180 blog posts published by month since the start of 2024. Start from a different year:

Blog URL
Posts year-to-date
9 (16 posts by this month last year.)
Average posts per month since 2024
7.5

Post details (2024 to today)

Title Author Date Word count HN points
Snyk users don't have to worry about NVD delays Hadas Bloom Mar 13, 2024 734 -
Snyk welcomes Helios, accelerating our ASPM vision with runtime insights Manoj Nair Jan 16, 2024 874 -
Four easy ways to analyze your Java and Kotlin code Brian Vermeer Aug 13, 2024 1982 -
DevOpsDays Singapore 2024: Unmasking the security pitfalls in AI-generated code Hiroko Nakano Apr 23, 2024 562 -
3 tips from Snyk and Dynatrace’s AI security experts Sarah Conway Jan 22, 2024 905 -
Snyk Code, the only security tool chosen by developers in Stack Overflow's 2024 AI Search and Developer Tools survey Liqian Lim (林利蒨) Aug 27, 2024 901 -
The ultimate guide to creating a secure Python package Gourav Singh Bais May 08, 2024 3482 -
Learning from cloud transformation as we move to AI David Lugo May 21, 2024 976 -
How to secure an S3 bucket on AWS? Liran Tal Jul 12, 2024 3393 -
How Axel Springer National Media and Tech achieved continuous security with Snyk Nina McClure Sep 03, 2024 952 -
Krampus delivers an end-of-year Struts vulnerability Micah Silverman Jan 02, 2024 1667 -
3 ways AppSec modernization is a game-changer for financial services Katie DeMatteis Sep 03, 2024 782 -
Leaky Vessels: Docker and runc container breakout vulnerabilities (January 2024) Jamie Smith Jan 31, 2024 1729 41
Introducing Snyk’s partnership with Gemini Code Assist David Lugo Apr 09, 2024 682 -
Day in the life of a food giant CISO Vandana Verma Sehgal Apr 18, 2024 668 -
Snyk & Atlassian: How to embed security in AI-assisted software development LaToya Muff Feb 14, 2024 1030 -
Integrating Snyk Code SAST results in your ServiceNow workflows Sarah Conway May 07, 2024 514 -
With Love, Your Applications Krysta Williams-Timm Feb 14, 2024 373 -
Three trends shaping software supply chain security today Erin Cullen Aug 22, 2024 923 -
AI quality: Garbage in, garbage out Michael Biocchi Jun 11, 2024 730 -
Getting started with PHP static analysis in 2024 Liran Tal Mar 21, 2024 2431 -
Securing your SBOM on Google Cloud David Lugo Mar 28, 2024 983 -
More accurate than GPT-4: How Snyk’s CodeReduce improved the performance of other LLMs Eric Fernandez May 07, 2024 1245 -
360 degrees of application security with Snyk Soumen Mukherjee Apr 24, 2024 1273 -
Creating SBOMs with the Snyk CLI Brian Vermeer Feb 08, 2024 1348 -
Vulnerability: runc process.cwd and leaked fds container breakout (CVE-2024-21626) Rory McNamara Jan 31, 2024 1114 3
Going beyond “shift left” to extend AppSec in all directions Ben Desjardins Jul 09, 2024 968 -
How to build a modern DevSecOps culture: Lessons from Jaguar Land Rover and Asda Brian Piper Feb 21, 2024 1209 -
Integrating the Snyk Language Server with IntelliJ IDEs Arvyd Paeglit Jun 17, 2024 344 -
Polyfill supply chain attack embeds malware in JavaScript CDN assets Liran Tal Jun 26, 2024 1892 -
A security expert’s view on Gartner’s generative AI insights Liqian Lim (林利蒨) Aug 07, 2024 1729 -
Snyk CLI: Introducing Semantic Versioning and release channels Chintan B. Apr 30, 2024 930 -
Call for action: Exploring vulnerabilities in Github Actions Elliot Ward, Rory McNamara, Raul Onitza-Klugman Jun 06, 2024 3977 -
10 modern Node.js runtime features to start using in 2024 Liran Tal May 29, 2024 5030 2
