Tal Jul 16, 2024 1524 -
Cloud security fundamentals part 1: Know your environment Drew Wright Oct 07, 2022 1098 -
New Year's security resolutions for 2024 from Snyk DevRel, SecRel, and friends Micah Silverman Jan 18, 2024 1188 -
Buildkit build-time container teardown arbitrary delete (CVE-2024-23652) Rory McNamara Jan 31, 2024 879 -
What you should know about PHP code security Liran Tal Sep 04, 2024 1773 -
Secure your software supply chain with the new Snyk Vulnerability Intelligence for SBOM ServiceNow integration Sarah Conway Nov 07, 2023 531 -
Snyk documentation: Our journey so far David Bailey Feb 29, 2024 978 -
Snyk and ServiceNow collaborate on new SBOM solution Sarah Conway May 16, 2023 470 -
Celebrating Father’s Day at Snyk Snyk Team Jun 17, 2022 93 -
CTF secrets revealed: TopLang challenge from SnykCon 2021 explained Michael Aquilina Jan 06, 2022 2987 -
Agent hijacking: The true impact of prompt injection attacks Elliot Ward, Rory McNamara, Mateo Rojas-Carulla, Sam Watts, Eric Allen Aug 28, 2024 2758 -
Mimic your mental model with Project Collections Waleed Arshad Jun 27, 2023 745 -
Rego 103: Types of values and rules Jasper Van der Jeugt, Becki Lee Nov 16, 2023 3425 -
Introducing new Snyk AppRisk integrations: Enhancing application risk management with development context Daniel Berman Aug 01, 2024 890 -
A developer-centric approach to software Mariah Gresham Feb 18, 2022 1108 -
Understanding Kubernetes Pod Security Standards Gino Diño Jun 20, 2023 1389 -
Avoiding mass assignment vulnerabilities in Node.js Benson Kuria Macharia Mar 28, 2023 2321 -
Snyk Fetch the Flag CTF 2023 writeup: Honey Baked Messages John Hammond Nov 30, 2023 298 -
Snyk is now also hosted in the EU providing regional data residency Daniel Berman Jun 28, 2022 633 -
Essential Node.js backend examples for developers in 2024 Liran Tal Jun 12, 2024 2643 -
Celebrating Asian American and Pacific Islander Heritage Month Snyk Team May 27, 2022 1141 -
A developer’s best friend: Lessons learned from our canine companions about AI code security Krysta Williams-Timm Aug 26, 2024 803 -
10 React security best practices Liran Tal Jul 18, 2022 1130 2
Preventing XSS in Django Liran Tal Mar 13, 2023 1932 -
Snyk Code now secures AI builds with support for LLM sources Liqian Lim (林利蒨), Ranko Cupovic Jun 25, 2024 571 -
Spring4Shell extends to Glassfish and Payara: same vulnerability, new exploit Brian Vermeer Apr 08, 2022 1015 -
Announcing Insights: Helping you focus on top risks for your organization Daniel Berman Jun 07, 2023 1737 -
Priorities from the OpenSSF Secure Open Source Software Summit 2023 Dan Appelquist Oct 04, 2023 381 -
Under the C: A glance at C/C++ vulnerabilities in Python land Aviad Hahami Apr 28, 2022 1289 -
How open source C++ code can introduce security risks Snyk Security Research Team Aug 22, 2022 1353 -
Introducing the Snyk Partner Solutions Directory for discovering Snyk technology integrations Cara Sampson Apr 03, 2023 996 -
Snyk’s Evolution: A Message From CEO Peter McKay Peter McKay Apr 13, 2023 549 -
How to install Java on macOS Liran Tal Apr 17, 2024 2820 -
CISO playbook: 3 things to consider when establishing a security culture Simon Maple Mar 09, 2023 1249 -
GitHub Copilot code security: XSS in React Liran Tal Oct 19, 2023 2044 -
Setting up SSL/TLS for Kubernetes Ingress Peter De Tender Nov 17, 2022 2245 -
Security success in the Bay Area with Slack Mariah Gresham May 17, 2023 878 -
Snyk expands in Asia-Pacific (APAC) with new datacenter in Sydney, Australia Daniel Berman Nov 30, 2022 715 -
How to setup Deno Dev Container on GitHub Codespaces? Liran Tal Jul 18, 2024 2097 -
Welcoming Kathleen Murphy and Zach Nelson to the Snyk Board of Directors Peter McKay Jan 24, 2022 448 -
Magento security requires additional patch to fix sanitization vulnerability DeveloperSteve Coochin Feb 24, 2022 711 -
