Snyk

Founded in 2015. Privately Held.

External links: homepage | docs | blog | jobs | youtube | twitter | linkedin

Security analysis and vulnerability mitigation.

Blog content published by word count

Switch to post count

Blog content

post title author published words HN
Snyk in 30: Developer-first security democast Jim Armstrong Mar. 02, 2023 1538 -
Demystifying HTTP request smuggling - Jun. 30, 2020 2721 3
Announcing the 2022 State of Open Source Security report from Snyk and the Linux Foundation Megan Moore Jun. 21, 2022 558 -
How to successfully roll out developer-first license compliance Guy Podjarny Apr. 23, 2020 1366 -
New OpenSSL critical vulnerability: What you need to know Vandana Verma Sehgal Oct. 31, 2022 1282 2
Welcoming Samantha Wessels: Snyk’s New Vice President, EMEA Sales Dino DiMarino Jan. 10, 2022 409 -
Snyk - Your Next Career Move! Liran Tal Jan. 04, 2019 870 -
SnykCon Day One wrap-up: Snyk Code, carbon neutrality & session highlights Ravi Maira Oct. 22, 2020 1319 -
SnykCon 2021 recap #2: Supply chain security, the future of cybersecurity, automation as an enabler, and more Simon Maple Oct. 08, 2021 1802 -
Snyk participates in Atlassian Remote Summit and limited-time Bitbucket Cloud promotion Sarah Conway Apr. 01, 2020 291 -
Modern VS Code extension development: The basics Mdu Sibisi Sep. 14, 2023 2775 -
What kind of (security) dog are you? Belyn Lai Aug. 25, 2023 756 -
Mitigating DOM clobbering attacks in JavaScript Keshav Malik Aug. 07, 2023 1806 -
Lessons learned from improving full-text search at Snyk with Elasticsearch Sergey Vasilkov Nov. 04, 2021 1747 -
Improving coverage of cloud resources to reduce infrastructure drift Stephane Jourdan Mar. 23, 2022 2878 -
CodeSecDays conference and more complete security coverage with GitGuardian Sarah Conway Aug. 10, 2023 989 -
How Snyk is normalizing authentication strategies with Gloo Edge Joakim Bajoul Kakaei Jul. 20, 2021 1490 -
Uncharted territory - discovering vulnerabilities in public Helm Charts Gareth Rushgrove Nov. 18, 2019 834 -
DevSecOps tools for open source projects in JavaScript and Node.js Liran Tal Nov. 24, 2020 2122 -
88% increase in application library vulnerabilities over two years Liran Tal Feb. 26, 2019 1041 11
Snyk named to the CRN 2020 Emerging Vendor list Anna Hester Aug. 03, 2020 277 -
Snyk users don't have to worry about NVD delays Hadas Bloom Mar. 13, 2024 734 -
How to increase Serverless observability, monitoring and security Liran Tal Jul. 15, 2019 1108 -
Best practices for creating a modern npm package with security in mind Brian Clark Sep. 12, 2022 4985 2
10 Maven Security Best Practices Simon Maple Sep. 26, 2018 1759 -
Launching serverless Snyk Tim Kadlec Nov. 03, 2016 360 -
Automate cloud compliance with Snyk IaC Lauren Place Feb. 07, 2023 591 -
Discussions on improving security through chaos engineering Mariah Gresham Aug. 03, 2023 966 -
How to strengthen security in your CI/CD pipeline James Konik Jul. 12, 2023 1800 -
Snyk welcomes Helios, accelerating our ASPM vision with runtime insights Manoj Nair Jan. 16, 2024 874 -
Snyk joins OpenSSF: Tackling open source supply chain security with a developer-first approach Guy Podjarny Oct. 19, 2021 443 -
Snyk & Trend Micro deepen collaboration with a new solution for solving open source development risks Geva Solomonovich Aug. 27, 2020 731 -
Command line tools for containers—using Snyk with Buildah, Podman, and Skopeo Matt Jarvis Dec. 09, 2020 2177 -
Introducing Snyk’s new Risk Score for risk-based prioritization Gur Shafriri, Benji Catabi-Kalman Aug. 17, 2023 1514 -
Four easy ways to analyze your Java and Kotlin code Brian Vermeer Aug. 13, 2024 1982 -
10 Serverless security best practices Liran Tal, Guy Podjarny May. 31, 2019 3289 -
5 ways to improve security during digital transformation Erin Cullen Apr. 10, 2023 1007 -
How to use AI for software development and cybersecurity Simon Maple Aug. 30, 2023 1755 -
SnakeYaml 2.0: Solving the unsafe deserialization vulnerability Brian Vermeer Jun. 21, 2023 1205 -
Provide granular permissions and groups for users in Azure Repos Simon Maple May. 06, 2019 131 -
Write secure Kubernetes configuration with help from Snyk Gareth Rushgrove Nov. 18, 2019 565 -
What’s so wild about exploits in the wild - and how can we prioritize accordingly? Rachel Cheyfitz Nov. 21, 2019 1409 -
Finding YAML Deserialization with Snyk Code Calum Hutton Feb. 23, 2023 799 -
Announcing customized role-based access controls for Snyk Daniel Berman Jun. 29, 2022 1237 -
Snyk announces new Slack integration Sarah Conway May. 30, 2023 610 -
Best practices for using AI in the SDLC Frank Fischer Jul. 19, 2023 749 -
DevOpsDays Singapore 2024: Unmasking the security pitfalls in AI-generated code Hiroko Nakano Apr. 23, 2024 562 -
80% of developers are not addressing Docker security Brian Vermeer Apr. 17, 2019 654 2
A recap from our latest PCI webinar, and compliance tips from Deliveroo Taylor Macomber Oct. 17, 2019 909 -
How I was hacking docker containers by exploiting ImageMagick vulnerabilities Liran Tal Mar. 11, 2021 1153 -
Instant security information with the Snyk security badge Brian Vermeer Aug. 04, 2020 469 -
Announcing the 2022 State of Cloud Security report from Snyk Megan Moore Sep. 13, 2022 757 -
Engineering culture at Snyk: The values that support and drive our teams Sergey Vasilkov May. 08, 2023 2259 -
SnykCon recap: Building a developer-focused AppSec program Mariah Gresham Jan. 27, 2022 1051 -
"Dirty Pipe" Linux vulnerability and your containerized applications (CVE-2022-0847) Eric Smalling Mar. 09, 2022 1180 -
Security lessons with a Snyk Ambassador Andres Haro Oct. 11, 2022 941 -
3 tips from Snyk and Dynatrace’s AI security experts Sarah Conway Jan. 22, 2024 905 -
Securing Go modules made easy (and accurately!) Ariel Ornstein Aug. 07, 2019 416 -
HTTPS Adoption *doubled* this year Guy Podjarny Jul. 20, 2016 1349 139
Threat modelling For Node.js applications Gergely Nemeth Aug. 31, 2016 825 -
Snyk Code, the only security tool chosen by developers in Stack Overflow's 2024 AI Search and Developer Tools survey Liqian Lim (林利蒨) Aug. 27, 2024 901 -
SourMint malicious SDK research write up Kirill Efimov Oct. 16, 2020 5703 -
Snyk Voices: Returning from maternity leave Tali Wahrhaft May. 06, 2022 2557 -
10 Spring Boot security best practices Simon Maple Aug. 16, 2018 1888 -
Snyk’s approach to container security research and relative importance Jim Armstrong Dec. 14, 2020 945 -
How to prevent NullPointerExceptions in Java Lucien Chemaly Sep. 21, 2023 2669 -
The ultimate guide to creating a secure Python package Gourav Singh Bais May. 08, 2024 3482 -
Why you need a security companion for AI-generated code Liqian Lim (林利蒨) Oct. 25, 2023 1834 -
Join Snyk in celebrating 31 days of Cybersecurity Awareness Month 2021 Randall Degges Oct. 01, 2021 455 -
29% of highest security integration orgs endure friction when collaborating Liran Tal Jan. 28, 2020 635 -
Building Docker images in Kubernetes Vitalis Ogbonna May. 03, 2022 1557 -
Snyk takes over Boston for SnykWeek Megan Moore May. 19, 2022 663 -
Differences in version handling between RubyGems and npm Gareth Visagie Dec. 14, 2016 1243 4
Reduce risk to your supply chain with a software bill of materials (SBOM) Ryan Searle Jun. 07, 2023 881 -
Snyk provides native integration for Atlassian Bitbucket Cloud security Sarah Conway Jun. 15, 2021 887 -
What is typosquatting and how typosquatting attacks are responsible for malicious modules in npm Liran Tal Jan. 12, 2021 1350 1
Cybersecurity Venture’s 2023 Software Supply Chain Attack Report Sydney Milligan Oct. 10, 2023 816 -
Maximizing IAM security with AWS permissions boundaries and Snyk Wayne Crissman Jun. 26, 2023 1019 -
What makes Verdaccio a successful project? Oren Hacohen Feb. 02, 2021 1578 -
Fun with ciphers in copycat Wordles Micah Silverman Feb. 02, 2022 903 -
Data leak in the Netherlands: What developers should learn from this Brian Vermeer Mar. 31, 2023 753 -
Snyk Unifies Open Source and Container Security for Coveo Sarah Conway Nov. 23, 2019 232 -
Snyk Closes $200M to Modernize Security Industry Peter McKay Sep. 09, 2020 371 -
Identify vulnerabilities in your container images with Snyk’s enhanced Docker Desktop Extension LaToya Muff Apr. 11, 2023 363 -
Learning from cloud transformation as we move to AI David Lugo May. 21, 2024 976 -
Enabling policy as code (PaC) with OPA and Rego Eric Smalling Jan. 19, 2022 1522 -
Remote code execution, cross-site scripting, and denial of service vulnerabilities account for 2/3 of known vulnerabilities in .NET ecosystem Hayley Denbraver Jul. 25, 2019 1066 -
How to secure an S3 bucket on AWS? Liran Tal Jul. 12, 2024 3393 -
Using Pulumi to automate the Snyk Kubernetes integration for containers Pas Apicella Feb. 09, 2022 2064 -
How Axel Springer National Media and Tech achieved continuous security with Snyk Nina McClure Sep. 03, 2024 952 -
Modern security leader spotlight: with Marcin Hoppe from Auth0 Noa Korem Sep. 19, 2019 1096 -
You should be using HTTP Strict Transport Security (HSTS) headers in your Node.js server Raphael Mun Dec. 29, 2022 1729 -
The State of Open Source Security 2020 Alyssa Miller Jun. 24, 2020 1912 -
Secure Java URL encoding and decoding Jura Gorohovsky Aug. 14, 2023 3090 -
Snyk named a Leader, placed highest in Strategy category in The Forrester Wave: Software Composition Analysis (SCA), Q2 2023 report Manoj Nair Jun. 13, 2023 770 -
Give employees the flexibility to do their best work Peter McKay Jun. 07, 2021 522 -
Building a secure Amazon S3 bucket (AWS) Josh Stella Sep. 08, 2020 1746 -
Nightfall AI and Snyk unite to deliver AI-powered secrets scanning for developers LaToya Muff Nov. 29, 2023 547 -
SnykCon recap: Automation for better compliance and faster feedback loops Megan Moore Apr. 13, 2022 1189 -
Krampus delivers an end-of-year Struts vulnerability Micah Silverman Jan. 02, 2024 1667 -
3 tips for rebuilding a Docker image faster (and save CI seconds!) Liran Tal Dec. 28, 2023 2564 -
6 stages of refactoring a Jest test case Liran Tal Sep. 04, 2019 324 -
Does AI lead to AppSec hell or nirvana? Erin Cullen Oct. 03, 2023 1040 -
Snyk and Trek10 publish new AWS Quick Start Guide to secure serverless CI/CD deployments Jay Yeras Sep. 29, 2020 480 -
Announcing SnykCon 2021: Build Securely Guy Podjarny Jun. 01, 2021 825 -
Node.js multithreading with worker threads series: worker_threads tutorial James Walker Oct. 25, 2022 2310 -
PHP security in Snyk Code now GA DeveloperSteve Coochin Jan. 26, 2022 760 -
Announcing Snyk AppRisk: Elevate your AppSec game with ASPM Daniel Berman Dec. 12, 2023 1464 -
3 ways AppSec modernization is a game-changer for financial services Katie DeMatteis Sep. 03, 2024 782 -
SnykLaunch April '23: C/C++ expansion, cloud and IaC updates, custom container security, new integrations, and more Jim Armstrong Apr. 04, 2023 1462 -
New SEC cybersecurity rules put more onus on the CISO, not so much on directors Myke Lyons Aug. 03, 2023 1578 -
Preventing malicious packages and supply chain attacks with Snyk Daniel Berman Aug. 31, 2021 1421 -
Enhancing code to cloud security with the Common Configuration Scoring System Wayne Crissman Dec. 14, 2023 998 -
Secure development when working from home — tips and tricks Guy Podjarny Mar. 31, 2020 1737 -
Snyk welcomes Enso: Enabling security leaders to scale their AppSec program with ASPM Manoj Nair Jun. 07, 2023 972 -
Leaky Vessels: Docker and runc container breakout vulnerabilities (January 2024) Jamie Smith Jan. 31, 2024 1729 41
Introducing Snyk’s partnership with Gemini Code Assist David Lugo Apr. 09, 2024 682 -
Snyk is named a Strong Performer as a first-time entrant in the Forrester Wave™: Static Application Security Testing (SAST) Q3 2023 Peter McKay Sep. 20, 2023 696 -
Zip Slip Vulnerability Cheat Sheet Simon Maple Jun. 28, 2018 440 -
Day in the life of a food giant CISO Vandana Verma Sehgal Apr. 18, 2024 668 -
7 tips for prioritizing container and web application vulnerabilities Daniel Berman Sep. 22, 2020 1195 -
Top ten most popular docker images each contain at least 30 vulnerabilities Liran Tal Feb. 26, 2019 1133 562
Join "The Big Fix" to secure your projects with Snyk and earn cool swag Liran Tal Feb. 09, 2022 1029 -
How to educate, train and empower developers in security Simon Maple Jul. 25, 2018 843 -
Snyk & Atlassian: How to embed security in AI-assisted software development LaToya Muff Feb. 14, 2024 1030 -
Integrating Snyk Code SAST results in your ServiceNow workflows Sarah Conway May. 07, 2024 514 -
How to Detect and Remediate Kubernetes Vulnerability CVE-2019-11249 Hayley Denbraver Mar. 11, 2020 884 -
Three reasons to invest in an ASPM solution in 2024 Julia Kraut Dec. 12, 2023 610 -
Exposed or not, vulnerabilities are dangerous Tim Kadlec Nov. 08, 2017 466 -
With Love, Your Applications Krysta Williams-Timm Feb. 14, 2024 373 -
Snyk named a 2022 Gartner Peer Insights Customers’ Choice for Application Security Testing Tony Sleva Oct. 04, 2022 382 -
