420 blog posts published by month since the start of 2023. Start from a different year:

Blog URL
Posts year-to-date
9 (16 posts by this month last year.)
Average posts per month since 2023
11.7

Post details (2023 to today)

Title Author Date Word count HN points
Snyk in 30: Developer-first security democast Jim Armstrong Mar 02, 2023 1538 -
Modern VS Code extension development: The basics Mdu Sibisi Sep 14, 2023 2775 -
What kind of (security) dog are you? Belyn Lai Aug 25, 2023 756 -
Mitigating DOM clobbering attacks in JavaScript Keshav Malik Aug 07, 2023 1806 -
CodeSecDays conference and more complete security coverage with GitGuardian Sarah Conway Aug 10, 2023 989 -
Snyk users don't have to worry about NVD delays Hadas Bloom Mar 13, 2024 734 -
Automate cloud compliance with Snyk IaC Lauren Place Feb 07, 2023 591 -
Discussions on improving security through chaos engineering Mariah Gresham Aug 03, 2023 966 -
How to strengthen security in your CI/CD pipeline James Konik Jul 12, 2023 1800 -
Snyk welcomes Helios, accelerating our ASPM vision with runtime insights Manoj Nair Jan 16, 2024 874 -
Introducing Snyk’s new Risk Score for risk-based prioritization Gur Shafriri, Benji Catabi-Kalman Aug 17, 2023 1514 -
Four easy ways to analyze your Java and Kotlin code Brian Vermeer Aug 13, 2024 1982 -
5 ways to improve security during digital transformation Erin Cullen Apr 10, 2023 1007 -
How to use AI for software development and cybersecurity Simon Maple Aug 30, 2023 1755 -
SnakeYaml 2.0: Solving the unsafe deserialization vulnerability Brian Vermeer Jun 21, 2023 1205 -
Finding YAML Deserialization with Snyk Code Calum Hutton Feb 23, 2023 799 -
Snyk announces new Slack integration Sarah Conway May 30, 2023 610 -
Best practices for using AI in the SDLC Frank Fischer Jul 19, 2023 749 -
DevOpsDays Singapore 2024: Unmasking the security pitfalls in AI-generated code Hiroko Nakano Apr 23, 2024 562 -
Engineering culture at Snyk: The values that support and drive our teams Sergey Vasilkov May 08, 2023 2259 -
3 tips from Snyk and Dynatrace’s AI security experts Sarah Conway Jan 22, 2024 905 -
Snyk Code, the only security tool chosen by developers in Stack Overflow's 2024 AI Search and Developer Tools survey Liqian Lim (林利蒨) Aug 27, 2024 901 -
How to prevent NullPointerExceptions in Java Lucien Chemaly Sep 21, 2023 2669 -
The ultimate guide to creating a secure Python package Gourav Singh Bais May 08, 2024 3482 -
Why you need a security companion for AI-generated code Liqian Lim (林利蒨) Oct 25, 2023 1834 -
Reduce risk to your supply chain with a software bill of materials (SBOM) Ryan Searle Jun 07, 2023 881 -
Cybersecurity Venture’s 2023 Software Supply Chain Attack Report Sydney Milligan Oct 10, 2023 816 -
Maximizing IAM security with AWS permissions boundaries and Snyk Wayne Crissman Jun 26, 2023 1019 -
Data leak in the Netherlands: What developers should learn from this Brian Vermeer Mar 31, 2023 753 -
Identify vulnerabilities in your container images with Snyk’s enhanced Docker Desktop Extension LaToya Muff Apr 11, 2023 363 -
Learning from cloud transformation as we move to AI David Lugo May 21, 2024 976 -
How to secure an S3 bucket on AWS? Liran Tal Jul 12, 2024 3393 -
How Axel Springer National Media and Tech achieved continuous security with Snyk Nina McClure Sep 03, 2024 952 -
Secure Java URL encoding and decoding Jura Gorohovsky Aug 14, 2023 3090 -
Snyk named a Leader, placed highest in Strategy category in The Forrester Wave: Software Composition Analysis (SCA), Q2 2023 report Manoj Nair Jun 13, 2023 770 -
Nightfall AI and Snyk unite to deliver AI-powered secrets scanning for developers LaToya Muff Nov 29, 2023 547 -
Krampus delivers an end-of-year Struts vulnerability Micah Silverman Jan 02, 2024 1667 -
3 tips for rebuilding a Docker image faster (and save CI seconds!) Liran Tal Dec 28, 2023 2564 -
Does AI lead to AppSec hell or nirvana? Erin Cullen Oct 03, 2023 1040 -
Announcing Snyk AppRisk: Elevate your AppSec game with ASPM Daniel Berman Dec 12, 2023 1464 -
3 ways AppSec modernization is a game-changer for financial services Katie DeMatteis Sep 03, 2024 782 -
SnykLaunch April '23: C/C++ expansion, cloud and IaC updates, custom container security, new integrations, and more Jim Armstrong Apr 04, 2023 1462 -
New SEC cybersecurity rules put more onus on the CISO, not so much on directors Myke Lyons Aug 03, 2023 1578 -
Enhancing code to cloud security with the Common Configuration Scoring System Wayne Crissman Dec 14, 2023 998 -
Snyk welcomes Enso: Enabling security leaders to scale their AppSec program with ASPM Manoj Nair Jun 07, 2023 972 -
Leaky Vessels: Docker and runc container breakout vulnerabilities (January 2024) Jamie Smith Jan 31, 2024 1729 41
Introducing Snyk’s partnership with Gemini Code Assist David Lugo Apr 09, 2024 682 -
Snyk is named a Strong Performer as a first-time entrant in the Forrester Wave™: Static Application Security Testing (SAST) Q3 2023 Peter McKay Sep 20, 2023 696 -