Modernizing SAST rules maintenance to catch vulnerabilities faster Frank Fischer Apr 19, 2022 928 -
Command injection in Python: examples and prevention Rubaiat Hossain Dec 21, 2023 2558 -
Meet (and join) our newest Snyk Ambassadors! Waleed Arshad Mar 28, 2022 1783 -
Best practices for managing Java dependencies Brian Vermeer Aug 26, 2022 1826 5
How to avoid web cache poisoning attacks Najia Gul Sep 11, 2023 2155 -
How to secure Python Flask applications Gourav Singh Bais May 21, 2024 4209 -
Fetch the Flag CTF 2023 sneak peek Danielle Bradford Sep 06, 2023 187 -
A DevSecOps solution for your apps on AWS from Snyk David Lugo Nov 28, 2023 900 -
Ignoring vulnerabilities with Snyk Daniel Berman May 03, 2022 1845 -
Implementing TLS in Java Himanish Munjal Nov 09, 2022 2166 -
Best practices for containerizing Go applications with Docker Jekayin-Oluwa Olabemiwo Mar 23, 2022 2117 -
Snyk named as a top cybersecurity company in inaugural Fortune Cyber 60 2023 list Snyk Team Dec 18, 2023 337 -
New years resolution: Don’t show my security tokens when hacking my demo application on stage Brian Vermeer Jan 12, 2022 721 -
Snyk finds PyPi malware that steals Discord and Roblox credential and payment info Raul Onitza-Klugman Aug 16, 2022 1689 -
A definitive guide to Ruby gems dependency management Liran Tal Aug 05, 2022 2618 1
Security vs. Development: A game of priorities Andrew MacKenzie Nov 06, 2023 1009 -
Identifying Insecure C Code with Valgrind and Fixing with Snyk Code Liran Tal Sep 24, 2024 1373 -
Meet the new host for The Secure Developer podcast Mariah Gresham May 09, 2024 469 -
How to mitigate security issues in GenAI code and LLM integrations Liran Tal Sep 11, 2024 2394 -
Announcing new Snyk AppRisk integration with Orca Security Daniel Berman Sep 11, 2024 809 -
Want to avoid a data breach? Employ secrets detection Liran Tal Sep 16, 2024 2539 -
Promise queues and batching concurrent tasks in Deno Liran Tal Sep 25, 2024 3378 -
AWS re:Invent 2022: How Neiman Marcus transitioned to developer-first security Megan Moore Dec 12, 2022 1231 -
5 reasons why developers at FinServ institutions are outpacing their security teammates Katie DeMatteis Sep 09, 2024 822 -
Dive into AI and LLM learning with the new Snyk Learn learning path Michael Biocchi Sep 18, 2024 310 -
Welcoming Gary Olson: Snyk’s new Chief Revenue Officer Peter McKay Mar 04, 2024 444 -
How SAS secures their AI-generated code Gerald Crescione Apr 15, 2024 1874 -
The journey to AppSec gold: Lessons we can learn from the Olympians Krysta Williams-Timm Aug 15, 2024 714 -
Tools for infrastructure drift detection William Beuil Mar 15, 2022 2480 -
3 best practices to make the most of Snyk AppRisk Essentials Daniel Berman Sep 19, 2024 1801 -
10 best practices to build a Java container with Docker Brian Vermeer Aug 24, 2022 4147 -
Infosec Europe session: 4 tips for safer AI adoption Gerald Crescione Aug 01, 2024 1103 -
How to prevent log injection vulnerability in JavaScript and Node.js applications Liran Tal Sep 26, 2024 1504 -
Securing a DevOps pipeline with Snyk, Bitbucket, and AWS Marco Morales Jan 04, 2022 456 -
SurveyMonkey talks with Snyk about developer security during hypergrowth Megan Moore May 05, 2022 1381 -
Meet Snyk for Government: Our developer security solution with FedRAMP ATO Danny Allan Sep 17, 2024 502 -
Zero-day RCE vulnerability found in CUPS - Common UNIX Printing System Jim Armstrong Sep 27, 2024 1224 -
Going beyond reachability to prioritize what matters most Jamie Smith Oct 01, 2024 1149 -
Proactive AppSec continuous vulnerability management for developers and security teams Liran Tal Oct 02, 2024 1804 -
Snyk named a 2024 Gartner Peer Insights™ Customers’ Choice for Application Security Testing for the 3rd consecutive year Nina McClure Oct 02, 2024 723 -