Three trends shaping software supply chain security today Erin Cullen Aug. 22, 2024 923 -
Snyk named Visionary in 2021 Gartner Magic Quadrant for AST Aner Mazur Jun. 01, 2021 1187 -
Understanding the software supply chain security requirements in the cybersecurity Executive Order Daniel Berman Jun. 10, 2021 1503 -
How to add Playwright tests to your pull request CI with GitHub Actions Liran Tal Oct. 14, 2022 2546 -
Using insecure npm package manager defaults to steal your macOS keyboard shortcuts Yagiz Nizipli Jun. 28, 2023 1102 -
Protestware is trending in open source: 4 different types and their impact Benji Catabi-Kalman Mar. 22, 2022 1185 -
Keep your dependencies up-to-date—enable auto upgrades with Snyk Dan Mckean Nov. 06, 2019 450 -
Fetch the Flag CTF 2022 writeup: Roadrunner Giovanni Funchal Nov. 10, 2022 1138 -
Snyker Spotlight: Reflecting on Juneteenth Kris Broughton Jun. 17, 2021 1257 -
4 benefits of visualizing your cloud infrastructure Diem Shin Jun. 11, 2019 650 -
AI quality: Garbage in, garbage out Michael Biocchi Jun. 11, 2024 730 -
How to secure JavaScript applications right from the CLI Gideon Idoko Oct. 24, 2023 2412 -
Securing cloud native applications: ActiveCampaign’s VP, Information Security provides perspective Brian Piper Apr. 09, 2021 1232 -
Jackson Deserialization Vulnerability Brian Vermeer Aug. 21, 2019 586 1
Happy 1st Birthday, Snyk Code! Frank Fischer May. 06, 2022 1368 -
10 best practices for securely developing with AI Simon Maple Sep. 27, 2023 3204 -
How Snyk Code prioritizes vulnerabilities using their Priority Score Frank Fischer Nov. 09, 2021 1078 -
Snyk top 10 code vulnerabilities report Mariah Gresham May. 18, 2023 424 1
Reachable vulnerabilities: how to effectively prioritize open source security Krysztof Huszcza Aug. 18, 2020 2177 1
Analyzing the PwnKit local privilege escalation exploit Kyle Suero Jan. 29, 2022 726 -
SDRing during COVID-19—Snyk style! Brendan McCrann Jun. 01, 2020 445 -
Setting up the Docker image scan GitHub Action Mohammad-Ali A'râbi May. 19, 2023 1076 -
Why do organizations trust Snyk to win the open source security battle? Benji Catabi-Kalman May. 27, 2020 2302 -
Getting started with PHP static analysis in 2024 Liran Tal Mar. 21, 2024 2431 -
Introducing the Snyk App for Compass: A complete view of software component risk LaToya Muff Oct. 05, 2023 662 -
How to prevent XPath injection attacks Marcelo Oliveira May. 10, 2023 2175 -
Securing your SBOM on Google Cloud David Lugo Mar. 28, 2024 983 -
The Log4j vulnerability and its impact on software supply chain security Liran Tal Dec. 13, 2021 2129 -
More accurate than GPT-4: How Snyk’s CodeReduce improved the performance of other LLMs Eric Fernandez May. 07, 2024 1245 -
These aren’t the npm packages you’re looking for DeveloperSteve Coochin May. 04, 2022 1141 -
One month to SnykCon 2021: Sessions to attend, flags to capture, Simons to Maple Leigh Moore Sep. 07, 2021 722 -
Snyk’s guide to disclosing pronouns Mariah Gresham, Alex Fallon Jun. 09, 2022 774 -
Can AI write secure code? Frank Fischer May. 03, 2023 2244 -
Securing Artifactory using Snyk Or Fattal Aug. 19, 2019 591 -
Snyk finds 200+ malicious npm packages, including Cobalt Strike dependency confusion attacks Kirill Efimov May. 24, 2022 2807 3
The State of Cloud Native Application Security survey—2021 Matt Jarvis Feb. 02, 2021 431 -
Introducing parlay, a tool for enriching SBOMs Gareth Rushgrove Jun. 07, 2023 773 -
Introducing groups – a new way to manage your teams in Snyk Anna Debenham Mar. 06, 2018 525 -
Understanding filesystem takeover vulnerabilities in npm JavaScript package manager Liran Tal Jan. 07, 2020 1366 34
360 degrees of application security with Snyk Soumen Mukherjee Apr. 24, 2024 1273 -
How to keep an HTTP connection alive for 9 hours Micah Silverman Oct. 23, 2023 2391 3
Log4Shell in a nutshell (for non-developers & non-Java developers) Micah Silverman Dec. 15, 2021 1203 -
Congratulations to Snyk’s 2022 CRN Women of the Channel Carey Stanton May. 09, 2022 740 -
New O’Reilly book — Cloud Native Application Security: Embracing Developer-First Security for the Cloud Era Simon Maple Jun. 15, 2021 965 -
How to build a secure API gateway in Node.js Florian Rappl Dec. 28, 2022 2647 -
Response to the Enduring Security Framework (ESF) Guide for Developers Gareth Rushgrove Sep. 03, 2022 602 -
Creating SBOMs with the Snyk CLI Brian Vermeer Feb. 08, 2024 1348 -
What’s new in Snyk? Rachel Cheyfitz Jun. 10, 2019 346 -
Vulnerability: runc process.cwd and leaked fds container breakout (CVE-2024-21626) Rory McNamara Jan. 31, 2024 1114 3
Ethical hacking techniques Vandana Verma Sehgal Jun. 05, 2023 1713 -
Snyk Container certified “VMware PKS Partner Ready” to find and fix vulnerabilities in container workloads Jim Armstrong Apr. 17, 2020 459 -
Snykers spoke, we listened—Snyk collects 4 Best Place to Work awards by Comparably Fenella Vavasour Aug. 13, 2020 1099 -
Snyk Closes $150M to Accelerate Developer-first Security Peter McKay Jan. 21, 2020 405 7
Alert: LaughTilYouCry ransomware sabotages npm package (with puns) Mariah Gresham Apr. 01, 2022 529 -
10 Java security best practices Brian Vermeer, Jim Manico Sep. 17, 2019 3330 2
PCI standards open source security requirements — how to comply? Danny Grander Jul. 23, 2019 1393 -
Snykers share wellness tips for mental health awareness month Belyn Lai May. 30, 2023 706 -
Snyk Partner Speaks series: True DevSecOps with Snyk and Dynatrace Sarah Conway Jun. 08, 2023 177 -
Vuln Cost: Effortless finding vulnerabilities in npm packages with VS Code Brian Vermeer Apr. 02, 2020 548 -
Using Node.js event loop for timing attacks Danny Grander Feb. 16, 2016 1640 4
Snyk enhances ServiceNow with comprehensive insights into vulnerabilities in open source software Marco Morales Jan. 24, 2023 633 -
The security course missing from higher education Michael Biocchi Jul. 12, 2022 955 -
Snyk ranked #20 on 2022 Forbes Cloud 100 list Jeff Yoshimura Aug. 09, 2022 341 -
From image security to workload security Gareth Rushgrove Oct. 31, 2019 859 -
JVM Ecosystem Report 2020 Brian Vermeer Feb. 05, 2020 460 -
Container images simplified with Ko Eric Smalling Oct. 10, 2022 3025 1
Snyk Ranked #19 on 2023 Forbes Cloud 100 List Peter McKay Aug. 08, 2023 430 -
Responsible disclosure: the impact of vulnerability disclosure on open source security Asaf Biton Apr. 07, 2020 695 -
Snyk Code is now available for free Frank Fischer May. 06, 2021 735 1
Talking visibility, scalability, and relationships in secure development with Phil Guimond of ViacomCBS Simon Maple Jul. 01, 2021 2244 -
Security Transformation and The Three Faces of DevSecOps Guy Podjarny Mar. 08, 2019 243 -
Going beyond “shift left” to extend AppSec in all directions Ben Desjardins Jul. 09, 2024 968 -
Prioritizing vulnerabilities in Kubernetes deployments Gareth Rushgrove Aug. 06, 2020 572 -
Snyk Named a 2018 Gartner Cool Vendor in Application and Data Security Guy Podjarny May. 15, 2018 657 -
Research with Snyk and Redhunt Labs: Scanning the top 1000 orgs on GitHub Vandana Verma Sehgal Jun. 22, 2023 399 -
Gradle dependencies: scanning with new Snyk Gradle plugin Brian Vermeer Oct. 23, 2020 885 -
Snyk Partner Speak Video Series Puts Spotlight on New Integrations Sarah Conway Apr. 12, 2023 181 -
Snyk takes on responsibility for Node.js ecosystem vulnerability disclosure program Benji Catabi-Kalman May. 25, 2021 499 2
Securing S3 bucket configuration and access with Snyk & Solvo Lauren Place Oct. 18, 2021 1114 -
How to build a modern DevSecOps culture: Lessons from Jaguar Land Rover and Asda Brian Piper Feb. 21, 2024 1209 -
78% of vulnerabilities are found in indirect dependencies, making remediation complex Liran Tal Feb. 26, 2019 989 -
Snyk IaC scanning enhancements include Azure and AWS infrastructure as code Eric Smalling Feb. 23, 2021 769 -
Launching the State of Open Source Security Survey Tim Kadlec Sep. 21, 2017 366 7
Go security cheatsheet: 8 security best practices for Go developers Eric Smalling Feb. 09, 2021 1889 -
Panel recap: Breaking Bad Security Habits with Corey Quinn Erin Cullen Dec. 20, 2022 985 -
Welcoming Dino DiMarino: The first Snyk Chief Revenue Officer Peter McKay Oct. 13, 2021 452 -
Amplifying AAPI Voices to Honor Asian American Pacific Islander Heritage Month Belyn Lai, Yos Pang May. 25, 2023 1495 -
NPM security: preventing supply chain attacks Liran Tal Nov. 08, 2022 3307 1
Integrating the Snyk Language Server with IntelliJ IDEs Arvyd Paeglit Jun. 17, 2024 344 -
3 tips to manage drift from manual changes in Terraform Stephane Jourdan May. 22, 2020 939 -
Black Hat Asia customer panel recap: How to lead DevSecOps adoption Brian Piper Sep. 18, 2023 821 -
Critical Arbitrary Code Execution Vulnerability Found in Kubernetes Liran Tal Dec. 20, 2018 715 -
Recap: Stress-Free Security for Devs and Ops on AWS David Lugo Apr. 03, 2023 1341 -
Fixing vulnerabilities in Maven projects Brian Vermeer Sep. 14, 2020 948 -
Building a culture of Digital Trust Stephanie Dominy Feb. 18, 2020 999 -
SuiteCRM: PHAR deserialization vulnerability to code execution Sam Sanoop May. 07, 2021 1707 -
Hunting intent-based Android security vulnerabilities with Snyk Code Raul Onitza-Klugman May. 27, 2021 1654 -
81% believe developers should own security, but they aren’t well-equipped Liran Tal Feb. 26, 2019 923 -
Polyfill supply chain attack embeds malware in JavaScript CDN assets Liran Tal Jun. 26, 2024 1892 -
The npm faker package and the unexpected demise of open source libraries Liran Tal Sep. 02, 2022 2339 -
Building security into your Azure DevOps Pipeline Udi Nachmany Dec. 16, 2019 308 -
Kernel privilege escalation: how Kubernetes container isolation impacts privilege escalation attacks Kamil Potrec Dec. 03, 2020 3824 4
NumPy arbitrary code execution vulnerability Hayley Denbraver Feb. 05, 2019 394 -
Java ecosystem survey 2021 Brian Vermeer Feb. 15, 2021 247 -
Go security: announcing enhanced security for Go applications Daniel Berman Dec. 16, 2020 1319 -
Snyk Fetch the Flag CTF 2023 writeup: Audiopolis John Hammond Nov. 30, 2023 278 -
Securing the digital future: Reviewing the Biden-Harris administration's National Cybersecurity Strategy Vandana Verma Sehgal Mar. 20, 2023 713 -
Hypergrowth Playbook: 7 best practices as you go from startup to scaleup Dipti Salopek Aug. 25, 2021 1052 -
RPM Package Manager: RPM package security scanning with Snyk Ivan Stanev Nov. 13, 2020 2414 -
Snyk streamlines procurement with AWS Marketplace Solution Provider Private Offers (SPPO) David Lugo May. 11, 2021 696 -
A security expert’s view on Gartner’s generative AI insights Liqian Lim (林利蒨) Aug. 07, 2024 1729 -
Using third party content securely Gareth Rushgrove Nov. 08, 2019 881 -
Snyk CLI: Introducing Semantic Versioning and release channels Chintan B. Apr. 30, 2024 930 -
Scanning Harbor registry images for vulnerabilities with Snyk Eric Smalling Apr. 01, 2021 655 -
Cheat sheet: Meeting security compliance standards Mariah Gresham Sep. 15, 2022 784 -
How to make a mock API server in JavaScript David Ekete Oct. 20, 2022 2038 1
Shifting left security incident management with the Snyk & Opsgenie integration Jay Yeras Feb. 24, 2021 840 -
Call for action: Exploring vulnerabilities in Github Actions Elliot Ward, Rory McNamara, Raul Onitza-Klugman Jun. 06, 2024 3977 -
Continuous dependency updates: Improving processes by front-loading pain James Bowes May. 24, 2021 1499 2
How Snyk can help secure supply chains per Executive Order M-21-30 Vandana Verma Sehgal Sep. 29, 2022 1767 1
Security in context: When is a CVE not a CVE? Matt Jarvis Dec. 17, 2021 953 2
Session management security: Best practices for protecting user sessions Okoth Pius Jul. 11, 2023 2703 1
31% don’t track application dependencies and 38% only track direct dependencies Liran Tal Jan. 28, 2020 653 -
Data loss prevention for developers Annabel Gauci May. 24, 2023 2103 2
Snyk brings infrastructure as code security to HashiCorp Terraform Cloud Marco Morales May. 04, 2022 762 -
Top 5 scary AWS misconfigurations Shilpi Bhattacharjee Oct. 31, 2022 816 -
Immutable infrastructure: Networks Drew Wright Apr. 17, 2015 1152 -
Log4j 2.16 High Severity Vulnerability (CVE-2021-45105) Discovered Benji Catabi-Kalman Dec. 18, 2021 767 -
Vulnerable Gradle plugin-publish plugin reveals sensitive information Brian Vermeer Mar. 31, 2020 364 -
Snyk and Atlassian deepen partnership with Snyk security in Jira Software Jill Wilkins Feb. 08, 2023 412 -
Announcing enhanced end-to-end security for Bitbucket Cloud development workflows Daniel Berman Jun. 04, 2020 829 -
10 modern Node.js runtime features to start using in 2024 Liran Tal May. 29, 2024 5030 2
Snyk and AWS announce native Amazon EKS support directly from the AWS Management Console David Lugo Jun. 12, 2024 418 -
5 Node.js security code snippets every backend developer should know Liran Tal Feb. 28, 2024 3106 -
Regular Expression Denial of Service (REDoS) in UAParser.js Alyssa Miller Oct. 26, 2020 1125 -