Day in the life of a food giant CISO Vandana Verma Sehgal Apr 18, 2024 668 -
Snyk & Atlassian: How to embed security in AI-assisted software development LaToya Muff Feb 14, 2024 1030 -
Integrating Snyk Code SAST results in your ServiceNow workflows Sarah Conway May 07, 2024 514 -
Three reasons to invest in an ASPM solution in 2024 Julia Kraut Dec 12, 2023 610 -
With Love, Your Applications Krysta Williams-Timm Feb 14, 2024 373 -
Three trends shaping software supply chain security today Erin Cullen Aug 22, 2024 923 -
Using insecure npm package manager defaults to steal your macOS keyboard shortcuts Yagiz Nizipli Jun 28, 2023 1102 -
AI quality: Garbage in, garbage out Michael Biocchi Jun 11, 2024 730 -
How to secure JavaScript applications right from the CLI Gideon Idoko Oct 24, 2023 2412 -
10 best practices for securely developing with AI Simon Maple Sep 27, 2023 3204 -
Snyk top 10 code vulnerabilities report Mariah Gresham May 18, 2023 424 1
Setting up the Docker image scan GitHub Action Mohammad-Ali A'râbi May 19, 2023 1076 -
Getting started with PHP static analysis in 2024 Liran Tal Mar 21, 2024 2431 -
Introducing the Snyk App for Compass: A complete view of software component risk LaToya Muff Oct 05, 2023 662 -
How to prevent XPath injection attacks Marcelo Oliveira May 10, 2023 2175 -
Securing your SBOM on Google Cloud David Lugo Mar 28, 2024 983 -
More accurate than GPT-4: How Snyk’s CodeReduce improved the performance of other LLMs Eric Fernandez May 07, 2024 1245 -
Can AI write secure code? Frank Fischer May 03, 2023 2244 -
Introducing parlay, a tool for enriching SBOMs Gareth Rushgrove Jun 07, 2023 773 -
360 degrees of application security with Snyk Soumen Mukherjee Apr 24, 2024 1273 -
How to keep an HTTP connection alive for 9 hours Micah Silverman Oct 23, 2023 2391 3
Creating SBOMs with the Snyk CLI Brian Vermeer Feb 08, 2024 1348 -
Vulnerability: runc process.cwd and leaked fds container breakout (CVE-2024-21626) Rory McNamara Jan 31, 2024 1114 3
Ethical hacking techniques Vandana Verma Sehgal Jun 05, 2023 1713 -
Snykers share wellness tips for mental health awareness month Belyn Lai May 30, 2023 706 -
Snyk Partner Speaks series: True DevSecOps with Snyk and Dynatrace Sarah Conway Jun 08, 2023 177 -
Snyk enhances ServiceNow with comprehensive insights into vulnerabilities in open source software Marco Morales Jan 24, 2023 633 -
Snyk Ranked #19 on 2023 Forbes Cloud 100 List Peter McKay Aug 08, 2023 430 -
Going beyond “shift left” to extend AppSec in all directions Ben Desjardins Jul 09, 2024 968 -
Research with Snyk and Redhunt Labs: Scanning the top 1000 orgs on GitHub Vandana Verma Sehgal Jun 22, 2023 399 -
Snyk Partner Speak Video Series Puts Spotlight on New Integrations Sarah Conway Apr 12, 2023 181 -
How to build a modern DevSecOps culture: Lessons from Jaguar Land Rover and Asda Brian Piper Feb 21, 2024 1209 -
Amplifying AAPI Voices to Honor Asian American Pacific Islander Heritage Month Belyn Lai, Yos Pang May 25, 2023 1495 -
Integrating the Snyk Language Server with IntelliJ IDEs Arvyd Paeglit Jun 17, 2024 344 -
Black Hat Asia customer panel recap: How to lead DevSecOps adoption Brian Piper Sep 18, 2023 821 -
Recap: Stress-Free Security for Devs and Ops on AWS David Lugo Apr 03, 2023 1341 -
Polyfill supply chain attack embeds malware in JavaScript CDN assets Liran Tal Jun 26, 2024 1892 -
Snyk Fetch the Flag CTF 2023 writeup: Audiopolis John Hammond Nov 30, 2023 278 -
Securing the digital future: Reviewing the Biden-Harris administration's National Cybersecurity Strategy Vandana Verma Sehgal Mar 20, 2023 713 -
A security expert’s view on Gartner’s generative AI insights Liqian Lim (林利蒨) Aug 07, 2024 1729 -
Snyk CLI: Introducing Semantic Versioning and release channels Chintan B. Apr 30, 2024 930 -
Call for action: Exploring vulnerabilities in Github Actions Elliot Ward, Rory McNamara, Raul Onitza-Klugman Jun 06, 2024 3977 -
Session management security: Best practices for protecting user sessions Okoth Pius Jul 11, 2023 2703 1
Data loss prevention for developers Annabel Gauci May 24, 2023 2103 2
Snyk and Atlassian deepen partnership with Snyk security in Jira Software Jill Wilkins Feb 08, 2023 412 -
10 modern Node.js runtime features to start using in 2024 Liran Tal May 29, 2024 5030 2
Snyk and AWS announce native Amazon EKS support directly from the AWS Management Console David Lugo Jun 12, 2024 418 -
5 Node.js security code snippets every backend developer should know Liran Tal Feb 28, 2024 3106 -
Introducing the ASPM Masterclass Erin Cullen Mar 12, 2024 504 -
Dependency injection in Python Lucien Chemaly Oct 31, 2023 2919 -
Snyk Apps now GA: An easy, standardized, and secure framework for building custom integrations Sarah Conway Nov 20, 2023 1108 -
Manage security issues in Jira with Snyk Security in Jira Cloud LaToya Muff Aug 09, 2023 330 -
Securing symmetric encryption algorithms in Java Brian Vermeer Oct 18, 2023 1489 -