Snyk and AWS announce native Amazon EKS support directly from the AWS Management Console David Lugo Jun 12, 2024 418 -
5 Node.js security code snippets every backend developer should know Liran Tal Feb 28, 2024 3106 -
Introducing the ASPM Masterclass Erin Cullen Mar 12, 2024 504 -
How REI built a DevSecOps culture and how Snyk helped Brian Piper Feb 27, 2024 1154 -
Snyk Learn and the NIST Cybersecurity Framework (CSF) Michael Biocchi Mar 06, 2024 523 -
Understanding and mitigating the Jinja2 XSS vulnerability (CVE-2024-22195) Liran Tal Jan 18, 2024 1059 -
Mastering Python virtual environments: A complete guide to venv, Docker, and securing your code Liran Tal Jan 10, 2024 1589 -
5 security best practices for adopting generative AI code assistants like GitHub Copilot Liqian Lim (林利蒨) Mar 05, 2024 1368 -
A denial of service Regex breaks FastAPI security Liran Tal Jul 31, 2024 1878 -
Talk to us about Snyk CLI Chintan B., Neil Mackay Jun 06, 2024 859 -
How Mulesoft fosters a developer-first, shift-left culture with Snyk Gerald Crescione Apr 30, 2024 798 -
Preventing SQL injection attacks in Node.js Lucien Chemaly Feb 20, 2024 2260 -
Finding and fixing exposed hardcoded secrets in your GitHub project with Snyk Chandler Mayo Jun 25, 2024 902 -
Welcoming Danny Allan and Brian Rogan: Snyk leadership team expands with key appointments to accelerate innovation Peter McKay Feb 06, 2024 492 -
10 GitHub Security Best Practices Brian Vermeer Feb 05, 2024 3532 3
Reporting AppSec risk up to your CISO Kate Powers Burke, Ezra Tanzer Feb 13, 2024 1945 -
Securing next-gen development: Lessons from Trust Bank and TASConnect Gerald Crescione Jun 05, 2024 1312 -
The persistent threat: Why major vulnerabilities like Log4Shell and Spring4Shell remain significant Brian Vermeer Aug 29, 2024 1000 -
How Snyk ensures safe adoption of AI Akanchha Shrivastava Mar 27, 2024 1534 -
Navigating the AI-powered development era in financial services Lawrence Crowther Aug 26, 2024 826 -
7 tips to become a successful bug bounty hunter Ben Sadeghipour Jan 25, 2024 1246 -
Nine Docker pro tips for Node.js developers Liran Tal Apr 11, 2024 1630 -
Build and deploy a Node.js security scanning API to Platformatic Cloud Liran Tal Jan 05, 2024 2980 -
Buildkit GRPC SecurityMode privilege check: Build-time container breakout (CVE-2024-23653) Rory McNamara Jan 31, 2024 946 -
Kroger’s approach to supply chain security Brian Piper Jan 02, 2024 888 -
AppSec spring cleaning checklist Mariah Gresham May 13, 2024 783 -
Welcoming Diana Brunelle: Snyk’s New Chief People Officer Peter McKay Jul 22, 2024 336 -
GitHub “besieged” by malware repositories and repo confusion: Why you'll be ok Liran Tal Mar 12, 2024 2102 -
Snyk Code’s autofixing feature, DeepCode AI Fix, just got better Eric Fernandez, Berkay Berabi Apr 23, 2024 2452 -
5 tips for adopting AI code assistance securely Liqian Lim (林利蒨) May 30, 2024 856 -
Abusing Ubuntu 24.04 features for root privilege escalation Rory McNamara Sep 09, 2024 5975 189
Snyk's AppSec dream team Krysta Williams-Timm Mar 19, 2024 843 -
Automate security controls from development to production on Google Cloud David Lugo Jun 18, 2024 1073 -
Copilot amplifies insecure codebases by replicating vulnerabilities in your projects Randall Degges Feb 22, 2024 1578 -
10 Dimensions of Python Static Analysis Liran Tal Jul 17, 2024 4861 -
A security expert’s view on Gartner’s generative AI insights - Part 2 Liqian Lim (林利蒨) Aug 08, 2024 1231 -
Why ASPM is the future of AppSec: Key points from our newest whitepaper Sarah Conway Jun 18, 2024 1177 -