The mysterious supply chain concern of string-width-cjs npm package Liran Tal Oct 03, 2024 1455 -
SnykLaunch Oct 2024: Enhanced PR experience, extended visibility, AI-powered security, holistic risk management Anthony Larkin Oct 08, 2024 1489 -
A look into your engineering interview at Snyk Philip Beevers Oct 09, 2024 750 -
Foundations of trust: Securing the future of AI-generated code Danny Allan Oct 10, 2024 888 -
Analyze Taint Analysis Faster with Improved Contextual Dataflow in Snyk Code Liran Tal Oct 10, 2024 875 -
Automatically fix code vulnerabilities with AI Micah Silverman Oct 14, 2024 1132 -
How Snyk is prioritizing developer experience Anthony Larkin Oct 16, 2024 860 -
Snyk announces commitment to Service for America, bringing security education access to all Michael Biocchi Oct 17, 2024 394 -
Ensuring comprehensive security testing in DevOps pipelines Jim Armstrong Oct 17, 2024 1317 -
Introducing: Extensive AppSec visibility with Snyk Analytics Nastasha Casale Oct 17, 2024 952 -
Elevating Views of Risk: Holistic Application Risk Management with Snyk Daniel Berman Oct 22, 2024 1601 -
Women - Kickstart your Application Security Career! Vandana Verma Sehgal Oct 22, 2024 1020 -
Find, auto-fix, and prioritize intelligently, with Snyk's AI-powered code security tools Liqian Lim (林利蒨) Oct 24, 2024 2083 -
Vulnerability-Free C and C++ Development in Automotive Manufacturing and Software Defined Vehicles (SDV) Liran Tal Oct 23, 2024 1469 -
Best Practices for Continuous Vulnerability Management Liran Tal Oct 29, 2024 1698 -
Top 5 SAST Auto-fixing Tools and How They Compare Liqian Lim (林利蒨) Oct 29, 2024 966 -
Lottie Player npm package compromised for crypto wallet theft Liran Tal Oct 31, 2024 825 2
If you don’t know about HTTP Archive’s Web Almanac yet, you should! Brian Clark Nov 01, 2024 710 -
Snyk Recharge days: Making time to take time Adriana Bokel Herde May 17, 2023 710 -
GitFlops: The Dangers of Terraform Automation Platforms Elliot Ward Nov 07, 2024 1831 -
Extending Developer Security with Dev-First Dynamic Testing Manoj Nair Nov 12, 2024 1565 -
How ASPM boosts visibility to manage application risk Daniel Berman Nov 12, 2024 1144 -
5 Disaster Recovery Testing Methodologies Liran Tal Sep 23, 2022 610 -
Understanding command injection vulnerabilities in Go Liran Tal Nov 14, 2024 1891 1
5 Best Practices for Container security Liran Tal Jul 19, 2022 985 -
Snyk named a Customer Favorite in The Forrester Wave™: Software Composition Analysis Software, Q4 2024 Report Peter McKay Nov 13, 2024 460 -
Phony PyPi package imitates known developer Elliot Ward Oct 05, 2022 1031 2
An Introduction to capture the flag Sonya Moisset Sep 13, 2023 828 -
6 Kubernetes Tools That Can Help Secure Containers at Runtime Liran Tal Jun 08, 2022 481 -
Women in security: Inspiring leaders of today and tomorrow Jonaki Egenolf Nov 19, 2024 433 -
How to prioritize vulnerabilities based on risk Daniel Berman Nov 19, 2024 1153 -
A commitment to future generations: Snyk’s 2024 Student Edition Capture The Flag Recap Michael Biocchi Nov 21, 2024 332 -
Why a solid DevOps foundation is vital for effective DevSecOps Ben Desjardins Nov 27, 2024 1117 -
Measuring AppSec success: Key KPIs that demonstrate value Daniel Berman Nov 26, 2024 1479 -
Seven steps to close coverage gaps with ASPM Daniel Berman Dec 03, 2024 1023 -
2024 Open Source Security Report: Slowing Progress and New Challenges for DevSecOps Jamie Smith Dec 03, 2024 973 -
Empowering women in security: The impact of mentorship Erin Cullen Nov 27, 2024 696 -
Snyk-generated SBOMs now include license details for the open source libraries in your projects Jamie Smith Dec 09, 2024 906 -
How to mitigate SSRF vulnerabilities in Go Liran Tal Dec 10, 2024 910 -
Snyk’s risk-based approach to prioritization Daniel Berman Dec 11, 2024 1082 -