Introducing the ASPM Masterclass Erin Cullen Mar. 12, 2024 504 -
The new, improved Snyk Container CLI Gareth Rushgrove Oct. 29, 2020 932 -
Welcoming Adriana Bokel Herde: Snyk’s new Chief People Officer Peter McKay Sep. 01, 2021 588 -
Dependency injection in Python Lucien Chemaly Oct. 31, 2023 2919 -
Snyk Apps now GA: An easy, standardized, and secure framework for building custom integrations Sarah Conway Nov. 20, 2023 1108 -
Manage security issues in Jira with Snyk Security in Jira Cloud LaToya Muff Aug. 09, 2023 330 -
Securing symmetric encryption algorithms in Java Brian Vermeer Oct. 18, 2023 1489 -
How Comic Relief’s developers used Snyk to automate security and boost productivity as part of their Digital Transformation. Ellen Van Keulen Mar. 22, 2018 709 -
Scan for AWS CloudFormation misconfigurations with Snyk IaC Ilianna Papastefanou Jun. 17, 2021 1083 -
Managing Node.js Docker images in GitHub Packages using GitHub Actions Liran Tal Jul. 13, 2021 1791 -
Preventing insecure deserialization in Node.js Benson Kuria Macharia Apr. 17, 2023 1890 -
Building a security-conscious CI/CD pipeline Peter De Tender Jun. 29, 2023 1529 -
Snyk Code CLI support now in public beta Frank Fischer Sep. 21, 2021 1619 -
New Gartner Market Guide highlights the importance of Software Composition Analysis (SCA) Daniel Berman Sep. 01, 2020 1434 -
Open source maintainers want to be secure, but 70% lack skills Liran Tal Feb. 26, 2019 1787 -
Interview with an engineer: Diving into modern SAST Snyk Team May. 18, 2022 1355 -
Snyk debuts on 2021 CNBC Disruptor 50 List at #15 Peter McKay May. 27, 2021 363 -
Announcing Snyk’s developer-first prioritization capabilities Daniel Berman Jul. 22, 2020 1604 -
A year-old dormant malicious remote code execution vulnerability discovered in Webmin Hayley Denbraver Aug. 20, 2019 510 3
Controlling your server with a reverse shell attack Brian Vermeer Aug. 10, 2022 1544 -
Snyk at RSAC 2021 — ML in SAST: Distraction or Disruption Tony Sleva Jun. 30, 2021 882 -
Protecting our culture as we hyperscale Dipti Salopek Feb. 04, 2020 823 -
Is your team on the *security* naughty or nice list? Mariah Gresham Dec. 20, 2023 873 -
Secure your application from Argo CD to Kubernetes JJ Ng Oct. 12, 2022 1253 -
How to find and fix XML entity vulnerabilities Michael Sherman Sep. 07, 2022 2223 -
How REI built a DevSecOps culture and how Snyk helped Brian Piper Feb. 27, 2024 1154 -
What’s a known vulnerability? Guy Podjarny Feb. 06, 2018 991 -
Applying risk management to DevOps practices with Snyk & Datadog Brian Piper Jan. 04, 2021 815 -
Preventing YAML parsing vulnerabilities with snakeyaml in Java Brian Vermeer Mar. 30, 2021 1273 -
Container image formats under the hood Agata Krajewska Nov. 18, 2020 2232 -
Git, the easy way: changing history using rebase—part I Or Kamara Jun. 09, 2020 1869 -
Announcing Snyk Impact Bry Breckenridge Oct. 06, 2021 1031 -
Snyk achieves Red Hat Vulnerability Scanner Certification Tomás González Blasini, David Lugo Apr. 03, 2023 391 -
4 tips to manage multiple Terraform versions Stephane Jourdan May. 27, 2020 750 -
Snyk is available on the GOV.UK Digital Marketplace! Guy Podjarny Jun. 01, 2017 385 -
SolarWinds Orion Security Breach: A Shift In The Software Supply Chain Paradigm Anton Hoffman Mar. 02, 2021 576 -
Why fuzzing tools should be part of your security toolkit Kuria Macharia Oct. 28, 2022 1763 -
Why the Facebook outage and Twitch breach matter to business leaders Josh Stella Oct. 14, 2021 1357 -
How to find and fix Critical WebP zero-day vulnerability CVE-2023-4863 Brian Clark, Eric Smalling, Tim Gowan Oct. 05, 2023 1282 -
Snyk-Watcher: keep Snyk in sync Vlad Perelmuter Feb. 17, 2021 429 -
Weak Hash vulnerability discovered in crypto-js and crypto-es (CVE-2023-46233 & CVE-2023-46133) Jamie Smith Oct. 25, 2023 1509 -
Regular Expression Denial-of-Service in websocket-extensions Alyssa Miller Jun. 22, 2020 849 -
Developing secure software: how to implement the OWASP top 10 Proactive Controls Liran Tal Nov. 05, 2020 1423 -
Why did is-promise happen and what can we learn from it Liran Tal Apr. 28, 2020 1314 2
2022 Snyk Customer Value Study highlights: The impact of developer-first security Jeff Yoshimura Oct. 18, 2022 1061 -
Announcing the Snyk Team plan: Secure development for teams Daniel Berman Apr. 21, 2021 879 -
It takes a community: Responding to open source criticism post-Log4Shell Randall Degges Dec. 24, 2021 1904 -
Open source vulnerabilities tripped Equifax, how can you defend yourself? Guy Podjarny Sep. 11, 2017 1233 12
Continuously secure all apps with unlimited Snyk projects Guy Podjarny Apr. 05, 2017 379 -
How to update cURL Brian Clark, Eric Smalling Oct. 11, 2023 1772 -
AWS top 10 misconfigurations and how to fix them: A cheat sheet Erin Cullen Mar. 15, 2023 1546 -
Call for nominations: The Snykie awards for Secure Development Sarah Wills Sep. 28, 2021 427 -
Fixing a Prototype Override Protection Bypass Vulnerability in qs Tim Kadlec Mar. 14, 2017 546 -
6 big AWS IAM vulnerabilities – and how to avoid them Becki Lee Nov. 05, 2021 1098 -
77% of 433,000 sites use vulnerable JavaScript libraries Tim Kadlec Nov. 21, 2017 1394 108
Azure Repos enriched with DevSecOps capabilities Ariel Ornstein May. 01, 2019 440 -
Snyk + International Dog Day: recap Megan Moore Oct. 05, 2022 374 -
Snyk vulnerability disclosure program: what’s going on behind the scenes? Asaf Biton Apr. 14, 2020 885 -
The most common vulnerabilities in Maven Central and npm Simon Maple Jun. 27, 2018 540 -
Handling security vulnerabilities in Spring Boot Brian Vermeer Nov. 29, 2023 1451 -
Three considerations for building an effective security program Alex Bovee May. 04, 2023 920 -
How Dun & Bradstreet and Shutterstock built successful security champions programs Sarah Wills Oct. 14, 2021 922 -
Top 8 penetration testing tools Benson Kuria Macharia May. 25, 2023 1172 -
Snyk Learn and the NIST Cybersecurity Framework (CSF) Michael Biocchi Mar. 06, 2024 523 -
Snyk named #39 on 2021 Forbes Cloud 100 list Jeff Yoshimura Aug. 11, 2021 375 -
Deep dive into Visual Studio Code extension security vulnerabilities Raul Onitza-Klugman May. 26, 2021 2562 1
Snyk Fetch the Flag CTF 2023 writeup: Protect The Environment John Hammond Nov. 30, 2023 243 -
How even quick Node.js async functions can block the Event-Loop Michael Gokhman Feb. 04, 2019 3451 3
Understanding and mitigating the Jinja2 XSS vulnerability (CVE-2024-22195) Liran Tal Jan. 18, 2024 1059 -
Accelerate C/ C++ security with Snyk Marcie Cheung Dec. 05, 2023 614 -
The Secure Developer: talking DevSecOps in Azure with Microsoft’s Victoria Almazova Hayley Denbraver Sep. 26, 2019 819 -
Scaling your security team without hiring Drew Wright Nov. 02, 2022 984 -
Angular security best practices Liran Tal Aug. 10, 2020 2003 2
Mastering Python virtual environments: A complete guide to venv, Docker, and securing your code Liran Tal Jan. 10, 2024 1589 -
Snyk Fetch the Flag CTF 2023 writeup: I Do Math John Hammond Nov. 30, 2023 190 -
Snyk @ Snyk: Enabling Kubernetes RBAC for Snyk’s Developers Omer Levi Hevroni Apr. 14, 2021 771 -
8 tips for securing containers from source to runtime Sarah Conway Aug. 24, 2022 661 -
How to verify and secure your Mastodon account Liran Tal Dec. 05, 2022 946 -
How to protect Node.js apps from CSRF attacks Victor Ikechukwu Oct. 17, 2023 3146 -
Snyk integrates with AWS Security Hub to automate security remediation workflows David Lugo Jun. 12, 2023 884 -
Command injection vulnerability in Snyk CLI released prior to September 1, 2022 (older than v1.996.0) Gareth Rushgrove Oct. 03, 2022 501 -
LGBTQ+ in tech: from building apps to spreading magic—part I Eirini-Eleni Papadopoulou Jun. 29, 2020 2646 -
How to implement SSL/TLS pinning in Node.js Nwani Victory Aug. 29, 2023 2298 -
Python security best practices cheat sheet Frank Fischer Sep. 27, 2021 2241 5
Streamline dependency updates with Mergify and Snyk Liran Tal Aug. 23, 2023 1548 -
10 Docker Security Best Practices Liran Tal, Omer Levi Hevroni Mar. 06, 2019 3479 1
The Cloud Security Podcast is now powered by Snyk! Ashish Rajan Jul. 26, 2022 562 -
5 security best practices for adopting generative AI code assistants like GitHub Copilot Liqian Lim (林利蒨) Mar. 05, 2024 1368 -
A denial of service Regex breaks FastAPI security Liran Tal Jul. 31, 2024 1878 -
How secure is WebAssembly? 5 security concerns unique to WebAssembly Marcelo Oliveira Jul. 28, 2023 1448 2
Scanning Red Hat Quay registry images for vulnerabilities with Snyk Jim Armstrong Apr. 01, 2021 880 -
The Docker project turns 10! Looking back at a decade of containers Eric Smalling Mar. 17, 2023 3058 -
Update: OpenSSL high severity vulnerabilities Vandana Verma Sehgal Nov. 03, 2022 516 -
Talk to us about Snyk CLI Chintan B., Neil Mackay Jun. 06, 2024 859 -
Snyk Announces New Rapid7 Strategic Partnership at RSA 2020 Sarah Conway Feb. 24, 2020 387 -
How Mulesoft fosters a developer-first, shift-left culture with Snyk Gerald Crescione Apr. 30, 2024 798 -
Snyk Open Source adds beta C/C++ security scanning for unmanaged OSS Daniel Berman Dec. 08, 2021 974 -
Why developer-first SAST tools are the future of code security Liran Tal Apr. 28, 2021 2293 -
Launching a Free-Tier Version of our Container Vulnerability Management Solution Liron Lifshitz-Yadin Oct. 10, 2018 253 -
The art of conditional rendering: Tips and tricks for React and Next.js developers Kumar Harsh Oct. 30, 2023 2865 -
Trend Micro and Snyk partner to deliver complete remediation to secure containers Geva Solomonovich Oct. 08, 2019 438 -
Snyk's 2023 State of Open Source Security: Supply chain security, AI, and more Simon Maple Jul. 26, 2023 1184 -
Snyk achieves AWS Security Competency David Lugo Nov. 15, 2023 514 -
Improve security by knowing when to ignore IaC vulnerabilities Craig Furman Sep. 29, 2021 1004 -
Diagnosing and fixing memory leaks in Python Drew Wright Mar. 07, 2017 2313 -
Faster & improved tests for JavaScript lockfile based projects Liliana Kastilio Dec. 10, 2018 641 -
Welcoming Sanjay Poonen to the Snyk Board of Directors Peter McKay Oct. 20, 2021 564 -
Preventing SQL injection attacks in Node.js Lucien Chemaly Feb. 20, 2024 2260 -
Snyking in - regular expression denial of service vulnerability exploit in the ms package Simon Maple Mar. 13, 2019 864 -
Addressing cybersecurity challenges in open source software with the Linux Foundation Mariah Gresham Jul. 20, 2022 1033 -
Angular vs React: security bakeoff 2019 Liran Tal Oct. 30, 2019 999 -
A brief history of modularity Josh Emerson Nov. 21, 2016 625 -
DevSecCon24 2021: 24 hours of development, security, and inclusivity Sam Hepburn Jun. 07, 2021 845 -
Popular Python library, urllib3, subject to a denial of service vulnerability Hayley Denbraver Mar. 09, 2020 485 -
Snyk $7M Series A - and a huge thanks! Guy Podjarny Mar. 08, 2018 884 -
Best practices for secrets management in serverless applications Liran Tal Jun. 13, 2019 709 -
How Voltos Uses Snyk to Secure Their Own Security Product Glenn Gillen Feb. 22, 2017 807 -
Find and fix vulnerabilities in Artifactory container repositories Jim Armstrong Feb. 08, 2020 674 -
SnykLaunch June ‘23: Insights and DeepCode AI enable faster fixes and prioritization Jim Armstrong Jun. 07, 2023 1567 -
Snyk and Rapid7 partnership expand capabilities to enhance security for cloud native applications Sarah Conway Sep. 17, 2020 341 -
Finding and fixing exposed hardcoded secrets in your GitHub project with Snyk Chandler Mayo Jun. 25, 2024 902 -
Breaking down the ’critical’ OpenSSL vulnerability Elliot Ward, Raul Onitza-Klugman Nov. 04, 2022 1657 -
2020 Q1 in review—JVM ecosystem report, DevSecOps insights, and more Simon Maple Dec. 28, 2020 844 -
Does GitOps enhance application security? Vandana Verma Sehgal Aug. 21, 2023 1026 -
What are AI hallucinations and why should developers care? Liran Tal Aug. 16, 2023 2376 1
Ruby gem installations can expose you to lockfile injection attacks Liran Tal Aug. 17, 2022 2317 -
Fastify Node.js framework improves JSON security thanks to a security report Liran Tal Mar. 10, 2020 424 1
Infrastructure drift and drift detection explained Lauren Place Mar. 09, 2022 1362 -
Welcoming Danny Allan and Brian Rogan: Snyk leadership team expands with key appointments to accelerate innovation Peter McKay Feb. 06, 2024 492 -
The 8 best IntelliJ plugins for improving your coding experience Brian Vermeer Aug. 26, 2021 1356 -
Fixing `marked` XSS vulnerability Guy Podjarny May. 15, 2016 1081 2
Keeping your open source credentials closed Guy Podjarny Dec. 14, 2015 1258 -
Getting started with React Native security Kingsley Ubah Apr. 07, 2022 2306 -
Code Dx 5.3 integrates with Snyk for comprehensive vulnerability management Utsav Sanghani Apr. 19, 2021 531 -
Fetch the Flag CTF 2022 writeup: Logster Sonya Moisset Nov. 10, 2022 1063 -
Snyk welcomes Reviewpad: Code, commit, celebrate! Manoj Nair Oct. 30, 2023 606 -