Breaking caches and bypassing Istio RBAC with HTTP response header injection Rory McNamara Jun 20, 2024 2498 -
How to choose a security tool for your AI-generated code Liqian Lim (林利蒨) Jan 09, 2024 1774 -
Exploiting HTTP/2 CONTINUATION frames for DoS attacks Vandana Verma Sehgal Apr 08, 2024 696 -
Repo Jacking: The Great Source-code Swindle Elliot Ward Jul 25, 2024 2516 -
The XZ backdoor CVE-2024-3094 Liran Tal Mar 31, 2024 1800 -
Fastify plugins as building blocks for a backend Node.js API Liran Tal May 28, 2024 2479 -
InCyber Forum Europe recap: 4 tips from DevSecOps experts Nina McClure Aug 14, 2024 1217 -
How to secure a REST API? Liran Tal Jun 27, 2024 2768 -
Preventing SQL injection in C# with Entity Framework Brian Vermeer Jul 30, 2024 1273 -
Snyk AppRisk Pro: A holistic approach to application risk management Daniel Berman May 01, 2024 1597 -
Secure AI tool adoption: Perceptions and realities Alex Salkever Jun 04, 2024 733 -
Automatic source locations with Rego Jasper Van der Jeugt Feb 12, 2024 2614 -
4 AI coding risks and how to address them Liqian Lim (林利蒨) Jun 13, 2024 1200 -
Why “vulnerability management” falls short in modern application security Daniel Berman Jun 13, 2024 988 -
Leaky Vessels deep dive: Escaping from Docker one syscall at a time Rory McNamara Feb 06, 2024 10279 4
Application vulnerability management best practices Mariah Gresham Aug 06, 2024 1240 -
Six takeaways from our ASPM masterclass series Erin Cullen Apr 10, 2024 1110 -
A stepping stone towards holistic application risk and compliance management of the Digital Operational Resiliency Act (DORA) Ben Desjardins Jul 11, 2024 1834 -
Vulnerabilities in NodeJS C/C++ add-on extensions Alessio Della Libera Aug 14, 2024 2808 -
Preventing server-side request forgery in Node.js applications David Ekete Feb 20, 2024 1759 -
Symmetric vs. asymmetric encryption: Practical Python examples Josh Amata May 15, 2024 4010 -
Preventing broken access control in express Node.js applications Ben Smitthimedhin May 22, 2024 2923 -
Building an npm package compatible with ESM and CJS in 2024 Liran Tal Apr 18, 2024 1082 -
Extend the power of your AppSec data with the new Snyk and Snowflake integration Guy Plotnik Aug 06, 2024 1095 -
Snyk sponsors Snowflake Summit LaToya Muff Jun 04, 2024 569 -
An investigation into code injection vulnerabilities caused by generative AI Jack Hair Apr 16, 2024 983 -
Buildkit mount cache race: Build-time race condition container breakout (CVE-2024-23651) Rory McNamara Jan 31, 2024 1022 -
Suspicious Maintainer Unveils Threads of npm Supply Chain Attack Liran Tal Jul 16, 2024 1524 -
New Year's security resolutions for 2024 from Snyk DevRel, SecRel, and friends Micah Silverman Jan 18, 2024 1188 -
Buildkit build-time container teardown arbitrary delete (CVE-2024-23652) Rory McNamara Jan 31, 2024 879 -
What you should know about PHP code security Liran Tal Sep 04, 2024 1773 -
Snyk documentation: Our journey so far David Bailey Feb 29, 2024 978 -
Agent hijacking: The true impact of prompt injection attacks Elliot Ward, Rory McNamara, Mateo Rojas-Carulla, Sam Watts, Eric Allen Aug 28, 2024 2758 -
Introducing new Snyk AppRisk integrations: Enhancing application risk management with development context Daniel Berman Aug 01, 2024 890 -
Essential Node.js backend examples for developers in 2024 Liran Tal Jun 12, 2024 2643 -
A developer’s best friend: Lessons learned from our canine companions about AI code security Krysta Williams-Timm Aug 26, 2024 803 -