Preventing insecure deserialization in Node.js Benson Kuria Macharia Apr 17, 2023 1890 -
Building a security-conscious CI/CD pipeline Peter De Tender Jun 29, 2023 1529 -
Is your team on the *security* naughty or nice list? Mariah Gresham Dec 20, 2023 873 -
How REI built a DevSecOps culture and how Snyk helped Brian Piper Feb 27, 2024 1154 -
Snyk achieves Red Hat Vulnerability Scanner Certification Tomás González Blasini, David Lugo Apr 03, 2023 391 -
How to find and fix Critical WebP zero-day vulnerability CVE-2023-4863 Brian Clark, Eric Smalling, Tim Gowan Oct 05, 2023 1282 -
Weak Hash vulnerability discovered in crypto-js and crypto-es (CVE-2023-46233 & CVE-2023-46133) Jamie Smith Oct 25, 2023 1509 -
How to update cURL Brian Clark, Eric Smalling Oct 11, 2023 1772 -
AWS top 10 misconfigurations and how to fix them: A cheat sheet Erin Cullen Mar 15, 2023 1546 -
Handling security vulnerabilities in Spring Boot Brian Vermeer Nov 29, 2023 1451 -
Three considerations for building an effective security program Alex Bovee May 04, 2023 920 -
Top 8 penetration testing tools Benson Kuria Macharia May 25, 2023 1172 -
Snyk Learn and the NIST Cybersecurity Framework (CSF) Michael Biocchi Mar 06, 2024 523 -
Snyk Fetch the Flag CTF 2023 writeup: Protect The Environment John Hammond Nov 30, 2023 243 -
Understanding and mitigating the Jinja2 XSS vulnerability (CVE-2024-22195) Liran Tal Jan 18, 2024 1059 -
Accelerate C/ C++ security with Snyk Marcie Cheung Dec 05, 2023 614 -
Mastering Python virtual environments: A complete guide to venv, Docker, and securing your code Liran Tal Jan 10, 2024 1589 -
Snyk Fetch the Flag CTF 2023 writeup: I Do Math John Hammond Nov 30, 2023 190 -
How to protect Node.js apps from CSRF attacks Victor Ikechukwu Oct 17, 2023 3146 -
Snyk integrates with AWS Security Hub to automate security remediation workflows David Lugo Jun 12, 2023 884 -
How to implement SSL/TLS pinning in Node.js Nwani Victory Aug 29, 2023 2298 -
Streamline dependency updates with Mergify and Snyk Liran Tal Aug 23, 2023 1548 -
5 security best practices for adopting generative AI code assistants like GitHub Copilot Liqian Lim (林利蒨) Mar 05, 2024 1368 -
A denial of service Regex breaks FastAPI security Liran Tal Jul 31, 2024 1878 -
How secure is WebAssembly? 5 security concerns unique to WebAssembly Marcelo Oliveira Jul 28, 2023 1448 2
The Docker project turns 10! Looking back at a decade of containers Eric Smalling Mar 17, 2023 3058 -
Talk to us about Snyk CLI Chintan B., Neil Mackay Jun 06, 2024 859 -
How Mulesoft fosters a developer-first, shift-left culture with Snyk Gerald Crescione Apr 30, 2024 798 -
The art of conditional rendering: Tips and tricks for React and Next.js developers Kumar Harsh Oct 30, 2023 2865 -
Snyk's 2023 State of Open Source Security: Supply chain security, AI, and more Simon Maple Jul 26, 2023 1184 -
Snyk achieves AWS Security Competency David Lugo Nov 15, 2023 514 -
Preventing SQL injection attacks in Node.js Lucien Chemaly Feb 20, 2024 2260 -
SnykLaunch June ‘23: Insights and DeepCode AI enable faster fixes and prioritization Jim Armstrong Jun 07, 2023 1567 -
Finding and fixing exposed hardcoded secrets in your GitHub project with Snyk Chandler Mayo Jun 25, 2024 902 -
Does GitOps enhance application security? Vandana Verma Sehgal Aug 21, 2023 1026 -
What are AI hallucinations and why should developers care? Liran Tal Aug 16, 2023 2376 1
Welcoming Danny Allan and Brian Rogan: Snyk leadership team expands with key appointments to accelerate innovation Peter McKay Feb 06, 2024 492 -
Snyk welcomes Reviewpad: Code, commit, celebrate! Manoj Nair Oct 30, 2023 606 -
Our favorite 2023 Snyk Fetch the Flag CTF writeups from the community Danielle Bradford Nov 21, 2023 183 -
Top 3 security best practices for handling JWTs Liran Tal Dec 18, 2023 2007 -
A quick primer on LDAP injection Eric Kahuha Jun 01, 2023 1379 -
10 GitHub Security Best Practices Brian Vermeer Feb 05, 2024 3532 3
.NET developers alert: Moq NuGET package exfiltrates user emails from git Liran Tal Aug 09, 2023 831 2
Modern VS Code extension development tutorial: Building a secure extension Mdu Sibisi Oct 02, 2023 3917 -
Control your role! Kubernetes RBAC explored James Walker Jul 27, 2023 2123 -
The importance of platform engineers in a security program Elliott Spira Apr 13, 2023 962 -
Snyk Partner Speak Video with ServiceNow: A complete view of application security Sarah Conway May 02, 2023 196 -
Reporting AppSec risk up to your CISO Kate Powers Burke, Ezra Tanzer Feb 13, 2024 1945 -
Securing next-gen development: Lessons from Trust Bank and TASConnect Gerald Crescione Jun 05, 2024 1312 -
Snyk brings developer-first AppSec approach to C/C++ Roy Ram, Neha Shenoy Apr 04, 2023 1094 -
The persistent threat: Why major vulnerabilities like Log4Shell and Spring4Shell remain significant Brian Vermeer Aug 29, 2024 1000 -
DevSecOps lifecycle coverage with new Snyk and Dynatrace app Sarah Conway May 15, 2023 507 -
How Snyk ensures safe adoption of AI Akanchha Shrivastava Mar 27, 2024 1534 -