Our favorite 2023 Snyk Fetch the Flag CTF writeups from the community Danielle Bradford Nov. 21, 2023 183 -
5 ways to prevent PHP code injection DeveloperSteve Coochin Jun. 29, 2021 1907 -
Top 3 security best practices for handling JWTs Liran Tal Dec. 18, 2023 2007 -
A quick primer on LDAP injection Eric Kahuha Jun. 01, 2023 1379 -
10 GitHub Security Best Practices Brian Vermeer Feb. 05, 2024 3532 3
Ruby on Rails Docker for local development environment Mikhail Tereschenko Nov. 02, 2022 1770 -
So, you think your CI/CD environment is secure? Simon Maple Feb. 21, 2019 1426 2
.NET developers alert: Moq NuGET package exfiltrates user emails from git Liran Tal Aug. 09, 2023 831 2
Snyk Code in 2021: Redefining SAST Frank Fischer Dec. 21, 2021 593 -
Snyk expands into Asia Pacific Japan Peter McKay Mar. 11, 2021 706 -
International Men’s Day—it’s time to talk Nickie Hills Nov. 19, 2020 1159 -
Fixing a Remote Code Execution Vulnerability in EJS Tim Kadlec Nov. 30, 2016 664 -
Modern VS Code extension development tutorial: Building a secure extension Mdu Sibisi Oct. 02, 2023 3917 -
Securing Bitbucket Cloud with Snyk Ariel Ornstein Apr. 04, 2019 460 -
Container vulnerability management for developers Aner Mazur Jun. 28, 2018 655 -
Introducing SUS: Snyk Ultimate Security Megan Moore Apr. 01, 2022 592 -
Engineering is somewhat like basketball Anton Drukh Aug. 04, 2016 1224 -
A serious security flaw in runC can result in root privilege escalation in Docker and Kubernetes Liran Tal Feb. 13, 2019 932 -
Showing Snyk security information in GitHub code scanning Gareth Rushgrove Oct. 07, 2020 582 -
Control your role! Kubernetes RBAC explored James Walker Jul. 27, 2023 2123 -
The importance of platform engineers in a security program Elliott Spira Apr. 13, 2023 962 -
Snyk Partner Speak Video with ServiceNow: A complete view of application security Sarah Conway May. 02, 2023 196 -
Snyk <3 Jira Anna Debenham Jun. 20, 2018 551 -
Reporting AppSec risk up to your CISO Kate Powers Burke, Ezra Tanzer Feb. 13, 2024 1945 -
How Snyk Social Trends help you fix essential security vulnerabilities Brian Vermeer Aug. 18, 2021 909 -
Securing next-gen development: Lessons from Trust Bank and TASConnect Gerald Crescione Jun. 05, 2024 1312 -
Building a secure CI/CD pipeline with GitHub Actions for your Java Application Brian Vermeer Jun. 27, 2022 1456 -
My first week at Snyk was at our All Hands Conference Hayley Denbraver Feb. 12, 2019 1300 -
Snyk brings developer-first AppSec approach to C/C++ Roy Ram, Neha Shenoy Apr. 04, 2023 1094 -
Maven support is here! Guy Podjarny Apr. 18, 2017 441 -
Snyk sponsors Atlassian Team ’22: Bringing developer security to the Atlassian ecosystem Sarah Conway Apr. 05, 2022 601 -
The persistent threat: Why major vulnerabilities like Log4Shell and Spring4Shell remain significant Brian Vermeer Aug. 29, 2024 1000 -
Writing unit tests in Java Lewis Gavin Nov. 18, 2022 1629 -
Trend Micro launches Cloud One Open Source Security powered by Snyk Geva Solomonovich May. 10, 2021 926 -
How to do password hashing in Java applications the right way! Brian Vermeer Mar. 24, 2022 1911 -
DevSecOps lifecycle coverage with new Snyk and Dynatrace app Sarah Conway May. 15, 2023 507 -
2022 Collaboration Partner of the Year: Snyk Sarah Conway Oct. 05, 2022 417 -
How Snyk ensures safe adoption of AI Akanchha Shrivastava Mar. 27, 2024 1534 -
You can’t compare SAST tools using only lists, test suites, and benchmarks Asaf Biton Jun. 16, 2021 832 -
Signing container images: Comparing Sigstore, Notary, and Docker Content Trust Hrittik Roy Sep. 26, 2023 3098 -
Real-time threat protection with Snyk and SentinelOne Shivam Jindal Nov. 09, 2023 679 -
Secure JavaScript URL validation Mannan Tirmizi May. 09, 2023 1940 6
A recap of our Kubernetes configuration security announcement and webinar Jim Armstrong Apr. 10, 2020 1051 -
Using JLink to create smaller Docker images for your Spring Boot Java application Brian Vermeer Aug. 24, 2023 1499 -
Adding Snyk security to Jira and Bitbucket Cloud LaToya Muff Oct. 25, 2023 647 -
How to scale successfully with Snyk’s Project Attributes and Tags Waleed Arshad Sep. 30, 2020 1160 -
SDR Series: Meet our APJ team Snyk Team Apr. 26, 2022 1350 -
VS Code extension: building auto CI/CD with GitHub Actions Shai Mendel Apr. 06, 2020 1225 -
Preventing Cross-Site Scripting (XSS) in Java applications with Snyk Code Brian Vermeer Apr. 25, 2023 1523 -
Scaling security with DevSecOps at a Forbes Cloud 100 company Taylor Macomber Sep. 16, 2020 730 -
How SME lender New10 uses AWS and Snyk to deliver quickly and securely Udi Nachmany Jul. 08, 2019 1608 -
SocketSleuth: Improving security testing for WebSocket applications Elliot Ward Sep. 06, 2023 843 -
Cheatsheet: top 10 application security acronyms Alyssa Miller Dec. 01, 2020 2037 4
Serialization and deserialization in Java: explaining the Java deserialize vulnerability Brian Vermeer Dec. 18, 2020 1847 -
AI-generated security fixes in Snyk Code now available Jim Armstrong May. 09, 2023 823 -
Snyk named to CNBC 2023 Disruptor 50 List Peter McKay May. 09, 2023 311 -
Exploring 3 types of directory traversal vulnerabilities in C/C++ Kirill Efimov Apr. 04, 2022 2081 -
Navigating the AI-powered development era in financial services Lawrence Crowther Aug. 26, 2024 826 -
Fetch the Flag CTF 2022 writeup: Pay Attention Assaf Ben Josef Nov. 10, 2022 1058 -
Cloud Security at Blackhat and Defcon 2022 Ashish Rajan Sep. 06, 2022 1896 -
Snyk Integrates with AWS to Help Enterprises Build Secure Applications Udi Nachmany Apr. 09, 2020 548 -
How much do we really know about how packages behave on the npm registry? Liran Tal Apr. 22, 2019 944 1
Achieving developer security adoption at Nylas with Snyk Erin Cullen Dec. 04, 2023 762 -
WillowTree roundtable: security for hypergrowth organizations Mariah Gresham Apr. 22, 2022 1051 -
Launching "The Secure Developer" Podcast Guy Podjarny Oct. 11, 2016 542 -
Fetch the Flag CTF 2022 writeup: git-refs Iulia Manda Nov. 10, 2022 585 -
Top 5 security concerns for infrastructure as code Raphael Mun Jul. 14, 2023 1565 -
8 tips for securing your CI/CD pipeline with Snyk Eric Smalling Jul. 20, 2023 3928 -
Timing out synchronous functions with regex Steve Shani Apr. 06, 2023 1071 -
Concerns of supply-chain attacks amplify as remote code execution was found in Ruby gem strong_password Liran Tal Jul. 07, 2019 615 4
How Okta empowers devs to find & fix security issues with Snyk Mariah Gresham Aug. 25, 2023 958 -
Make Snyk notifications work for you Michele Wiedemer Apr. 06, 2022 550 -
A Denial of Service vulnerability discovered in the Axios JavaScript package - affecting all versions of the popular HTTP client Liran Tal May. 06, 2019 749 2
7 tips to become a successful bug bounty hunter Ben Sadeghipour Jan. 25, 2024 1246 -
SQL injection cheat sheet: 8 best practices to prevent SQL injection attacks Brian Vermeer Mar. 26, 2021 1802 -
Nine Docker pro tips for Node.js developers Liran Tal Apr. 11, 2024 1630 -
Announcing IaC+ early access: Secure your infrastructure configurations across the SDLC Lauren Place Oct. 03, 2023 686 -
Dependency Health—assessing package risk with Snyk Anna Debenham May. 16, 2019 832 -
How to generate an SBOM for JavaScript and Node.js applications Liran Tal May. 22, 2023 2795 -
Build and deploy a Node.js security scanning API to Platformatic Cloud Liran Tal Jan. 05, 2024 2980 -
Buildkit GRPC SecurityMode privilege check: Build-time container breakout (CVE-2024-23653) Rory McNamara Jan. 31, 2024 946 -
64% of developers report that Java 8 remains the most often used release Brian Vermeer Feb. 05, 2020 926 -
What does Biden's Executive Order on AI safety measures mean for businesses? Liqian Lim (林利蒨) Nov. 02, 2023 2399 -
Docker for Java developers: 5 things you need to know not to fail your security Brian Vermeer Nov. 20, 2020 2056 -
The inevitability of Developer Security Guy Podjarny Sep. 09, 2021 614 -
From zero to security hero: test your GitHub projects for known vulnerabilities Simon Maple Nov. 12, 2020 625 -
Kroger’s approach to supply chain security Brian Piper Jan. 02, 2024 888 -
Java turns 25—aging like fine wine or more like milk? Brian Vermeer May. 22, 2020 820 1
AppSec spring cleaning checklist Mariah Gresham May. 13, 2024 783 -
Enhancing PCI compliance security with SAST and SCA DeveloperSteve Coochin Feb. 08, 2022 1359 -
Welcoming Diana Brunelle: Snyk’s New Chief People Officer Peter McKay Jul. 22, 2024 336 -
Installing and managing Java on macOS Keshav Malik Oct. 12, 2023 1464 -
The importance of verifying webhook signatures Marcelo Oliveira Jun. 29, 2023 1829 -
Three ways Snyk made software supply chains more secure in 2022 Jamie Smith Jan. 12, 2023 1390 -
Docker for Node.js developers: 5 things you need to know not to fail your security Liran Tal Jan. 25, 2021 1829 -
Improving developer experience with security tools at Pinterest Megan Moore Jul. 14, 2022 1165 -
Open source maintainer pulls the plug on npm packages colors and faker, now what? Liran Tal Jan. 09, 2022 1160 1
Best practices for container isolation Maryann Agofure Aug. 29, 2022 1562 -
Skyscanner fixed projects and gained visibility into their open source vulnerability exposure. Ellen Van Keulen May. 03, 2018 818 -
Introducing pkgbot! Karen Yavine Jan. 19, 2017 475 -
Announcing Snyk CLI for Ruby, and more ways to fix Ruby vulnerabilities Johanna Kollmann Dec. 19, 2016 287 -
Rego 102: Combining queries with AND/OR and custom messages Jasper Van der Jeugt, Becki Lee Nov. 09, 2023 2514 -
Best practices for building a production-ready Dockerfile for PHP applications James Walker Aug. 22, 2023 2507 -
Introducing The Secure Developer community Sam Hepburn Feb. 14, 2019 431 -
Azure Bicep security fundamentals Mark Johnson Dec. 13, 2022 1143 -
Use Snyk security policies to prioritize fixes more efficiently Daniel Berman Aug. 11, 2021 1080 -
Snyk sponsoring 2021 Open Source Summit by the Linux Foundation Sarah Conway Sep. 16, 2021 680 -
A guide to input validation with Spring Boot Lucien Chemaly Sep. 12, 2023 2751 -
Detect infrastructure drift and unmanaged resources with Snyk IaC Stephane Jourdan May. 09, 2022 1485 -
What’s new in CVSS 4.0 Paul Lascar Nov. 08, 2023 1679 -
GitHub “besieged” by malware repositories and repo confusion: Why you'll be ok Liran Tal Mar. 12, 2024 2102 -
GitHub Security Code Scanning: Secure your open source dependencies Daniel Berman May. 04, 2021 996 -
Safer together: Snyk and CISPA collaborate for the greater good Idan Digmi Jun. 06, 2022 853 -
Announcing Snyk Apps beta: Build custom apps to extend Snyk security into your workflows Daniel Berman Oct. 06, 2021 651 -
Snyk & Intuit roundtable: Breaking silos, engaging with security and developer communities Simon Maple Apr. 30, 2021 1654 -
Security in the Container Registry Udi Nachmany Feb. 21, 2019 665 -
Kotlin overtakes Scala and Clojure, becoming the 2nd most popular language on the JVM ecosystem Brian Vermeer Feb. 05, 2020 970 192
Snyk Code’s autofixing feature, DeepCode AI Fix, just got better Eric Fernandez, Berkay Berabi Apr. 23, 2024 2452 -
Snyk provides a critical security layer for CommunityBridge, a new Linux Foundation platform Noa Korem Mar. 13, 2019 360 -
Snyk is Now Integrated with Chrome’s Lighthouse Tim Kadlec Apr. 03, 2018 578 -
How to build a secure WebSocket server in Python Kingsley Ubah Jul. 05, 2022 2728 -
Best practices for rolling out Snyk Or Feuer Aug. 06, 2019 1203 -
How Lunar shifted security left while building a cloud native bank Brian Piper Jan. 20, 2022 759 -
How Snyk helps satisfy White House cybersecurity recommendations Vandana Verma Sehgal Mar. 23, 2022 1149 -
Tips to scale your DevSecOps organization from Gene Kim and Guy Podjarny Ravi Maira Nov. 02, 2020 1176 -
Generating fake security data with Python and faker-security Michael Aquilina Apr. 26, 2022 859 -
Checking Helm Charts for security misconfigurations Gareth Rushgrove Jun. 03, 2020 429 1
Rediscovering argument injection when using VCS tools — git and mercurial Alessio Della Libera Aug. 23, 2022 2111 3
Join the Snyk Developer Challenge Brittany Cannon Aug. 01, 2022 479 -
5 tips for adopting AI code assistance securely Liqian Lim (林利蒨) May. 30, 2024 856 -
Welcoming Tamar Yehoshua to the Snyk Board of Directors Snyk Team Jul. 26, 2021 405 -
2020 Q4 in review—iOS remote code execution, developer-first SAST, and more Simon Maple Dec. 31, 2020 1077 -
Abusing Ubuntu 24.04 features for root privilege escalation Rory McNamara Sep. 09, 2024 5975 189
Snyk's AppSec dream team Krysta Williams-Timm Mar. 19, 2024 843 -
A moment of respite for our mental health Dipti Salopek May. 11, 2020 353 -
Improved security testing for git-based Gradle projects using lockfile Antonio Gomes Dec. 07, 2020 693 -
Limitations of a single AI model Frank Fischer Aug. 07, 2023 1401 -
Automate security controls from development to production on Google Cloud David Lugo Jun. 18, 2024 1073 -
Shipping Kubernetes-native applications with confidence Amir Moualem Nov. 14, 2019 1337 -