Snyk Code now secures AI builds with support for LLM sources Liqian Lim (林利蒨), Ranko Cupovic Jun 25, 2024 571 -
How to install Java on macOS Liran Tal Apr 17, 2024 2820 -
How to setup Deno Dev Container on GitHub Codespaces? Liran Tal Jul 18, 2024 2097 -
How to secure Python Flask applications Gourav Singh Bais May 21, 2024 4209 -
Identifying Insecure C Code with Valgrind and Fixing with Snyk Code Liran Tal Sep 24, 2024 1373 -
Meet the new host for The Secure Developer podcast Mariah Gresham May 09, 2024 469 -
How to mitigate security issues in GenAI code and LLM integrations Liran Tal Sep 11, 2024 2394 -
Announcing new Snyk AppRisk integration with Orca Security Daniel Berman Sep 11, 2024 809 -
Want to avoid a data breach? Employ secrets detection Liran Tal Sep 16, 2024 2539 -
Promise queues and batching concurrent tasks in Deno Liran Tal Sep 25, 2024 3378 -
5 reasons why developers at FinServ institutions are outpacing their security teammates Katie DeMatteis Sep 09, 2024 822 -
Dive into AI and LLM learning with the new Snyk Learn learning path Michael Biocchi Sep 18, 2024 310 -
Welcoming Gary Olson: Snyk’s new Chief Revenue Officer Peter McKay Mar 04, 2024 444 -
How SAS secures their AI-generated code Gerald Crescione Apr 15, 2024 1874 -
The journey to AppSec gold: Lessons we can learn from the Olympians Krysta Williams-Timm Aug 15, 2024 714 -
3 best practices to make the most of Snyk AppRisk Essentials Daniel Berman Sep 19, 2024 1801 -
Infosec Europe session: 4 tips for safer AI adoption Gerald Crescione Aug 01, 2024 1103 -
How to prevent log injection vulnerability in JavaScript and Node.js applications Liran Tal Sep 26, 2024 1504 -
Meet Snyk for Government: Our developer security solution with FedRAMP ATO Danny Allan Sep 17, 2024 502 -
Zero-day RCE vulnerability found in CUPS - Common UNIX Printing System Jim Armstrong Sep 27, 2024 1224 -
Going beyond reachability to prioritize what matters most Jamie Smith Oct 01, 2024 1149 -
Proactive AppSec continuous vulnerability management for developers and security teams Liran Tal Oct 02, 2024 1804 -
Snyk named a 2024 Gartner Peer Insights™ Customers’ Choice for Application Security Testing for the 3rd consecutive year Nina McClure Oct 02, 2024 723 -
The mysterious supply chain concern of string-width-cjs npm package Liran Tal Oct 03, 2024 1455 -
SnykLaunch Oct 2024: Enhanced PR experience, extended visibility, AI-powered security, holistic risk management Anthony Larkin Oct 08, 2024 1489 -
A look into your engineering interview at Snyk Philip Beevers Oct 09, 2024 750 -
Foundations of trust: Securing the future of AI-generated code Danny Allan Oct 10, 2024 888 -
Analyze Taint Analysis Faster with Improved Contextual Dataflow in Snyk Code Liran Tal Oct 10, 2024 875 -
Automatically fix code vulnerabilities with AI Micah Silverman Oct 14, 2024 1132 -
How Snyk is prioritizing developer experience Anthony Larkin Oct 16, 2024 860 -
Snyk announces commitment to Service for America, bringing security education access to all Michael Biocchi Oct 17, 2024 394 -
Ensuring comprehensive security testing in DevOps pipelines Jim Armstrong Oct 17, 2024 1317 -
Introducing: Extensive AppSec visibility with Snyk Analytics Nastasha Casale Oct 17, 2024 952 -
Elevating Views of Risk: Holistic Application Risk Management with Snyk Daniel Berman Oct 22, 2024 1601 -
Women - Kickstart your Application Security Career! Vandana Verma Sehgal Oct 22, 2024 1020 -
Find, auto-fix, and prioritize intelligently, with Snyk's AI-powered code security tools Liqian Lim (林利蒨) Oct 24, 2024 2083 -