Signing container images: Comparing Sigstore, Notary, and Docker Content Trust Hrittik Roy Sep 26, 2023 3098 -
Real-time threat protection with Snyk and SentinelOne Shivam Jindal Nov 09, 2023 679 -
Secure JavaScript URL validation Mannan Tirmizi May 09, 2023 1940 6
Using JLink to create smaller Docker images for your Spring Boot Java application Brian Vermeer Aug 24, 2023 1499 -
Adding Snyk security to Jira and Bitbucket Cloud LaToya Muff Oct 25, 2023 647 -
Preventing Cross-Site Scripting (XSS) in Java applications with Snyk Code Brian Vermeer Apr 25, 2023 1523 -
SocketSleuth: Improving security testing for WebSocket applications Elliot Ward Sep 06, 2023 843 -
AI-generated security fixes in Snyk Code now available Jim Armstrong May 09, 2023 823 -
Snyk named to CNBC 2023 Disruptor 50 List Peter McKay May 09, 2023 311 -
Navigating the AI-powered development era in financial services Lawrence Crowther Aug 26, 2024 826 -
Achieving developer security adoption at Nylas with Snyk Erin Cullen Dec 04, 2023 762 -
Top 5 security concerns for infrastructure as code Raphael Mun Jul 14, 2023 1565 -
8 tips for securing your CI/CD pipeline with Snyk Eric Smalling Jul 20, 2023 3928 -
Timing out synchronous functions with regex Steve Shani Apr 06, 2023 1071 -
How Okta empowers devs to find & fix security issues with Snyk Mariah Gresham Aug 25, 2023 958 -
7 tips to become a successful bug bounty hunter Ben Sadeghipour Jan 25, 2024 1246 -
Nine Docker pro tips for Node.js developers Liran Tal Apr 11, 2024 1630 -
Announcing IaC+ early access: Secure your infrastructure configurations across the SDLC Lauren Place Oct 03, 2023 686 -
How to generate an SBOM for JavaScript and Node.js applications Liran Tal May 22, 2023 2795 -
Build and deploy a Node.js security scanning API to Platformatic Cloud Liran Tal Jan 05, 2024 2980 -
Buildkit GRPC SecurityMode privilege check: Build-time container breakout (CVE-2024-23653) Rory McNamara Jan 31, 2024 946 -
What does Biden's Executive Order on AI safety measures mean for businesses? Liqian Lim (林利蒨) Nov 02, 2023 2399 -
Kroger’s approach to supply chain security Brian Piper Jan 02, 2024 888 -
AppSec spring cleaning checklist Mariah Gresham May 13, 2024 783 -
Welcoming Diana Brunelle: Snyk’s New Chief People Officer Peter McKay Jul 22, 2024 336 -
Installing and managing Java on macOS Keshav Malik Oct 12, 2023 1464 -
The importance of verifying webhook signatures Marcelo Oliveira Jun 29, 2023 1829 -
Three ways Snyk made software supply chains more secure in 2022 Jamie Smith Jan 12, 2023 1390 -
Rego 102: Combining queries with AND/OR and custom messages Jasper Van der Jeugt, Becki Lee Nov 09, 2023 2514 -
Best practices for building a production-ready Dockerfile for PHP applications James Walker Aug 22, 2023 2507 -
A guide to input validation with Spring Boot Lucien Chemaly Sep 12, 2023 2751 -
What’s new in CVSS 4.0 Paul Lascar Nov 08, 2023 1679 -
GitHub “besieged” by malware repositories and repo confusion: Why you'll be ok Liran Tal Mar 12, 2024 2102 -
Snyk Code’s autofixing feature, DeepCode AI Fix, just got better Eric Fernandez, Berkay Berabi Apr 23, 2024 2452 -
5 tips for adopting AI code assistance securely Liqian Lim (林利蒨) May 30, 2024 856 -
Abusing Ubuntu 24.04 features for root privilege escalation Rory McNamara Sep 09, 2024 5975 189
Snyk's AppSec dream team Krysta Williams-Timm Mar 19, 2024 843 -
Limitations of a single AI model Frank Fischer Aug 07, 2023 1401 -
Automate security controls from development to production on Google Cloud David Lugo Jun 18, 2024 1073 -
My internship journey at Snyk Caroline Gow Feb 16, 2023 1329 -
Copilot amplifies insecure codebases by replicating vulnerabilities in your projects Randall Degges Feb 22, 2024 1578 -
Snyk Partner Speak video series with HashiCorp Sarah Conway Oct 04, 2023 180 -
10 Dimensions of Python Static Analysis Liran Tal Jul 17, 2024 4861 -
A security expert’s view on Gartner’s generative AI insights - Part 2 Liqian Lim (林利蒨) Aug 08, 2024 1231 -
High severity vulnerability found in libcurl and curl (CVE-2023-38545) Hadas Bloom Oct 04, 2023 1104 -
Improved risk assessment with EPSS scores in Snyk Daniel Berman May 22, 2023 1297 -
Node.js vs. Deno vs. Bun: JavaScript runtime comparison James Konik Sep 05, 2023 2966 -
Rego 101: Introduction to Rego Becki Lee Nov 02, 2023 2503 -
Why ASPM is the future of AppSec: Key points from our newest whitepaper Sarah Conway Jun 18, 2024 1177 -
Exploring WebExtension security vulnerabilities in React Developer Tools and Vue.js devtools Calum Hutton Nov 27, 2023 1511 -
7 AppSec tips from Snowflake’s Director of Product Security Brian Piper Aug 31, 2023 850 -
Breaking caches and bypassing Istio RBAC with HTTP response header injection Rory McNamara Jun 20, 2024 2498 -
How to choose a security tool for your AI-generated code Liqian Lim (林利蒨) Jan 09, 2024 1774 -
File encryption in Python: An in-depth exploration of symmetric and asymmetric techniques Keshav Malik Nov 22, 2023 2132 -