My internship journey at Snyk Caroline Gow Feb. 16, 2023 1329 -
SourMint: Malicious code, ad fraud, and data leak in iOS Alyssa Miller Aug. 24, 2020 1900 10
Copilot amplifies insecure codebases by replicating vulnerabilities in your projects Randall Degges Feb. 22, 2024 1578 -
January in review: funding news, DevSecOps insights study, and much more Hayley Denbraver Jan. 31, 2020 455 -
Snyk Partner Speak video series with HashiCorp Sarah Conway Oct. 04, 2023 180 -
5 ways to secure Drupal 10 Sushnigdha Tripathy Aug. 23, 2022 1692 -
New Java 17 features for improved security and serialization Brian Vermeer Oct. 21, 2021 1262 -
Snyk Code adds security scanning for C# and .NET Frank Fischer Jul. 29, 2021 588 -
AppSec during hypergrowth: Empower your developers to overcome the tech talent shortage Jim Armstrong Nov. 16, 2021 835 -
Engineering equal opportunities at Snyk Francesca Scantlebury May. 28, 2020 1156 -
A day in the life of a CISO: Chris Hughes of Aquia Vandana Verma Sehgal Nov. 04, 2022 851 -
10 Dimensions of Python Static Analysis Liran Tal Jul. 17, 2024 4861 -
A security expert’s view on Gartner’s generative AI insights - Part 2 Liqian Lim (林利蒨) Aug. 08, 2024 1231 -
Accelerating the Snyk infrastructure as code vision with the addition of CloudSkiff Guy Podjarny Oct. 29, 2021 801 -
A (soft) introduction to Python dependency management Lucian Irsigler Sep. 14, 2021 1651 -
High severity vulnerability found in libcurl and curl (CVE-2023-38545) Hadas Bloom Oct. 04, 2023 1104 -
Improved risk assessment with EPSS scores in Snyk Daniel Berman May. 22, 2023 1297 -
Node.js vs. Deno vs. Bun: JavaScript runtime comparison James Konik Sep. 05, 2023 2966 -
Looking back at Black Hat USA 2022 Vandana Verma Sehgal Sep. 21, 2022 903 -
Rego 101: Introduction to Rego Becki Lee Nov. 02, 2023 2503 -
How LiveRamp used Snyk to remediate Log4Shell Brian Piper May. 19, 2022 685 -
Snyker Spotlight: Jeff Yoshimura on his Asian American heritage & AAPI Month Jeff Yoshimura May. 19, 2021 1078 -
What is package lock json and how a lockfile works for yarn and npm packages? Liran Tal Mar. 14, 2019 1224 -
npm passes the 1 millionth package milestone! What can we learn? Liran Tal, Simon Maple Jun. 04, 2019 872 5
Why ASPM is the future of AppSec: Key points from our newest whitepaper Sarah Conway Jun. 18, 2024 1177 -
Find and fix the Log4Shell exploit fast with Snyk Ariel Ornstein Dec. 13, 2021 1350 -
Exploring WebExtension security vulnerabilities in React Developer Tools and Vue.js devtools Calum Hutton Nov. 27, 2023 1511 -
Snyk IaC for Terraform Enterprise: Expanding Snyk compatibility with HashiCorp Terraform Sarah Conway Sep. 28, 2022 562 -
7 AppSec tips from Snowflake’s Director of Product Security Brian Piper Aug. 31, 2023 850 -
Breaking caches and bypassing Istio RBAC with HTTP response header injection Rory McNamara Jun. 20, 2024 2498 -
How to choose a security tool for your AI-generated code Liqian Lim (林利蒨) Jan. 09, 2024 1774 -
SnykWeek New York: In the cloud Megan Moore Oct. 10, 2022 731 -
File encryption in Python: An in-depth exploration of symmetric and asymmetric techniques Keshav Malik Nov. 22, 2023 2132 -
How to Dockerize a PHP application securely James Olaogun Aug. 02, 2023 2389 1
Building a secure GraphQL API with Node.js Lawrence Eagles Mar. 29, 2022 1901 -
Avoiding SMTP Injection: A Whitebox primer Sam Sanoop Sep. 15, 2022 1579 1
Best practices for effective attack surface analysis Benson Kuria Macharia Jul. 18, 2023 1659 -
AWS vulnerability scanning using the Snyk integration Matt Jarvis Feb. 10, 2021 2419 -
Secure password hashing in Go Love Bhardwaj Dec. 05, 2023 3088 -
How Spotify uses Snyk to secure the SDLC Brian Piper Sep. 13, 2022 919 -
Announcing the open beta of Snyk's revamped security reporting Daniel Berman Nov. 09, 2022 1354 -
Webhook Security Best Practices Gints Dreimanis Jul. 06, 2022 1168 -
New IaC security workshop from Snyk, HashiCorp, and AWS at KubeCon Europe 2023 and on-demand Sarah Conway Apr. 10, 2023 1035 -
SnykCon 2021 Partner Day recap: New partners, service offerings, and Snyk Apps Sarah Conway Oct. 08, 2021 916 -
Snyk is your security companion for Amazon CodeWhisperer Liqian Lim (林利蒨) Nov. 29, 2023 1817 -
6 steps for scaling risk-based AppSec programs Julia Kraut Oct. 13, 2023 938 -
Best practices for API gateway security Kuria Macharia Sep. 07, 2022 1510 -
Power up security collaboration with Snyk and Slack Sarah Conway Oct. 23, 2023 271 -
Take actions to improve security in your Docker images Brian Vermeer Apr. 17, 2019 1686 1
Exploiting HTTP/2 CONTINUATION frames for DoS attacks Vandana Verma Sehgal Apr. 08, 2024 696 -
Repo Jacking: The Great Source-code Swindle Elliot Ward Jul. 25, 2024 2516 -
How to maintain npm dependencies in your project José Pérez Rivas Jun. 11, 2020 972 -
Safely handling containers Tales Casagrande Jun. 22, 2022 729 -
Security implications of cross-origin resource sharing (CORS) in Node.js Victor Ikechukwu Sep. 13, 2023 2582 -
The world since coronavirus: adapting quickly to a fully remote environment Dipti Salopek Mar. 16, 2020 686 -
Shifting responsibly left with the enhanced Snyk security gating on pull requests Daniel Berman Mar. 31, 2020 810 -
How cloud transforms IT security into AppSec Guy Podjarny Mar. 12, 2020 1565 3
Using Rego as a generic policy language Dickson Boateng Jun. 03, 2022 1323 -
Fetch the Flag CTF 2022 writeup: Disposable Message Michael Aquilina Nov. 10, 2022 2421 -
Snyk partners with the makers of Greenkeeper to help developers proactively maintain dependency health Daniel Berman Mar. 05, 2020 754 -
JavaScript and Node.js Security – The Common Pitfalls Guy Podjarny Apr. 11, 2018 172 -
Serverless Security implications—from infra to OWASP Guy Podjarny Apr. 19, 2017 2307 114
Fetch the Flag CTF 2022 writeup: Treasure Trove Luke Watts Nov. 10, 2022 572 -
10 npm Security Best Practices Liran Tal Feb. 19, 2019 3184 3
How to write your first unit test in JavaScript Raphael Mun Oct. 28, 2022 1600 2
Scanning Docker images for key binaries - going beyond package managers Liron Lifshitz-Yadin Feb. 07, 2019 312 -
Snyk highlights AWS re:Invent 2023 David Lugo Dec. 14, 2023 820 -
The Snyk Perpetual Key Rotation Machine Megan Moore Apr. 01, 2023 1000 -
Developer-centric DAST with Bright Security Vitaly Unic Apr. 14, 2023 1496 -
Scoring security vulnerabilities 101: Introducing CVSS for CVEs Liran Tal May. 16, 2019 2268 1
Embrace your next cybersecurity career with The Big Fix Liran Tal Feb. 22, 2023 692 -
The XZ backdoor CVE-2024-3094 Liran Tal Mar. 31, 2024 1800 -
How Snyk can help secure supply chains per "A Guide to Implementing the Software Bill of Materials (SBOM) for Software Management"’ by Japan's METI Hiroko Nakano Aug. 01, 2023 566 -
Career growth in a scale-up world Dipti Salopek Aug. 17, 2020 674 -
10 Eclipse plugins you shouldn’t code without Brian Vermeer Aug. 15, 2019 1295 3
Snyk fix: Automatic vulnerability remediation from the Snyk CLI Daniel Berman Oct. 07, 2021 1302 -
Patches of Pride: Love, inclusivity, & cute pets in celebration of Pride month Ashley Ladd Jun. 20, 2023 463 -
Snyk’s new native integration with Bitbucket Cloud emphasizes dev-first security Sarah Conway Oct. 25, 2022 847 -
Malicious remote code execution backdoor discovered in the popular bootstrap-sass Ruby gem Liran Tal Apr. 04, 2019 1109 147
ReDoS vulnerabilities in npm spikes by 143% and XSS continues to grow Liran Tal Feb. 26, 2019 1235 1
Cloud security fundamentals part 3: Empower your developers Drew Wright Oct. 21, 2022 1044 -
Using ES2015 Proxy for fun and profit Alon Niv Aug. 23, 2016 1147 2
Snyk's AppSec journey in 2022 Jason Lane Jan. 11, 2023 1554 -
Choosing the best Node.js Docker image Liran Tal, Adrian Mouat Sep. 30, 2022 3033 2
Introducing Snyk Training, our online learning platform Michele Wiedemer Aug. 11, 2022 424 -
10 AWS security considerations when migrating Drew Wright Nov. 29, 2022 1455 -
Bolstering Snyk's developer security platform in 2022 Daniel Berman Jan. 09, 2023 2059 -
Teaming up with Sysdig to deliver developer and runtime Kubernetes security Jim Armstrong Feb. 16, 2022 679 -
Kicking off 2022 by recognizing DevSecOps leaders Jeff Yoshimura Jan. 06, 2022 1146 -
Snyk integrates with AWS CloudTrail Lake to simplify security audits David Lugo Feb. 01, 2023 551 -
Fastify plugins as building blocks for a backend Node.js API Liran Tal May. 28, 2024 2479 -
Local Type Inference Cheat Sheet for Java 10 and beyond! Simon Maple Apr. 26, 2018 1868 3
Snyk scanning capabilities are now embedded in Jira Software Sarah Conway Jun. 06, 2023 658 -
Is your website vulnerable? Let’s fix it! Liran Tal Mar. 05, 2020 807 -
InCyber Forum Europe recap: 4 tips from DevSecOps experts Nina McClure Aug. 14, 2024 1217 -
Launching .NET support for GitHub, Bitbucket and GitLab Ariel Ornstein Feb. 04, 2019 448 -
8 Azure Repos Security Best Practices Simon Maple May. 06, 2019 92 -
Exploring the Spring Security authorization bypass (CVE-2022-31692) Brian Vermeer Dec. 16, 2022 1121 -
XSS Attacks: The Next Wave Guy Podjarny Jun. 08, 2017 1700 88
Severe security vulnerability in Bower’s zip archive extraction Liran Tal Jan. 31, 2019 995 2
Key points from Google and Accenture's ransomware white paper Vandana Verma Sehgal Nov. 07, 2022 1459 -
Snyk Week of Impact 2023: A week of meaningful contributions and community engagement Bianca Matei Nov. 08, 2023 567 -
A post-mortem of the malicious event-stream backdoor Danny Grander, Liran Tal Dec. 06, 2018 1470 -
SnykLaunch recap: Custom Base Image Recommendations Jamie Smith Apr. 04, 2023 1133 -
Demystifying the AWS shared security responsibility model David Lugo Nov. 13, 2023 1004 -
Tips for hardening your container image security strategy Matt Jarvis Jul. 14, 2021 1166 -
Snyk Container in 2021: Shifting container security all the way left Jim Armstrong Dec. 22, 2021 1386 -
Shifting compliance left: Helping legal teams and developers cooperate around licensing issues Rachel Cheyfitz Oct. 03, 2019 622 -
Automating Kubernetes workload security reporting Rags Srinivas Mar. 02, 2020 590 -
Mitigating path traversal vulns in Java with Snyk Code Brian Vermeer Mar. 06, 2023 1044 2
Developer driven workflows: Dockerfile image scanning, prioritization, and remediation Eric Smalling Mar. 26, 2021 5791 -
How to integrate ASPM with your application security program Vandana Verma Sehgal Nov. 28, 2023 1258 -
Log4Shell remediation cheat sheet Simon Maple Dec. 14, 2021 1602 19
Top considerations for addressing risks in the OWASP Top 10 for LLMs Simon Maple Sep. 07, 2023 3135 -
Building an application security battle plan: Home Alone edition Brian Clark Dec. 20, 2022 898 -
Java configuration: how to prevent security misconfigurations Brian Vermeer Feb. 26, 2021 1069 -
Snyk Code adds Go security scanning Frank Fischer Oct. 14, 2021 782 -
Top ten Docker images contain over 8000 vulnerable paths Hayley Denbraver Mar. 07, 2019 955 11
Snyk chats with Shutterstock about building a DevSecOps culture Brian Piper Apr. 02, 2021 844 -
Swift deserialization security primer Sam Sanoop Jul. 18, 2023 1155 -
Implementing TLS in Kubernetes Rubaiat Hossain Jul. 31, 2023 2063 -
Bitbucket Server Integration in Beta Guy Podjarny Jun. 07, 2017 237 -
Container security throughout the SDLC Gareth Rushgrove Oct. 16, 2019 884 -
Deploying a Gatsby site to GitHub Pages from Travis CI Liran Tal Dec. 03, 2019 646 -
190,000 users affected by Docker Hub’s security breach. Now what? Liran Tal Apr. 29, 2019 717 1
Ruby email rule removed from Snyk Code Frank Fischer Oct. 13, 2022 594 -
Cloud security updates you need to know from re:Invent 2022 Ashish Rajan Dec. 21, 2022 2303 -
How to secure a REST API? Liran Tal Jun. 27, 2024 2768 -
Proactively fixing vulnerabilities to maintain Java security and project hygiene with Snyk Lee Turner Nov. 16, 2021 876 -
Implementing TLS/SSL in Python Kingsley Ubah Oct. 16, 2022 1489 -
Find and fix vulnerabilities in your CI/CD pipeline with Snyk and Harness Pas Apicella Dec. 10, 2021 1406 -
2022 Container Security Trends Report: Exploring ownership, education, expertise, and more Megan Moore Apr. 27, 2022 737 -
Getting started with query parameterization Mary Gathoni Oct. 24, 2023 2337 -
Fetch the Flag CTF 2022 writeup: Not So Smart Fridge Antonio Gomes Nov. 10, 2022 1026 -
How Atlassian used Snyk to solve Log4Shell Sarah Conway Nov. 16, 2022 813 -
10 best practices to containerize Node.js web applications with Docker Liran Tal, Yoni Goldberg Sep. 15, 2022 6338 -
Finding and fixing insecure direct object references in Python Keshav Malik Jul. 19, 2023 1509 -
Preventing SQL injection in C# with Entity Framework Brian Vermeer Jul. 30, 2024 1273 -
Snyk and StackHawk form strategic alliance to equip app teams with modern, developer-first security testing David Lugo May. 02, 2022 716 -
Scaling Snyk fast with copy-paste orgs Anna Debenham Oct. 11, 2018 375 -
Brian Vermeer named one of Business Insider’s "21 Top Developers Shaping Tech and Forging New Paths" Liran Tal Aug. 03, 2021 353 -