Ultralytics AI Pwn Request Supply Chain Attack Stephen Thoemmes Dec 11, 2024 1375 -
10 SDLC best practices to implement today Jamie Smith Jan 14, 2022 1304 -
Microservices security: 6 best practice tips Jamie Smith Feb 10, 2022 1226 -
Vulnerability vs Weakness: Understanding Key Differences in AppSec Daniel Berman Nov 17, 2023 1934 -
7 Best practices for disaster recovery testing Liran Tal Sep 23, 2022 805 -
Ethical Hacking: Top Tools Vandana Verma Sehgal Jun 01, 2023 1601 -
Top 8 AWS Security Best Practices Liran Tal Oct 18, 2022 1835 -
Hiring a virtual CISO to help your security team Manoj Nair Mar 09, 2022 1019 -
The 4 best DevSecOps tools for a secure DevOps workflow Liran Tal Jan 23, 2024 1583 -
Essential AI Tools to Boost Developer Productivity and Security Liqian Lim (林利蒨) Mar 01, 2024 1385 -
4 Advantages of using AI code review Rory McNamara Nov 29, 2023 1152 -
Python Code Review Tools Liran Tal Aug 12, 2022 1276 -
Unlocking the power of multi-cloud security Vandana Verma Sehgal Apr 25, 2023 1147 -
Supply Chain Security Risks & Best Practice Liran Tal Apr 04, 2023 1102 -
Getting started at a new organization Manoj Nair Jan 27, 2022 791 -
OWASP API Security Top 10 Risks Liran Tal Sep 23, 2022 1816 -
8 proven code review best practices for developers Liran Tal Jan 14, 2022 1316 -
How to implement DevSecOps in 4 steps Jamie Smith Jun 22, 2023 1316 -
Software Supply Chain Security Tools: Types, Features & Considerations Jamie Smith Aug 02, 2023 1306 -
C++ in the wild: Which industries use C++? Liran Tal Apr 29, 2022 1070 -
Developer-first supply chain security Jamie Smith Sep 19, 2023 1330 -
Top 5 Docker Security Vulnerabilities Liran Tal Oct 31, 2022 1036 -
Asset-first application security: What is it and how can it help Daniel Berman Nov 03, 2023 1156 -
The Importance of Container Monitoring Jamie Smith Mar 02, 2022 1013 -
Cloud security challenges Rory McNamara May 19, 2022 2423 -
Defense in Depth Daniel Berman Feb 29, 2024 1430 -
Top AWS Security Risks & Prevention Rory McNamara Mar 02, 2023 1256 -
Top 8 DevSecOps Best Practices - Build Securely Liran Tal Sep 26, 2022 1074 -
Secrets Management: Tools & Best Practice Jamie Smith Jun 26, 2023 1318 -
Product Security vs. Application Security: What’s the Difference? Rory McNamara Jul 21, 2023 1390 -
6 tips for managing your open source components Liran Tal Apr 26, 2022 1364 -
4 Enterprise-level security best practices Manoj Nair Jul 20, 2023 617 -
7 best Java code review tools for developers Liran Tal Jan 14, 2022 1375 -
AppSec Maturity Models Rory McNamara Mar 08, 2024 1120 -
Cybersecurity Hygiene 101 Liran Tal Mar 02, 2023 1594 -
High profile AWS breaches & how to avoid them Jamie Smith Jun 07, 2023 1197 -
API Security Guide Liran Tal Apr 25, 2023 1338 -
Did you make the *security* naughty or nice list this year? Mariah Gresham Dec 18, 2024 590 -
4 tips for securing GenAI-assisted development Sarah Conway Dec 18, 2024 859 -
New year, new security goals: Improve your AppSec in 2025 Mariah Gresham Jan 01, 2025 729 -
Securing the Digital Future: AppSec Best Practices in Digital Banking Hiroko Nakano Jan 06, 2025 587 -
Securing GenAI Development with Snyk Liqian Lim (林利蒨) Jan 09, 2025 697 -
Snyk Recognized as Trusted Partner and Innovator by JPMorganChase Ken Mellert Jan 14, 2025 294 -
BFI’s Journey in Digital Transformation: A Fireside Chat on Elevating Application Security and Developer Experience Hiroko Nakano Jan 15, 2025 506 -
Snyk Security Labs Testing Update: Cursor.com AI Code Editor Danny Allan Jan 14, 2025 688 6
Understanding the EU’s Cyber Resilience Act (CRA) Ben Desjardins Jan 22, 2025 1105 -
Sneak Peek into Fetch the Flag CTF 2025 Gina Fitzpatrick Jan 21, 2025 293 -
Reviving DevSecOps: How Snyk’s new framework builds trust and collaboration Ben Desjardins Jan 23, 2025 793 -