How to Dockerize a PHP application securely James Olaogun Aug 02, 2023 2389 1
Best practices for effective attack surface analysis Benson Kuria Macharia Jul 18, 2023 1659 -
Secure password hashing in Go Love Bhardwaj Dec 05, 2023 3088 -
New IaC security workshop from Snyk, HashiCorp, and AWS at KubeCon Europe 2023 and on-demand Sarah Conway Apr 10, 2023 1035 -
Snyk is your security companion for Amazon CodeWhisperer Liqian Lim (林利蒨) Nov 29, 2023 1817 -
6 steps for scaling risk-based AppSec programs Julia Kraut Oct 13, 2023 938 -
Power up security collaboration with Snyk and Slack Sarah Conway Oct 23, 2023 271 -
Exploiting HTTP/2 CONTINUATION frames for DoS attacks Vandana Verma Sehgal Apr 08, 2024 696 -
Repo Jacking: The Great Source-code Swindle Elliot Ward Jul 25, 2024 2516 -
Security implications of cross-origin resource sharing (CORS) in Node.js Victor Ikechukwu Sep 13, 2023 2582 -
Snyk highlights AWS re:Invent 2023 David Lugo Dec 14, 2023 820 -
The Snyk Perpetual Key Rotation Machine Megan Moore Apr 01, 2023 1000 -
Developer-centric DAST with Bright Security Vitaly Unic Apr 14, 2023 1496 -
Embrace your next cybersecurity career with The Big Fix Liran Tal Feb 22, 2023 692 -
The XZ backdoor CVE-2024-3094 Liran Tal Mar 31, 2024 1800 -
How Snyk can help secure supply chains per "A Guide to Implementing the Software Bill of Materials (SBOM) for Software Management"’ by Japan's METI Hiroko Nakano Aug 01, 2023 566 -
Patches of Pride: Love, inclusivity, & cute pets in celebration of Pride month Ashley Ladd Jun 20, 2023 463 -
Snyk's AppSec journey in 2022 Jason Lane Jan 11, 2023 1554 -
Bolstering Snyk's developer security platform in 2022 Daniel Berman Jan 09, 2023 2059 -
Snyk integrates with AWS CloudTrail Lake to simplify security audits David Lugo Feb 01, 2023 551 -
Fastify plugins as building blocks for a backend Node.js API Liran Tal May 28, 2024 2479 -
Snyk scanning capabilities are now embedded in Jira Software Sarah Conway Jun 06, 2023 658 -
InCyber Forum Europe recap: 4 tips from DevSecOps experts Nina McClure Aug 14, 2024 1217 -
Snyk Week of Impact 2023: A week of meaningful contributions and community engagement Bianca Matei Nov 08, 2023 567 -
SnykLaunch recap: Custom Base Image Recommendations Jamie Smith Apr 04, 2023 1133 -
Demystifying the AWS shared security responsibility model David Lugo Nov 13, 2023 1004 -
Mitigating path traversal vulns in Java with Snyk Code Brian Vermeer Mar 06, 2023 1044 2
How to integrate ASPM with your application security program Vandana Verma Sehgal Nov 28, 2023 1258 -
Top considerations for addressing risks in the OWASP Top 10 for LLMs Simon Maple Sep 07, 2023 3135 -
Swift deserialization security primer Sam Sanoop Jul 18, 2023 1155 -
Implementing TLS in Kubernetes Rubaiat Hossain Jul 31, 2023 2063 -
How to secure a REST API? Liran Tal Jun 27, 2024 2768 -
Getting started with query parameterization Mary Gathoni Oct 24, 2023 2337 -
Finding and fixing insecure direct object references in Python Keshav Malik Jul 19, 2023 1509 -
Preventing SQL injection in C# with Entity Framework Brian Vermeer Jul 30, 2024 1273 -
Securing the web (forward) Daniel Appelquist Mar 27, 2023 1233 -
Snyk AppRisk Pro: A holistic approach to application risk management Daniel Berman May 01, 2024 1597 -
Secure AI tool adoption: Perceptions and realities Alex Salkever Jun 04, 2024 733 -
Building Vue 3 components with Tailwind CSS Mary Gathoni Feb 21, 2023 2017 -
Automatic source locations with Rego Jasper Van der Jeugt Feb 12, 2024 2614 -
New year ushers in new wave of Snyk Technology Alliance Partner Program members Sarah Conway Jan 12, 2023 444 -
4 AI coding risks and how to address them Liqian Lim (林利蒨) Jun 13, 2024 1200 -
Why “vulnerability management” falls short in modern application security Daniel Berman Jun 13, 2024 988 -
Leaky Vessels deep dive: Escaping from Docker one syscall at a time Rory McNamara Feb 06, 2024 10279 4
Critical WebP 0-day security CVE-2023-4863 impacts wider software ecosystem Brian Clark, Eric Smalling, Jonathan Moses Sep 28, 2023 1825 -
OSPO security evolution: The Kübler-Ross Model of open source Dan Appelquist Jan 12, 2023 783 -
Snyk integrates with Amazon EventBridge to enable secure AppDev at scale David Lugo Jun 12, 2023 735 -
Snyk Fetch the Flag CTF 2023 writeup: Silent Cartographer John Hammond Nov 30, 2023 362 -
Application vulnerability management best practices Mariah Gresham Aug 06, 2024 1240 -
Snyk recognized as an Emerging Segment Leader in Application Security in Snowflake's Next Generation of Cybersecurity Applications report LaToya Muff Dec 11, 2023 658 -
Gitpod remote code execution 0-day vulnerability via WebSockets Elliot Ward Feb 27, 2023 2121 1
A day in the life of an ethical hacker Sonya Moisset Jun 05, 2023 2679 -
How to prevent open redirect vulnerabilities in Laravel Kevin Kimani Dec 27, 2023 1696 -
Find and fix HTTP/2 rapid reset zero-day vulnerability CVE-2023-44487 Jamie Smith, Kriti Dogra, Anthony Larkin Oct 11, 2023 1225 -