Securing the web (forward) Daniel Appelquist Mar. 27, 2023 1233 -
Putting container security in the hands of developers Leigh Moore Nov. 12, 2019 331 2
Open source security with O’Reilly author Guy Podjarny Hayley Denbraver Aug. 30, 2019 1493 -
Lessons learned from the Argo CD zero-day vulnerability (CVE-2022-24348) Eric Smalling Feb. 10, 2022 1375 -
JVM Ecosystem Report 2018 Simon Maple Oct. 17, 2018 1200 -
Securing cloud infrastructure for PCI review DeveloperSteve Coochin Mar. 03, 2022 2080 -
Using Snyk to implement end-to-end DevSecOps on Microsoft Azure Daniel Berman May. 26, 2020 752 -
Announcing automated fixes for vulnerabilities in .NET dependencies Daniel Berman Nov. 17, 2021 1349 -
Snyk AppRisk Pro: A holistic approach to application risk management Daniel Berman May. 01, 2024 1597 -
Securing container applications using the Snyk CLI Hadar Mutai Aug. 30, 2022 489 -
Exploring the advanced technologies behind Snyk Code Frank Fischer Oct. 20, 2021 1155 -
Mitigating ImageMagick vulnerabilities in Node.js Guy Podjarny May. 06, 2016 623 7
Secure AI tool adoption: Perceptions and realities Alex Salkever Jun. 04, 2024 733 -
Python Mocking 101: Fake it before you make it Mike Lin Feb. 10, 2018 2272 -
Announcing Snyk for Ruby Guy Podjarny Nov. 10, 2016 482 -
Why your team should attend SnykCon 2020 Simon Maple Oct. 07, 2020 535 -
Mental Health Awareness Month: How losing my father changed me Tim Leroy May. 31, 2022 957 -
Building Vue 3 components with Tailwind CSS Mary Gathoni Feb. 21, 2023 2017 -
Announcing Snyk-Powered Linting in Sonar Tim Kadlec Oct. 25, 2017 517 -
Automatic source locations with Rego Jasper Van der Jeugt Feb. 12, 2024 2614 -
New year ushers in new wave of Snyk Technology Alliance Partner Program members Sarah Conway Jan. 12, 2023 444 -
Fixing XXE Vulnerabilities in Nokogiri Tim Kadlec Feb. 14, 2017 740 -
Allyship and advocacy: Celebrating Disability Pride Month at Snyk Alex Fallon Jul. 27, 2022 1764 -
Discover package vulnerabilities with the Snyk integration for JSDelivr Brian Vermeer Jun. 08, 2020 301 -
4 AI coding risks and how to address them Liqian Lim (林利蒨) Jun. 13, 2024 1200 -
Understanding Amazon S3 security and compliance on AWS Drew Wright May. 10, 2019 1606 -
Looking at the Snyk integration with Red Hat CodeReady Dependency Analytics Sarah Conway Sep. 03, 2020 374 -
Announcing the Snyk Business trial: Security across the SDLC Mariah Gresham Feb. 15, 2022 612 -
Why “vulnerability management” falls short in modern application security Daniel Berman Jun. 13, 2024 988 -
Leaky Vessels deep dive: Escaping from Docker one syscall at a time Rory McNamara Feb. 06, 2024 10279 4
Critical WebP 0-day security CVE-2023-4863 impacts wider software ecosystem Brian Clark, Eric Smalling, Jonathan Moses Sep. 28, 2023 1825 -
Revisiting unit testing and mocking in Python Mike Lin Jul. 07, 2018 1847 -
OSPO security evolution: The Kübler-Ross Model of open source Dan Appelquist Jan. 12, 2023 783 -
Snyk integrates with Amazon EventBridge to enable secure AppDev at scale David Lugo Jun. 12, 2023 735 -
Don’t build security tools, build developer tools instead Guy Podjarny Jan. 09, 2018 724 -
Proxy authentication in Snyk CLI for Windows Steve Winton Oct. 06, 2022 297 -
Snyk Fetch the Flag CTF 2023 writeup: Silent Cartographer John Hammond Nov. 30, 2023 362 -
10 Kubernetes Security Context settings you should understand Eric Smalling Mar. 10, 2021 2720 2
See Snyk and GitHub in action at GitHub Universe Sarah Conway Nov. 13, 2019 257 -
Application vulnerability management best practices Mariah Gresham Aug. 06, 2024 1240 -
Snyk recognized as an Emerging Segment Leader in Application Security in Snowflake's Next Generation of Cybersecurity Applications report LaToya Muff Dec. 11, 2023 658 -
Gitpod remote code execution 0-day vulnerability via WebSockets Elliot Ward Feb. 27, 2023 2121 1
A day in the life of an ethical hacker Sonya Moisset Jun. 05, 2023 2679 -
How to prevent open redirect vulnerabilities in Laravel Kevin Kimani Dec. 27, 2023 1696 -
Bringing cloud native application security full circle Erin Cullen Jun. 08, 2022 845 -
Snyk Voted Next European Unicorn for B2B Enterprise Guy Podjarny May. 22, 2019 422 -
Find and fix HTTP/2 rapid reset zero-day vulnerability CVE-2023-44487 Jamie Smith, Kriti Dogra, Anthony Larkin Oct. 11, 2023 1225 -
Six takeaways from our ASPM masterclass series Erin Cullen Apr. 10, 2024 1110 -
Snyk increases investment in partners with new Snyk Technology Alliance Partner Program Cara Sampson Apr. 27, 2022 1502 -
The 5 dimensions of an npm dependency Guy Podjarny Jun. 16, 2016 1640 8
Add a SECURITY.md file to your Azure Repos Simon Maple May. 06, 2019 718 -
Snyk has acquired DevSecCon! Guy Podjarny Jul. 24, 2019 699 -
3 tips for effective developer security training Mariah Gresham Dec. 01, 2022 1127 -
Snyk transformed cloud security in 2022 with developer-first solution Lauren Place Jan. 11, 2023 1211 -
Snyk Fetch the Flag CTF 2023 writeup: Off the SETUID Carlos Polop Nov. 30, 2023 1710 -
Three expert tips for cultivating secure software development practices Simon Maple Mar. 01, 2023 896 -
Spring4Shell: The zero-day RCE in the Spring Framework explained Brian Vermeer Apr. 01, 2022 927 -
5 Common open source security myths everyone needs to know Karl Hopkinson-Turrell Apr. 24, 2020 1031 -
Introducing Snyk developer-first security into the Terraform Cloud workflow Sarah Conway Oct. 06, 2021 759 -
Goodbye, 2020! Look out, 2021 Peter McKay Jan. 26, 2021 393 -
Node.js multithreading with worker threads: pros and cons James Walker Feb. 27, 2023 2120 2
How to effectively detect and mitigate Trojan Source attacks in JavaScript codebases with ESLint Liran Tal Nov. 10, 2021 1219 -
How Datto made developer-first security a reality with Snyk Brian Piper Nov. 09, 2021 1125 -
Announcing Snyk’s new Global Service Provider program Cyndi Doyle Feb. 23, 2022 696 -
Website security score explained Liran Tal May. 13, 2020 677 -
Serverless is great, but what about the security of my AWS Lambda functions and their dependencies? Liran Tal Jul. 03, 2019 961 1
Securing your open source dependencies with the Snyk Visual Studio Code extension Daniel Berman Nov. 23, 2021 1040 -
Attacking an FTP Client: MGETting more than you bargained for Danny Grander Apr. 04, 2018 1603 1
Code injection in Python: examples and prevention Lucien Chemaly Dec. 06, 2023 1807 -
Introducing service accounts: API tokens for your org Anna Debenham Jun. 12, 2018 172 -
Mitigating clickJacking — the DevSecOps way! Omer Levi Hevroni May. 25, 2020 798 -
SnykCon 2021 is almost here! Randall Degges Aug. 24, 2021 1382 -
Django security tips Hayley Denbraver Mar. 25, 2020 1481 -
Improving GraphQL security with static analysis and Snyk Code Sam Sanoop Apr. 12, 2022 1528 -
How can a Content Security Policy prevent XSS and other vulnerabilities? Luke Watts Feb. 09, 2020 900 -
Snyk research team discovers severe prototype pollution security vulnerabilities affecting all versions of lodash Liran Tal Jul. 05, 2019 925 10
SnykHer celebrates International Women’s Day 2022 Jess Katz Mar. 07, 2022 697 -
Visibly invisible malicious Node.js packages: When configuration niche meets invisible characters Aviad Hahami Feb. 28, 2022 1240 -
Mental Health Awareness—three important manager lessons that I couldn’t have done without Ella Gee May. 21, 2020 1066 -
Git checkout remote branch: how it works and when to use it Brian Vermeer Dec. 15, 2020 835 -
PulseMeter Report: Software supply chains Erin Cullen Mar. 21, 2023 708 -
4 best practices for cultivating developer security adoption Erin Cullen Apr. 20, 2023 897 -
Kubernetes open sourced their security audit. What can we learn? Hayley Denbraver Aug. 08, 2019 894 2
Applying the principle of least privilege to Kubernetes using RBAC Jekayin-Oluwa Olabemiwo Aug. 29, 2022 1734 -
How and when to use Docker labels / OCI container annotations Eric Smalling Nov. 03, 2021 1617 -
2020 Q3 in review—Snyk & DeepCode, Angular security best practices, and more Simon Maple Dec. 30, 2020 1009 -
Cloud Security Podcast awarded SANS Podcast of the Year Jeff Yoshimura Dec. 19, 2022 830 -
Introducing open source security runtime monitoring Aner Mazur Nov. 12, 2018 783 -
Creating an automated cloud infrastructure testing tool with Terraform and PyTest Drew Wright Mar. 27, 2020 3559 -
A stepping stone towards holistic application risk and compliance management of the Digital Operational Resiliency Act (DORA) Ben Desjardins Jul. 11, 2024 1834 -
Top 5 VS Code extensions for security Brian Clark Aug. 24, 2023 1654 -
Celebrating Juneteenth at Snyk Sherica Bryan Jun. 16, 2023 858 -
Vulnerabilities in NodeJS C/C++ add-on extensions Alessio Della Libera Aug. 14, 2024 2808 -
To our Community from the Snyk Team Peter McKay Mar. 13, 2020 266 -
Snyk and Atlassian, Sitting in a Tree Aner Mazur Aug. 24, 2017 618 -
Code injection vulnerabilities (CVSSv3 5.8) found in Snyk CLI and IDE plugins Carm Janneteau Nov. 30, 2022 585 -
Advancing SBOM standards: Snyk and SPDX Gareth Rushgrove Jun. 16, 2021 829 -
5 "no experience needed" tips for building secure applications Liran Tal Dec. 27, 2022 997 -
How to install Ruby in a macOS for local development Liran Tal Sep. 27, 2022 1579 -
Our privilege is our responsibility Dipti Salopek Jun. 05, 2020 470 -
Fix cloud security issues faster and at the source with Snyk IaC Anthony Larkin Apr. 04, 2023 632 -
Improving the UI/UX of the Snyk VS Code extension Andy Gongea Nov. 21, 2023 702 -
Best practices for Kubernetes Secrets management Eric Kahuha Nov. 16, 2022 1777 -
Snyk Learn now aligns with the NIST NICE Workforce Framework Michael Biocchi Jun. 07, 2023 471 -
RSA 2020: who we met and what we learned Peter McKay Mar. 02, 2020 385 -
Common SAML vulnerabilities and how to remediate them Sam Sanoop Dec. 19, 2023 966 -
The Secure Developer: Security champions recap Sam Hepburn Jun. 14, 2023 1365 -
Introducing the Snyk Ambassador program: A call for nomination to champion application security Liran Tal Aug. 16, 2021 540 -
February in review: JVM Ecosystem Report, Python and Container Updates, and more Hayley Denbraver Feb. 28, 2020 558 -
How community participation can enhance your development career Randall Degges Nov. 15, 2022 1117 -
Introducing the new Snyk UI Steve Winton Sep. 29, 2022 383 -
What can you do with an enriched SBOM? A parlay quickstart guide Gareth Rushgrove Jun. 07, 2023 1077 -
Why speed matters in Static Application Security Testing (SAST) Frank Fischer Aug. 20, 2021 698 -
Snyk kicks off Community Outreach Internship Program Dipti Salopek Feb. 11, 2021 537 -
Snyk named a Leader in 2023 Gartner® Magic Quadrant™ for Application Security Testing Manoj Nair May. 23, 2023 949 -
Java dependency management: how many lines of code does my application hold? Brian Vermeer Aug. 12, 2020 795 -
An unintimidating introduction to the dark arts of C/C++ vulnerabilities Aviad Hahami Apr. 15, 2022 1513 -
Preventing server-side request forgery in Node.js applications David Ekete Feb. 20, 2024 1759 -
Secure your Kubernetes applications with Snyk Container Gareth Rushgrove Nov. 12, 2019 434 -
Responsible disclosure: CodeCov CEO & CTO share learnings from the breach Mariah Gresham Dec. 09, 2021 1186 -
Symmetric vs. asymmetric encryption: Practical Python examples Josh Amata May. 15, 2024 4010 -
GDPR Compliance and Open Source Ellen Van Keulen Sep. 26, 2017 665 -
Improving code quality with linting in Python Keshav Malik Oct. 12, 2022 1767 2
Keeping Docker secrets secure (even if you’re not using Kubernetes) Marcelo Oliveira Aug. 24, 2022 1484 -
Making climate positive changes Luke Watts Sep. 05, 2019 609 -
dompdf security alert: RCE vulnerability found in popular PHP PDF library DeveloperSteve Coochin Mar. 18, 2022 1185 -
84% of all websites are impacted by jQuery XSS vulnerabilities Liran Tal Oct. 30, 2019 781 -
5 best practices for React with TypeScript security Marcelo Oliveira Dec. 08, 2022 1755 -
48% see security a major constraint on the ability to deliver software quickly Liran Tal Jan. 28, 2020 975 -
Snyk named a 2023 Gartner Peer Insights™ Customers’ Choice for Application Security Testing Ciana Abdollahian Dec. 04, 2023 622 -
How to use GitHub Actions environment variables Lewis Gavin Nov. 22, 2022 1877 -
Preventing broken access control in express Node.js applications Ben Smitthimedhin May. 22, 2024 2923 -
Open Source Vulnerabilities and Security with Microsoft’s Jeff McAffer Hayley Denbraver Nov. 20, 2019 841 -
The SecurityManager is getting removed in Java: What that means for you Mdu Sibisi Jun. 15, 2023 2238 -
Welcoming Karyn Smith: Snyk’s new Chief Legal Officer Peter McKay Feb. 07, 2022 539 -
A Snyk peek into Node.js and npm’s state of open source security report 2019 Liran Tal Oct. 09, 2019 700 1
Happiness in the year of COVID-19 Dipti Salopek Oct. 15, 2020 473 -
Do you know how healthy your .NET dependencies are? Hayley Denbraver May. 03, 2019 1550 -