Vulnerability-Free C and C++ Development in Automotive Manufacturing and Software Defined Vehicles (SDV) Liran Tal Oct 23, 2024 1469 -
Best Practices for Continuous Vulnerability Management Liran Tal Oct 29, 2024 1698 -
Top 5 SAST Auto-fixing Tools and How They Compare Liqian Lim (林利蒨) Oct 29, 2024 966 -
Lottie Player npm package compromised for crypto wallet theft Liran Tal Oct 31, 2024 825 2
If you don’t know about HTTP Archive’s Web Almanac yet, you should! Brian Clark Nov 01, 2024 710 -
GitFlops: The Dangers of Terraform Automation Platforms Elliot Ward Nov 07, 2024 1831 -
Extending Developer Security with Dev-First Dynamic Testing Manoj Nair Nov 12, 2024 1565 -
How ASPM boosts visibility to manage application risk Daniel Berman Nov 12, 2024 1144 -
Understanding command injection vulnerabilities in Go Liran Tal Nov 14, 2024 1891 1
Snyk named a Customer Favorite in The Forrester Wave™: Software Composition Analysis Software, Q4 2024 Report Peter McKay Nov 13, 2024 460 -
Women in security: Inspiring leaders of today and tomorrow Jonaki Egenolf Nov 19, 2024 433 -
How to prioritize vulnerabilities based on risk Daniel Berman Nov 19, 2024 1153 -
A commitment to future generations: Snyk’s 2024 Student Edition Capture The Flag Recap Michael Biocchi Nov 21, 2024 332 -
Why a solid DevOps foundation is vital for effective DevSecOps Ben Desjardins Nov 27, 2024 1117 -
Measuring AppSec success: Key KPIs that demonstrate value Daniel Berman Nov 26, 2024 1479 -
Seven steps to close coverage gaps with ASPM Daniel Berman Dec 03, 2024 1023 -
2024 Open Source Security Report: Slowing Progress and New Challenges for DevSecOps Jamie Smith Dec 03, 2024 973 -
Empowering women in security: The impact of mentorship Erin Cullen Nov 27, 2024 696 -
Snyk-generated SBOMs now include license details for the open source libraries in your projects Jamie Smith Dec 09, 2024 906 -
How to mitigate SSRF vulnerabilities in Go Liran Tal Dec 10, 2024 910 -
Snyk’s risk-based approach to prioritization Daniel Berman Dec 11, 2024 1082 -
Ultralytics AI Pwn Request Supply Chain Attack Stephen Thoemmes Dec 11, 2024 1375 -
The 4 best DevSecOps tools for a secure DevOps workflow Liran Tal Jan 23, 2024 1583 -
Essential AI Tools to Boost Developer Productivity and Security Liqian Lim (林利蒨) Mar 01, 2024 1385 -
Defense in Depth Daniel Berman Feb 29, 2024 1430 -
AppSec Maturity Models Rory McNamara Mar 08, 2024 1120 -
Did you make the *security* naughty or nice list this year? Mariah Gresham Dec 18, 2024 590 -
4 tips for securing GenAI-assisted development Sarah Conway Dec 18, 2024 859 -
New year, new security goals: Improve your AppSec in 2025 Mariah Gresham Jan 01, 2025 729 -
Securing the Digital Future: AppSec Best Practices in Digital Banking Hiroko Nakano Jan 06, 2025 587 -
Securing GenAI Development with Snyk Liqian Lim (林利蒨) Jan 09, 2025 697 -
Snyk Recognized as Trusted Partner and Innovator by JPMorganChase Ken Mellert Jan 14, 2025 294 -
BFI’s Journey in Digital Transformation: A Fireside Chat on Elevating Application Security and Developer Experience Hiroko Nakano Jan 15, 2025 506 -
Snyk Security Labs Testing Update: Cursor.com AI Code Editor Danny Allan Jan 14, 2025 688 6
Understanding the EU’s Cyber Resilience Act (CRA) Ben Desjardins Jan 22, 2025 1105 -
Sneak Peek into Fetch the Flag CTF 2025 Gina Fitzpatrick Jan 21, 2025 293 -
Reviving DevSecOps: How Snyk’s new framework builds trust and collaboration Ben Desjardins Jan 23, 2025 793 -