Six takeaways from our ASPM masterclass series Erin Cullen Apr 10, 2024 1110 -
Snyk transformed cloud security in 2022 with developer-first solution Lauren Place Jan 11, 2023 1211 -
Snyk Fetch the Flag CTF 2023 writeup: Off the SETUID Carlos Polop Nov 30, 2023 1710 -
Three expert tips for cultivating secure software development practices Simon Maple Mar 01, 2023 896 -
Node.js multithreading with worker threads: pros and cons James Walker Feb 27, 2023 2120 2
Code injection in Python: examples and prevention Lucien Chemaly Dec 06, 2023 1807 -
PulseMeter Report: Software supply chains Erin Cullen Mar 21, 2023 708 -
4 best practices for cultivating developer security adoption Erin Cullen Apr 20, 2023 897 -
A stepping stone towards holistic application risk and compliance management of the Digital Operational Resiliency Act (DORA) Ben Desjardins Jul 11, 2024 1834 -
Top 5 VS Code extensions for security Brian Clark Aug 24, 2023 1654 -
Celebrating Juneteenth at Snyk Sherica Bryan Jun 16, 2023 858 -
Vulnerabilities in NodeJS C/C++ add-on extensions Alessio Della Libera Aug 14, 2024 2808 -
Fix cloud security issues faster and at the source with Snyk IaC Anthony Larkin Apr 04, 2023 632 -
Improving the UI/UX of the Snyk VS Code extension Andy Gongea Nov 21, 2023 702 -
Snyk Learn now aligns with the NIST NICE Workforce Framework Michael Biocchi Jun 07, 2023 471 -
Common SAML vulnerabilities and how to remediate them Sam Sanoop Dec 19, 2023 966 -
The Secure Developer: Security champions recap Sam Hepburn Jun 14, 2023 1365 -
What can you do with an enriched SBOM? A parlay quickstart guide Gareth Rushgrove Jun 07, 2023 1077 -
Snyk named a Leader in 2023 Gartner® Magic Quadrant™ for Application Security Testing Manoj Nair May 23, 2023 949 -
Preventing server-side request forgery in Node.js applications David Ekete Feb 20, 2024 1759 -
Symmetric vs. asymmetric encryption: Practical Python examples Josh Amata May 15, 2024 4010 -
Snyk named a 2023 Gartner Peer Insights™ Customers’ Choice for Application Security Testing Ciana Abdollahian Dec 04, 2023 622 -
Preventing broken access control in express Node.js applications Ben Smitthimedhin May 22, 2024 2923 -
The SecurityManager is getting removed in Java: What that means for you Mdu Sibisi Jun 15, 2023 2238 -
Building an npm package compatible with ESM and CJS in 2024 Liran Tal Apr 18, 2024 1082 -
Extend the power of your AppSec data with the new Snyk and Snowflake integration Guy Plotnik Aug 06, 2024 1095 -
Vulnerability disclosure: Which comes first, the security bug in PHP or the CVE? Liran Tal Dec 19, 2023 841 -
Snyk sponsors Snowflake Summit LaToya Muff Jun 04, 2024 569 -
An investigation into code injection vulnerabilities caused by generative AI Jack Hair Apr 16, 2024 983 -
Lessons from OpenSSL vulnerabilities part 1: Preparing your supply chain for the next critical vulnerability Jamie Smith Apr 19, 2023 1133 -
Manage security issues in Jira with Snyk Security in Jira Cloud LaToya Muff Aug 09, 2023 330 -
Lessons from OpenSSL vulnerabilities part 2: Finding and fixing supply chain vulnerabilities Jamie Smith Apr 26, 2023 1977 -
5 tips to supercharge app security from code to cloud Sonya Moisset Aug 08, 2023 2759 -
The dangers of setattr: Avoiding Mass Assignment vulnerabilities in Python Jack Hair Feb 15, 2023 1334 -
Buildkit mount cache race: Build-time race condition container breakout (CVE-2024-23651) Rory McNamara Jan 31, 2024 1022 -
XS leaks: What they are and how to avoid them Gino Diño Jul 17, 2023 2287 1
SAS and Snyk discuss the future of AI for development and security teams Brian Piper Oct 09, 2023 848 -
Suspicious Maintainer Unveils Threads of npm Supply Chain Attack Liran Tal Jul 16, 2024 1524 -
New Year's security resolutions for 2024 from Snyk DevRel, SecRel, and friends Micah Silverman Jan 18, 2024 1188 -
Buildkit build-time container teardown arbitrary delete (CVE-2024-23652) Rory McNamara Jan 31, 2024 879 -
What you should know about PHP code security Liran Tal Sep 04, 2024 1773 -
Secure your software supply chain with the new Snyk Vulnerability Intelligence for SBOM ServiceNow integration Sarah Conway Nov 07, 2023 531 -
Snyk documentation: Our journey so far David Bailey Feb 29, 2024 978 -
Snyk and ServiceNow collaborate on new SBOM solution Sarah Conway May 16, 2023 470 -
Agent hijacking: The true impact of prompt injection attacks Elliot Ward, Rory McNamara, Mateo Rojas-Carulla, Sam Watts, Eric Allen Aug 28, 2024 2758 -
Mimic your mental model with Project Collections Waleed Arshad Jun 27, 2023 745 -
Rego 103: Types of values and rules Jasper Van der Jeugt, Becki Lee Nov 16, 2023 3425 -
Introducing new Snyk AppRisk integrations: Enhancing application risk management with development context Daniel Berman Aug 01, 2024 890 -
Understanding Kubernetes Pod Security Standards Gino Diño Jun 20, 2023 1389 -
Avoiding mass assignment vulnerabilities in Node.js Benson Kuria Macharia Mar 28, 2023 2321 -