Building an npm package compatible with ESM and CJS in 2024 Liran Tal Apr. 18, 2024 1082 -
Investing in our planet: One tree planted for each new Snyker Tori Hay Lindahl Apr. 22, 2022 444 -
Extend the power of your AppSec data with the new Snyk and Snowflake integration Guy Plotnik Aug. 06, 2024 1095 -
Meet (and join) our newest Snyk Ambassadors – Fall 2022 edition! Gerald Crescione Sep. 19, 2022 861 -
How AppSec has evolved in 2021: Reddit’s perspective Brian Piper May. 03, 2021 1077 -
Navigating your own career growth in a hyper-growth startup Dipti Salopek Jan. 07, 2020 849 -
Vulnerability disclosure: Which comes first, the security bug in PHP or the CVE? Liran Tal Dec. 19, 2023 841 -
Snyk sponsors Snowflake Summit LaToya Muff Jun. 04, 2024 569 -
An investigation into code injection vulnerabilities caused by generative AI Jack Hair Apr. 16, 2024 983 -
Lessons from OpenSSL vulnerabilities part 1: Preparing your supply chain for the next critical vulnerability Jamie Smith Apr. 19, 2023 1133 -
Snyk Raises $70M to Accelerate Dev-first Security Peter McKay Sep. 09, 2019 409 -
Announcing Social Trends: Use social media for security intelligence Daniel Berman Jul. 28, 2021 1232 -
Log4j vulnerability explained: Prevent Log4Shell RCE by updating to version 2.17.1 Brian Vermeer Dec. 10, 2021 1135 -
March in review: State of Open Source Security survey, All.The.Talks virtual conference, and more Eirini-Eleni Papadopoulou Mar. 31, 2020 621 -
How Atlassian CISO Adrian Ludwig built a world-class product security team Ravi Maira Oct. 28, 2020 728 -
Managing license compliance across your organization with Snyk’s license policies Josefa Riveros Apr. 30, 2020 741 -
JavaScript type confusion: Bypassed input validation (and how to remediate) Alessio Della Libera Nov. 03, 2021 2957 9
Manage security issues in Jira with Snyk Security in Jira Cloud LaToya Muff Aug. 09, 2023 330 -
Lessons from OpenSSL vulnerabilities part 2: Finding and fixing supply chain vulnerabilities Jamie Smith Apr. 26, 2023 1977 -
Using the Snyk API to find and fix vulnerabilities Josh Emerson Jan. 03, 2018 1230 -
5 tips to supercharge app security from code to cloud Sonya Moisset Aug. 08, 2023 2759 -
The dangers of setattr: Avoiding Mass Assignment vulnerabilities in Python Jack Hair Feb. 15, 2023 1334 -
Understanding DNS attacks: Identifying and patching vulnerabilities Nihad Hassan Oct. 26, 2022 2002 -
Shifting Docker security left Brian Vermeer Apr. 17, 2019 924 -
Announcing Snyk for .NET, Go and PHP Aner Mazur Dec. 21, 2017 733 -
Which of the OWASP Top 10 Caused the World’s Biggest Data Breaches? Guy Podjarny May. 10, 2017 2799 17
Protect container images directly from your registries Liron Lifshitz-Yadin Apr. 30, 2019 465 -
Build a software bill of materials (SBOM) for open source supply chain security Liran Tal Mar. 14, 2022 2599 -
Enterprise security: Digital transformation and risk management with Anheuser-Busch Inbev and Manulife Brian Piper Feb. 03, 2022 875 -
Buildkit mount cache race: Build-time race condition container breakout (CVE-2024-23651) Rory McNamara Jan. 31, 2024 1022 -
Serverless Security at Serverless Conf Guy Podjarny Apr. 28, 2017 155 -
Ghostcat breach affects all Tomcat versions Brian Vermeer Feb. 26, 2020 491 1
Helping Python developers shift security left with a new PyCharm plugin Daniel Berman Sep. 08, 2020 750 1
AWS re:Inforce 2022 recap Shilpi Bhattacharjee Aug. 08, 2022 2487 -
Providing Comprehensive Application Security from Code to Production: New Snyk and Hdiv Security Partnership Carey Stanton Oct. 26, 2021 406 -
Snyk and Bitbucket best practices cheat sheet Marco Morales Mar. 03, 2022 915 -
XS leaks: What they are and how to avoid them Gino Diño Jul. 17, 2023 2287 1
36% of developers switched from Oracle JDK to an alternate OpenJDK distribution, over the last year Brian Vermeer Feb. 05, 2020 736 3
SAS and Snyk discuss the future of AI for development and security teams Brian Piper Oct. 09, 2023 848 -
Snyk Open Source adds C/C++ security scanning for unmanaged dependencies Michal Brutvan Apr. 05, 2022 768 -
How Onna Technologies uses Snyk & Sysdig to secure the SDLC while saving time and money Brian Piper Sep. 12, 2022 1297 -
Suspicious Maintainer Unveils Threads of npm Supply Chain Attack Liran Tal Jul. 16, 2024 1524 -
Turn the senior around: an alternative way to lead engineering teams Shai Mendel Nov. 30, 2020 1085 -
How to prevent Trojan Source attacks with Snyk Code Frank Fischer Nov. 17, 2021 957 -
Cloud security fundamentals part 1: Know your environment Drew Wright Oct. 07, 2022 1098 -
New Year's security resolutions for 2024 from Snyk DevRel, SecRel, and friends Micah Silverman Jan. 18, 2024 1188 -
The State of Open Source Security Survey Simon Maple Nov. 06, 2018 292 -
Buildkit build-time container teardown arbitrary delete (CVE-2024-23652) Rory McNamara Jan. 31, 2024 879 -
Launching the Snyk Community Outreach Internship Program Peter McKay Nov. 16, 2020 302 -
Staying ahead of security vulnerabilities with security patches Liran Tal Jul. 31, 2019 1140 -
What you should know about PHP code security Liran Tal Sep. 04, 2024 1773 -
Actionable and aggregated Slack notifications Anna Debenham Aug. 23, 2018 301 -
Import an existing infrastructure into Terraform Stephane Jourdan Jul. 02, 2020 1089 -
Secure your software supply chain with the new Snyk Vulnerability Intelligence for SBOM ServiceNow integration Sarah Conway Nov. 07, 2023 531 -
Sum a List of numbers in Java Brian Vermeer May. 22, 2020 817 -
Snyk documentation: Our journey so far David Bailey Feb. 29, 2024 978 -
Snyk and ServiceNow collaborate on new SBOM solution Sarah Conway May. 16, 2023 470 -
Celebrating Father’s Day at Snyk Snyk Team Jun. 17, 2022 93 -
CTF secrets revealed: TopLang challenge from SnykCon 2021 explained Michael Aquilina Jan. 06, 2022 2987 -
Remove sensitive data in your files and Azure Repos history Simon Maple May. 06, 2019 199 -
JVM Ecosystem report 2018 - About your Tools Simon Maple Oct. 17, 2018 1278 -
Snyk Open Source in 2021: A year of innovation Daniel Berman Dec. 21, 2021 1298 -
Privileged Docker containers—do you really need them? Matt Jarvis Nov. 05, 2020 1328 2
Backstage integration with the Snyk API Matt Jarvis Mar. 17, 2021 781 -
Snyk $22M Series B: Thanks to our community! Guy Podjarny Sep. 25, 2018 802 -
Understanding Responsible Disclosures Tim Kadlec Jan. 31, 2017 1577 1
Agent hijacking: The true impact of prompt injection attacks Elliot Ward, Rory McNamara, Mateo Rojas-Carulla, Sam Watts, Eric Allen Aug. 28, 2024 2758 -
Mimic your mental model with Project Collections Waleed Arshad Jun. 27, 2023 745 -
Best practices for containerizing Python applications with Docker Liran Tal Nov. 11, 2021 4280 -
Rego 103: Types of values and rules Jasper Van der Jeugt, Becki Lee Nov. 16, 2023 3425 -
Building Java container images using Jib Eric Smalling Aug. 17, 2021 3081 -
Introducing new Snyk AppRisk integrations: Enhancing application risk management with development context Daniel Berman Aug. 01, 2024 890 -
A developer-centric approach to software Mariah Gresham Feb. 18, 2022 1108 -
Celebrate International Women’s Day with Snyk Hayley Denbraver Mar. 08, 2019 370 -
Understanding Kubernetes Pod Security Standards Gino Diño Jun. 20, 2023 1389 -
Vulnerability remediation process: reducing your vulnerability backlog with Snyk’s automatic backlog PRs Daniel Berman Oct. 22, 2020 835 -
Avoiding mass assignment vulnerabilities in Node.js Benson Kuria Macharia Mar. 28, 2023 2321 -
Snyk Fetch the Flag CTF 2023 writeup: Honey Baked Messages John Hammond Nov. 30, 2023 298 -
Snyk is now also hosted in the EU providing regional data residency Daniel Berman Jun. 28, 2022 633 -
Bower is dead, long live npm. And Yarn. And webpack. Assaf Hefetz Dec. 05, 2017 1077 -
Essential Node.js backend examples for developers in 2024 Liran Tal Jun. 12, 2024 2643 -
Python language support now beta in Snyk Code Frank Fischer Apr. 13, 2021 458 -
Celebrating Asian American and Pacific Islander Heritage Month Snyk Team May. 27, 2022 1141 -
Introducing Snyk Learn: Free developer security education Edgar Kussberg Oct. 06, 2021 684 -
Architecting a Serverless web application in AWS Drew Wright May. 09, 2016 3036 -
Announcing Snyk for Bitbucket Pipelines Guy Podjarny Oct. 12, 2016 187 -
A developer’s best friend: Lessons learned from our canine companions about AI code security Krysta Williams-Timm Aug. 26, 2024 803 -
10 React security best practices Liran Tal Jul. 18, 2022 1130 2
Preventing XSS in Django Liran Tal Mar. 13, 2023 1932 -
Snyk Code now secures AI builds with support for LLM sources Liqian Lim (林利蒨), Ranko Cupovic Jun. 25, 2024 571 -
Malicious code found in npm package event-stream downloaded 8 million times in the past 2.5 months Danny Grander Nov. 27, 2018 752 -
Prioritizing container vulnerabilities with exploit maturity Jim Armstrong Sep. 09, 2020 800 -
Launching Snyk Guy Podjarny Dec. 03, 2015 470 -
Spring4Shell extends to Glassfish and Payara: same vulnerability, new exploit Brian Vermeer Apr. 08, 2022 1015 -
Secure coding with Snyk Code: Ignore functionality with a twist Frank Fischer Mar. 30, 2021 944 -
SAST tools speed comparison: Snyk Code vs SonarQube and LGTM Frank Fischer Jul. 22, 2021 1443 -
Announcing Insights: Helping you focus on top risks for your organization Daniel Berman Jun. 07, 2023 1737 -
Priorities from the OpenSSF Secure Open Source Software Summit 2023 Dan Appelquist Oct. 04, 2023 381 -
Under the C: A glance at C/C++ vulnerabilities in Python land Aviad Hahami Apr. 28, 2022 1289 -
Requiring authentication in Snyk CLI Guy Podjarny Jan. 12, 2017 733 -
How open source C++ code can introduce security risks Snyk Security Research Team Aug. 22, 2022 1353 -
Snyk for your Enterprise Aner Mazur Sep. 19, 2017 380 -
Introducing the Snyk Partner Solutions Directory for discovering Snyk technology integrations Cara Sampson Apr. 03, 2023 996 -
Snyk’s Evolution: A Message From CEO Peter McKay Peter McKay Apr. 13, 2023 549 -
Secure Elixir development with Snyk Daniel Berman Apr. 27, 2021 1025 -
How to install Java on macOS Liran Tal Apr. 17, 2024 2820 -
Navigate 3 trends in financial services with DevSecOps Patrick Vandenberg Jul. 13, 2020 932 -
CISO playbook: 3 things to consider when establishing a security culture Simon Maple Mar. 09, 2023 1249 -
The State of Open Source Security Survey - 2020 Alyssa Miller Mar. 25, 2020 668 -
GitHub Copilot code security: XSS in React Liran Tal Oct. 19, 2023 2044 -
Security breach leaks the personal data of all 6.5 million Israeli voters Ran Bar zik Feb. 12, 2020 595 3
Announcing the Snyk and Docker Security Guide for Developers Jim Armstrong Nov. 18, 2020 668 -
Tightly control access to your Azure Repos Simon Maple May. 06, 2019 328 -
Setting up SSL/TLS for Kubernetes Ingress Peter De Tender Nov. 17, 2022 2245 -
Exploiting Buffer Guy Podjarny Apr. 05, 2016 1227 -
Never store credentials as code/config in Azure Repos Simon Maple May. 06, 2019 315 -
Snyk CLI cheat sheet Brian Vermeer Nov. 26, 2020 2369 -
Snyk Career Stories: Starting and growing your career through the Snyk SDR program Snyk Team Nov. 23, 2021 2045 -
What makes Fastify a successful project? Oren Hacohen Dec. 22, 2020 780 -
Security success in the Bay Area with Slack Mariah Gresham May. 17, 2023 878 -
Snyk expands in Asia-Pacific (APAC) with new datacenter in Sydney, Australia Daniel Berman Nov. 30, 2022 715 -
Get Snyk security alerts on Slack Johanna Kollmann Sep. 28, 2016 202 -
Secure your build workflow on Bitbucket Pipes with Snyk Noa Korem Mar. 05, 2019 776 -
How to setup Deno Dev Container on GitHub Codespaces? Liran Tal Jul. 18, 2024 2097 -
The Secret To Building A Truly Successful Freemium Product and more, with Guy Podjarny Simon Maple Dec. 19, 2018 571 -
Welcoming Kathleen Murphy and Zach Nelson to the Snyk Board of Directors Peter McKay Jan. 24, 2022 448 -
How to manage Terraform state? Stephane Jourdan May. 26, 2020 937 -
Magento security requires additional patch to fix sanitization vulnerability DeveloperSteve Coochin Feb. 24, 2022 711 -
Modernizing SAST rules maintenance to catch vulnerabilities faster Frank Fischer Apr. 19, 2022 928 -
Why npm lockfiles can be a security blindspot for injecting malicious modules Liran Tal Sep. 24, 2019 1068 259
Our Journey to Today Guy Podjarny Mar. 10, 2021 788 -
Command injection in Python: examples and prevention Rubaiat Hossain Dec. 21, 2023 2558 -
Securing your Kubernetes application development with Snyk and Tilt Matt Jarvis Jan. 11, 2021 2412 -
Meet (and join) our newest Snyk Ambassadors! Waleed Arshad Mar. 28, 2022 1783 -
Best practices for managing Java dependencies Brian Vermeer Aug. 26, 2022 1826 5
How to avoid web cache poisoning attacks Najia Gul Sep. 11, 2023 2155 -
How to secure Python Flask applications Gourav Singh Bais May. 21, 2024 4209 -
Fetch the Flag CTF 2023 sneak peek Danielle Bradford Sep. 06, 2023 187 -
Out of Beta, plus exciting new features Guy Podjarny Jun. 22, 2016 694 -
