562 |
The most popular docker images each contain at least 30 vulnerabilities |
2019-02-26 |
312 |
NPM package compromised by author: erases files on RU / BY computers on install |
2022-03-16 |
282 |
The MongoDB hack and the importance of secure defaults |
2017-01-11 |
259 |
NPM lockfiles can be a security blindspot for injecting malicious modules in PRs |
2019-12-26 |
215 |
Open source maintainer pulls the plug on NPM packages colors and faker |
2022-01-09 |
192 |
Kotlin becomes second most popular language on the JVM |
2020-02-06 |
189 |
Abusing Ubuntu 24.04 features for root privilege escalation |
2024-11-13 |
170 |
The Frequency of Known Vulnerabilities in JavaScript |
2017-03-09 |
147 |
Malicious remote code execution backdoor discovered bootstrap-sass Ruby gem |
2019-04-04 |
139 |
HTTPS Adoption doubled this year |
2016-07-22 |
114 |
Serverless security implications from infra to OWASP |
2017-04-19 |
108 |
Looking at how many sites use vulnerable JavaScript libraries |
2017-11-22 |
103 |
Building a backdoor with Node.js |
2020-03-19 |
102 |
SourMint Malicious SDK |
2020-08-25 |
98 |
How to crash an email server with a single email (2018) |
2020-05-07 |
94 |
Zip Slip Vulnerability |
2018-06-05 |
88 |
XSS Attacks: The Next Wave |
2017-06-08 |
86 |
Show HN: Vuln Cost – immersive VS Code extension to surface vulnerabilities |
2020-04-05 |
53 |
Snyk introduces security monitoring for serverless applications |
2017-04-26 |