Snyk Fetch the Flag CTF 2023 writeup: Honey Baked Messages John Hammond Nov 30, 2023 298 -
Essential Node.js backend examples for developers in 2024 Liran Tal Jun 12, 2024 2643 -
A developer’s best friend: Lessons learned from our canine companions about AI code security Krysta Williams-Timm Aug 26, 2024 803 -
Preventing XSS in Django Liran Tal Mar 13, 2023 1932 -
Snyk Code now secures AI builds with support for LLM sources Liqian Lim (林利蒨), Ranko Cupovic Jun 25, 2024 571 -
Announcing Insights: Helping you focus on top risks for your organization Daniel Berman Jun 07, 2023 1737 -
Priorities from the OpenSSF Secure Open Source Software Summit 2023 Dan Appelquist Oct 04, 2023 381 -
Introducing the Snyk Partner Solutions Directory for discovering Snyk technology integrations Cara Sampson Apr 03, 2023 996 -
Snyk’s Evolution: A Message From CEO Peter McKay Peter McKay Apr 13, 2023 549 -
How to install Java on macOS Liran Tal Apr 17, 2024 2820 -
CISO playbook: 3 things to consider when establishing a security culture Simon Maple Mar 09, 2023 1249 -
GitHub Copilot code security: XSS in React Liran Tal Oct 19, 2023 2044 -
Security success in the Bay Area with Slack Mariah Gresham May 17, 2023 878 -
How to setup Deno Dev Container on GitHub Codespaces? Liran Tal Jul 18, 2024 2097 -
Command injection in Python: examples and prevention Rubaiat Hossain Dec 21, 2023 2558 -
How to avoid web cache poisoning attacks Najia Gul Sep 11, 2023 2155 -
How to secure Python Flask applications Gourav Singh Bais May 21, 2024 4209 -
Fetch the Flag CTF 2023 sneak peek Danielle Bradford Sep 06, 2023 187 -
A DevSecOps solution for your apps on AWS from Snyk David Lugo Nov 28, 2023 900 -
Snyk named as a top cybersecurity company in inaugural Fortune Cyber 60 2023 list Snyk Team Dec 18, 2023 337 -
Security vs. Development: A game of priorities Andrew MacKenzie Nov 06, 2023 1009 -
Identifying Insecure C Code with Valgrind and Fixing with Snyk Code Liran Tal Sep 24, 2024 1373 -
Meet the new host for The Secure Developer podcast Mariah Gresham May 09, 2024 469 -
How to mitigate security issues in GenAI code and LLM integrations Liran Tal Sep 11, 2024 2394 -
Announcing new Snyk AppRisk integration with Orca Security Daniel Berman Sep 11, 2024 809 -
Want to avoid a data breach? Employ secrets detection Liran Tal Sep 16, 2024 2539 -
Promise queues and batching concurrent tasks in Deno Liran Tal Sep 25, 2024 3378 -
5 reasons why developers at FinServ institutions are outpacing their security teammates Katie DeMatteis Sep 09, 2024 822 -
Dive into AI and LLM learning with the new Snyk Learn learning path Michael Biocchi Sep 18, 2024 310 -
Welcoming Gary Olson: Snyk’s new Chief Revenue Officer Peter McKay Mar 04, 2024 444 -
How SAS secures their AI-generated code Gerald Crescione Apr 15, 2024 1874 -
The journey to AppSec gold: Lessons we can learn from the Olympians Krysta Williams-Timm Aug 15, 2024 714 -
3 best practices to make the most of Snyk AppRisk Essentials Daniel Berman Sep 19, 2024 1801 -
Infosec Europe session: 4 tips for safer AI adoption Gerald Crescione Aug 01, 2024 1103 -
How to prevent log injection vulnerability in JavaScript and Node.js applications Liran Tal Sep 26, 2024 1504 -
Meet Snyk for Government: Our developer security solution with FedRAMP ATO Danny Allan Sep 17, 2024 502 -
Zero-day RCE vulnerability found in CUPS - Common UNIX Printing System Jim Armstrong Sep 27, 2024 1224 -
Going beyond reachability to prioritize what matters most Jamie Smith Oct 01, 2024 1149 -
Proactive AppSec continuous vulnerability management for developers and security teams Liran Tal Oct 02, 2024 1804 -
Snyk named a 2024 Gartner Peer Insights™ Customers’ Choice for Application Security Testing for the 3rd consecutive year Nina McClure Oct 02, 2024 723 -
The mysterious supply chain concern of string-width-cjs npm package Liran Tal Oct 03, 2024 1455 -
SnykLaunch Oct 2024: Enhanced PR experience, extended visibility, AI-powered security, holistic risk management Anthony Larkin Oct 08, 2024 1489 -
A look into your engineering interview at Snyk Philip Beevers Oct 09, 2024 750 -
Foundations of trust: Securing the future of AI-generated code Danny Allan Oct 10, 2024 888 -
Analyze Taint Analysis Faster with Improved Contextual Dataflow in Snyk Code Liran Tal Oct 10, 2024 875 -
Automatically fix code vulnerabilities with AI Micah Silverman Oct 14, 2024 1132 -
How Snyk is prioritizing developer experience Anthony Larkin Oct 16, 2024 860 -
Snyk announces commitment to Service for America, bringing security education access to all Michael Biocchi Oct 17, 2024 394 -
Ensuring comprehensive security testing in DevOps pipelines Jim Armstrong Oct 17, 2024 1317 -
Introducing: Extensive AppSec visibility with Snyk Analytics Nastasha Casale Oct 17, 2024 952 -
Elevating Views of Risk: Holistic Application Risk Management with Snyk Daniel Berman Oct 22, 2024 1601 -
Women - Kickstart your Application Security Career! Vandana Verma Sehgal Oct 22, 2024 1020 -