Secure code review: 8 security code review best practices Brian Vermeer, Trisha Gee Apr. 20, 2020 3180 -
A DevSecOps solution for your apps on AWS from Snyk David Lugo Nov. 28, 2023 900 -
Ignoring vulnerabilities with Snyk Daniel Berman May. 03, 2022 1845 -
Implementing TLS in Java Himanish Munjal Nov. 09, 2022 2166 -
Getting started with Snyk for secure Python development Daniel Berman Aug. 04, 2021 2033 -
Best practices for containerizing Go applications with Docker Jekayin-Oluwa Olabemiwo Mar. 23, 2022 2117 -
Arbitrary code execution in Grunt Alyssa Miller Sep. 21, 2020 872 -
10 Tips for getting that conference CFP accepted Liran Tal Dec. 03, 2020 1148 -
Snyk named as a top cybersecurity company in inaugural Fortune Cyber 60 2023 list Snyk Team Dec. 18, 2023 337 -
3 parameters to measure SAST testing Asaf Biton Aug. 03, 2021 1571 -
5 ways to prevent code injection in JavaScript and Node.js Liran Tal Apr. 06, 2021 2325 1
New years resolution: Don’t show my security tokens when hacking my demo application on stage Brian Vermeer Jan. 12, 2022 721 -
Snyk finds PyPi malware that steals Discord and Roblox credential and payment info Raul Onitza-Klugman Aug. 16, 2022 1689 -
AngularJS Security Fundamentals Liran Tal Mar. 17, 2020 3025 2
Announcing the 2017 State of Open Source Security Report Tim Kadlec Nov. 16, 2017 386 -
A definitive guide to Ruby gems dependency management Liran Tal Aug. 05, 2022 2618 1
Python now fully supported in Snyk Code Frank Fischer Jun. 03, 2021 493 -
Celebrating four years of developer-first integrations at Atlassian Team ‘21 Sarah Conway Apr. 26, 2021 750 -
Enriched content on Snyk’s publicly available vulnerability database Dan Mckean Apr. 08, 2019 511 -
Security vs. Development: A game of priorities Andrew MacKenzie Nov. 06, 2023 1009 -
Finding meaning amidst so much unknown Simon Maple Apr. 22, 2020 781 -
How MongoDB built a successful security champions program Sarah Wills Nov. 02, 2021 744 -
Identifying Insecure C Code with Valgrind and Fixing with Snyk Code Liran Tal Sep. 24, 2024 1373 -
Meet the new host for The Secure Developer podcast Mariah Gresham May. 09, 2024 469 -
How to mitigate security issues in GenAI code and LLM integrations Liran Tal Sep. 11, 2024 2394 -
Snyk Receives “Best CEO” Award Dipti Salopek Dec. 12, 2019 329 -
Announcing new Snyk AppRisk integration with Orca Security Daniel Berman Sep. 11, 2024 809 -
Want to avoid a data breach? Employ secrets detection Liran Tal Sep. 16, 2024 2539 -
Application security automation for GitHub repositories with Snyk Omer Levi Hevroni Mar. 31, 2021 941 -
Promise queues and batching concurrent tasks in Deno Liran Tal Sep. 25, 2024 3378 -
AWS re:Invent 2022: How Neiman Marcus transitioned to developer-first security Megan Moore Dec. 12, 2022 1231 -
5 reasons why developers at FinServ institutions are outpacing their security teammates Katie DeMatteis Sep. 09, 2024 822 -
Dive into AI and LLM learning with the new Snyk Learn learning path Michael Biocchi Sep. 18, 2024 310 -
Welcoming Gary Olson: Snyk’s new Chief Revenue Officer Peter McKay Mar. 04, 2024 444 -
How SAS secures their AI-generated code Gerald Crescione Apr. 15, 2024 1874 -
The journey to AppSec gold: Lessons we can learn from the Olympians Krysta Williams-Timm Aug. 15, 2024 714 -
Simplify Snyk and AWS integration with our latest AWS Quick Start Jay Yeras Sep. 22, 2020 424 -
Tools for infrastructure drift detection William Beuil Mar. 15, 2022 2480 -
Security Horror Story: Accidentally exposing PII data Brian Vermeer Oct. 25, 2021 1008 -
3 best practices to make the most of Snyk AppRisk Essentials Daniel Berman Sep. 19, 2024 1801 -
10 best practices to build a Java container with Docker Brian Vermeer Aug. 24, 2022 4147 -
Secure development in Visual Studio with Snyk Open Source Daniel Berman Jun. 09, 2021 689 -
Infosec Europe session: 4 tips for safer AI adoption Gerald Crescione Aug. 01, 2024 1103 -
How to prevent log injection vulnerability in JavaScript and Node.js applications Liran Tal Sep. 26, 2024 1504 -
Securing a DevOps pipeline with Snyk, Bitbucket, and AWS Marco Morales Jan. 04, 2022 456 -
SurveyMonkey talks with Snyk about developer security during hypergrowth Megan Moore May. 05, 2022 1381 -
Meet Snyk for Government: Our developer security solution with FedRAMP ATO Danny Allan Sep. 17, 2024 502 -
Operating security ownership at scale: Twilio’s perspective Brian Piper Aug. 30, 2021 885 -
Zero-day RCE vulnerability found in CUPS - Common UNIX Printing System Jim Armstrong Sep. 27, 2024 1224 -
Going beyond reachability to prioritize what matters most Jamie Smith Oct. 01, 2024 1149 -
Proactive AppSec continuous vulnerability management for developers and security teams Liran Tal Oct. 02, 2024 1804 -
Snyk named a 2024 Gartner Peer Insights™ Customers’ Choice for Application Security Testing for the 3rd consecutive year Nina McClure Oct. 02, 2024 723 -
The mysterious supply chain concern of string-width-cjs npm package Liran Tal Oct. 03, 2024 1455 -
SnykLaunch Oct 2024: Enhanced PR experience, extended visibility, AI-powered security, holistic risk management Anthony Larkin Oct. 08, 2024 1489 -
A look into your engineering interview at Snyk Philip Beevers Oct. 09, 2024 750 -
Foundations of trust: Securing the future of AI-generated code Danny Allan Oct. 10, 2024 888 -
Analyze Taint Analysis Faster with Improved Contextual Dataflow in Snyk Code Liran Tal Oct. 10, 2024 875 -
Automatically fix code vulnerabilities with AI Micah Silverman Oct. 14, 2024 1132 -
How Snyk is prioritizing developer experience Anthony Larkin Oct. 16, 2024 860 -
Snyk announces commitment to Service for America, bringing security education access to all Michael Biocchi Oct. 17, 2024 394 -
Ensuring comprehensive security testing in DevOps pipelines Jim Armstrong Oct. 17, 2024 1317 -
Introducing: Extensive AppSec visibility with Snyk Analytics Nastasha Casale Oct. 17, 2024 952 -
Elevating Views of Risk: Holistic Application Risk Management with Snyk Daniel Berman Oct. 22, 2024 1601 -
Women - Kickstart your Application Security Career! Vandana Verma Sehgal Oct. 22, 2024 1020 -
Find, auto-fix, and prioritize intelligently, with Snyk's AI-powered code security tools Liqian Lim (林利蒨) Oct. 24, 2024 2083 -
Vulnerability-Free C and C++ Development in Automotive Manufacturing and Software Defined Vehicles (SDV) Liran Tal Oct. 23, 2024 1469 -
Best Practices for Continuous Vulnerability Management Liran Tal Oct. 29, 2024 1698 -
Top 5 SAST Auto-fixing Tools and How They Compare Liqian Lim (林利蒨) Oct. 29, 2024 966 -
Lottie Player npm package compromised for crypto wallet theft Liran Tal Oct. 31, 2024 825 2
If you don’t know about HTTP Archive’s Web Almanac yet, you should! Brian Clark Nov. 01, 2024 710 -
Snyk Recharge days: Making time to take time Adriana Bokel Herde May. 17, 2023 710 -
GitFlops: The Dangers of Terraform Automation Platforms Elliot Ward Nov. 07, 2024 1831 -
Extending Developer Security with Dev-First Dynamic Testing Manoj Nair Nov. 12, 2024 1565 -
How ASPM boosts visibility to manage application risk Daniel Berman Nov. 12, 2024 1144 -
Exploring intent-based Android security vulnerabilities on Google Play Raul Onitza-Klugman May. 18, 2021 1495 -
5 Disaster Recovery Testing Methodologies Liran Tal Sep. 23, 2022 610 -
Understanding command injection vulnerabilities in Go Liran Tal Nov. 14, 2024 1891 1
5 Best Practices for Container security Liran Tal Jul. 19, 2022 985 -
Snyk named a Customer Favorite in The Forrester Wave™: Software Composition Analysis Software, Q4 2024 Report Peter McKay Nov. 13, 2024 460 -
Mitigating and remediating intent-based Android security vulnerabilities Raul Onitza-Klugman Jun. 02, 2021 1655 -
Phony PyPi package imitates known developer Elliot Ward Oct. 05, 2022 1031 2
An Introduction to capture the flag Sonya Moisset Sep. 13, 2023 828 -
6 Kubernetes Tools That Can Help Secure Containers at Runtime Liran Tal Jun. 08, 2022 481 -
Women in security: Inspiring leaders of today and tomorrow Jonaki Egenolf Nov. 19, 2024 433 -
How to prioritize vulnerabilities based on risk Daniel Berman Nov. 19, 2024 1153 -
A commitment to future generations: Snyk’s 2024 Student Edition Capture The Flag Recap Michael Biocchi Nov. 21, 2024 332 -
Why a solid DevOps foundation is vital for effective DevSecOps Ben Desjardins Nov. 27, 2024 1117 -
Measuring AppSec success: Key KPIs that demonstrate value Daniel Berman Nov. 26, 2024 1479 -
6 Reasons to use source code analysis Liran Tal May. 10, 2021 666 -
Seven steps to close coverage gaps with ASPM Daniel Berman Dec. 03, 2024 1023 -
2024 Open Source Security Report: Slowing Progress and New Challenges for DevSecOps Jamie Smith Dec. 03, 2024 973 -
Empowering women in security: The impact of mentorship Erin Cullen Nov. 27, 2024 696 -
Snyk-generated SBOMs now include license details for the open source libraries in your projects Jamie Smith Dec. 09, 2024 906 -
How to mitigate SSRF vulnerabilities in Go Liran Tal Dec. 10, 2024 910 -
Snyk’s risk-based approach to prioritization Daniel Berman Dec. 11, 2024 1082 -
Ultralytics AI Pwn Request Supply Chain Attack Stephen Thoemmes Dec. 11, 2024 1375 -
10 SDLC best practices to implement today Jamie Smith Jan. 14, 2022 1304 -
Microservices security: 6 best practice tips Jamie Smith Feb. 10, 2022 1226 -
Vulnerability vs Weakness: Understanding Key Differences in AppSec Daniel Berman Nov. 17, 2023 1934 -
7 Best practices for disaster recovery testing Liran Tal Sep. 23, 2022 805 -
Ethical Hacking: Top Tools Vandana Verma Sehgal Jun. 01, 2023 1601 -
Top 10 DevOps Tools Jamie Smith Mar. 21, 2021 1423 -
Security Vulnerability: types and remediation Rory McNamara Feb. 11, 2021 1352 -
Top 8 AWS Security Best Practices Liran Tal Oct. 18, 2022 1835 -
Hiring a virtual CISO to help your security team Manoj Nair Mar. 09, 2022 1019 -
DevOps Security best practices Jamie Smith Mar. 16, 2021 1487 -
The 4 best DevSecOps tools for a secure DevOps workflow Liran Tal Jan. 23, 2024 1583 -
Essential AI Tools to Boost Developer Productivity and Security Liqian Lim (林利蒨) Mar. 01, 2024 1385 -
What is the BSD License? Top 10 questions answered Jamie Smith Sep. 22, 2020 969 -
4 Advantages of using AI code review Rory McNamara Nov. 29, 2023 1152 -
Python Code Review Tools Liran Tal Aug. 12, 2022 1276 -
Why you should implement an automated code review process Liran Tal Dec. 20, 2021 1222 -
Unlocking the power of multi-cloud security Vandana Verma Sehgal Apr. 25, 2023 1147 -
Supply Chain Security Risks & Best Practice Liran Tal Apr. 04, 2023 1102 -
What are security misconfigurations and how can you prevent them? Rory McNamara Nov. 01, 2021 932 -
Getting started at a new organization Manoj Nair Jan. 27, 2022 791 -
OWASP API Security Top 10 Risks Liran Tal Sep. 23, 2022 1816 -
8 proven code review best practices for developers Liran Tal Jan. 14, 2022 1316 -
OWASP Top 10 Vulnerabilities Liran Tal Oct. 15, 2020 2504 -
How to implement DevSecOps in 4 steps Jamie Smith Jun. 22, 2023 1316 -
Software Supply Chain Security Tools: Types, Features & Considerations Jamie Smith Aug. 02, 2023 1306 -
5 application security assessment steps Daniel Berman Aug. 31, 2021 1029 -
5 potential risks of open source software Liran Tal Jun. 29, 2021 1436 -
C++ in the wild: Which industries use C++? Liran Tal Apr. 29, 2022 1070 -
Developer-first supply chain security Jamie Smith Sep. 19, 2023 1330 -
Top 5 Docker Security Vulnerabilities Liran Tal Oct. 31, 2022 1036 -
Asset-first application security: What is it and how can it help Daniel Berman Nov. 03, 2023 1156 -
The Importance of Container Monitoring Jamie Smith Mar. 02, 2022 1013 -
Cloud security challenges Rory McNamara May. 19, 2022 2423 -
Defense in Depth Daniel Berman Feb. 29, 2024 1430 -
Top AWS Security Risks & Prevention Rory McNamara Mar. 02, 2023 1256 -
Top 8 DevSecOps Best Practices - Build Securely Liran Tal Sep. 26, 2022 1074 -
15 Application Security Best Practices Daniel Berman Oct. 08, 2020 1573 -
Secrets Management: Tools & Best Practice Jamie Smith Jun. 26, 2023 1318 -
Product Security vs. Application Security: What’s the Difference? Rory McNamara Jul. 21, 2023 1390 -
6 tips for managing your open source components Liran Tal Apr. 26, 2022 1364 -
4 Enterprise-level security best practices Manoj Nair Jul. 20, 2023 617 -
4 steps of the Vulnerability Remediation Process Liran Tal, Jamie Smith Feb. 16, 2021 1699 -
7 best Java code review tools for developers Liran Tal Jan. 14, 2022 1375 -
AppSec Maturity Models Rory McNamara Mar. 08, 2024 1120 -
Cybersecurity Hygiene 101 Liran Tal Mar. 02, 2023 1594 -
High profile AWS breaches & how to avoid them Jamie Smith Jun. 07, 2023 1197 -
5 cloud application security best practices Jamie Smith Jun. 27, 2021 842 -
API Security Guide Liran Tal Apr. 25, 2023 1338 -
Did you make the *security* naughty or nice list this year? Mariah Gresham Dec. 18, 2024 590 -
4 tips for securing GenAI-assisted development Sarah Conway Dec. 18, 2024 859 -

By Matt Makai. 2021-2024.