Find, auto-fix, and prioritize intelligently, with Snyk's AI-powered code security tools Liqian Lim (林利蒨) Oct 24, 2024 2083 -
Vulnerability-Free C and C++ Development in Automotive Manufacturing and Software Defined Vehicles (SDV) Liran Tal Oct 23, 2024 1469 -
Best Practices for Continuous Vulnerability Management Liran Tal Oct 29, 2024 1698 -
Top 5 SAST Auto-fixing Tools and How They Compare Liqian Lim (林利蒨) Oct 29, 2024 966 -
Lottie Player npm package compromised for crypto wallet theft Liran Tal Oct 31, 2024 825 2
If you don’t know about HTTP Archive’s Web Almanac yet, you should! Brian Clark Nov 01, 2024 710 -
Snyk Recharge days: Making time to take time Adriana Bokel Herde May 17, 2023 710 -
GitFlops: The Dangers of Terraform Automation Platforms Elliot Ward Nov 07, 2024 1831 -
Extending Developer Security with Dev-First Dynamic Testing Manoj Nair Nov 12, 2024 1565 -
How ASPM boosts visibility to manage application risk Daniel Berman Nov 12, 2024 1144 -
Understanding command injection vulnerabilities in Go Liran Tal Nov 14, 2024 1891 1
Snyk named a Customer Favorite in The Forrester Wave™: Software Composition Analysis Software, Q4 2024 Report Peter McKay Nov 13, 2024 460 -
An Introduction to capture the flag Sonya Moisset Sep 13, 2023 828 -
Women in security: Inspiring leaders of today and tomorrow Jonaki Egenolf Nov 19, 2024 433 -
How to prioritize vulnerabilities based on risk Daniel Berman Nov 19, 2024 1153 -
A commitment to future generations: Snyk’s 2024 Student Edition Capture The Flag Recap Michael Biocchi Nov 21, 2024 332 -
Why a solid DevOps foundation is vital for effective DevSecOps Ben Desjardins Nov 27, 2024 1117 -
Measuring AppSec success: Key KPIs that demonstrate value Daniel Berman Nov 26, 2024 1479 -
Seven steps to close coverage gaps with ASPM Daniel Berman Dec 03, 2024 1023 -
2024 Open Source Security Report: Slowing Progress and New Challenges for DevSecOps Jamie Smith Dec 03, 2024 973 -
Empowering women in security: The impact of mentorship Erin Cullen Nov 27, 2024 696 -
Snyk-generated SBOMs now include license details for the open source libraries in your projects Jamie Smith Dec 09, 2024 906 -
How to mitigate SSRF vulnerabilities in Go Liran Tal Dec 10, 2024 910 -
Snyk’s risk-based approach to prioritization Daniel Berman Dec 11, 2024 1082 -
Ultralytics AI Pwn Request Supply Chain Attack Stephen Thoemmes Dec 11, 2024 1375 -
Vulnerability vs Weakness: Understanding Key Differences in AppSec Daniel Berman Nov 17, 2023 1934 -
Ethical Hacking: Top Tools Vandana Verma Sehgal Jun 01, 2023 1601 -
The 4 best DevSecOps tools for a secure DevOps workflow Liran Tal Jan 23, 2024 1583 -
Essential AI Tools to Boost Developer Productivity and Security Liqian Lim (林利蒨) Mar 01, 2024 1385 -
4 Advantages of using AI code review Rory McNamara Nov 29, 2023 1152 -
Unlocking the power of multi-cloud security Vandana Verma Sehgal Apr 25, 2023 1147 -
Supply Chain Security Risks & Best Practice Liran Tal Apr 04, 2023 1102 -
How to implement DevSecOps in 4 steps Jamie Smith Jun 22, 2023 1316 -
Software Supply Chain Security Tools: Types, Features & Considerations Jamie Smith Aug 02, 2023 1306 -
Developer-first supply chain security Jamie Smith Sep 19, 2023 1330 -
Asset-first application security: What is it and how can it help Daniel Berman Nov 03, 2023 1156 -
Defense in Depth Daniel Berman Feb 29, 2024 1430 -
Top AWS Security Risks & Prevention Rory McNamara Mar 02, 2023 1256 -
Secrets Management: Tools & Best Practice Jamie Smith Jun 26, 2023 1318 -
Product Security vs. Application Security: What’s the Difference? Rory McNamara Jul 21, 2023 1390 -
4 Enterprise-level security best practices Manoj Nair Jul 20, 2023 617 -
AppSec Maturity Models Rory McNamara Mar 08, 2024 1120 -
Cybersecurity Hygiene 101 Liran Tal Mar 02, 2023 1594 -
High profile AWS breaches & how to avoid them Jamie Smith Jun 07, 2023 1197 -
API Security Guide Liran Tal Apr 25, 2023 1338 -
Did you make the *security* naughty or nice list this year? Mariah Gresham Dec 18, 2024 590 -
4 tips for securing GenAI-assisted development Sarah Conway Dec 18, 2024 859 -
New year, new security goals: Improve your AppSec in 2025 Mariah Gresham Jan 01, 2025 729 -
Securing the Digital Future: AppSec Best Practices in Digital Banking Hiroko Nakano Jan 06, 2025 587 -
Securing GenAI Development with Snyk Liqian Lim (林利蒨) Jan 09, 2025 697 -
Snyk Recognized as Trusted Partner and Innovator by JPMorganChase Ken Mellert Jan 14, 2025 294 -
BFI’s Journey in Digital Transformation: A Fireside Chat on Elevating Application Security and Developer Experience Hiroko Nakano Jan 15, 2025 506 -
Snyk Security Labs Testing Update: Cursor.com AI Code Editor Danny Allan Jan 14, 2025 688 6
Understanding the EU’s Cyber Resilience Act (CRA) Ben Desjardins Jan 22, 2025 1105 -
Sneak Peek into Fetch the Flag CTF 2025 Gina Fitzpatrick Jan 21, 2025 293 -
Reviving DevSecOps: How Snyk’s new framework builds trust and collaboration Ben Desjardins Jan 23, 2025 793 -