Snyk YouTube subscribers count by month

month subscriber count videos count views count
June 2023 5750 - -
July 2023 5910 (+3%) 655 557873
August 2023 6070 (+3%) 659 634430
September 2023 6190 (+2%) 662 690457
October 2023 6410 (+4%) 668 720677
November 2023 6580 (+3%) 679 747937
December 2023 6720 (+2%) 674 752971
January 2024 6890 (+3%) 679 782831
February 2024 7130 (+3%) 685 815302
March 2024 7320 (+3%) 692 844560
April 2024 7550 (+3%) 24 95532
May 2024 7770 (+3%) 50 113645
June 2024 8090 (+4%) 78 133109
July 2024 8240 (+2%) 101 146957
August 2024 8480 (+3%) 128 171455
September 2024 8700 (+3%) 148 191244
October 2024 9010 (+4%) 180 225630
November 2024 9420 (+5%) 201 267531

Snyk videos published by month

month published title ID
May. 2022 Snyk: Developer Security Platform 2oCog1TGM0w
May. 2022 What is DevSecOps? DevSecOps explained in under 7 mins | 2022 VLEF6MU0Wfg
Jul. 2022 Application Security 101 - What you need to know in 8 minutes Dp019cWu1cg
Jul. 2022 Snyk Demo in 20 Minutes | 2022 9RHM4ybvyT8
Dec. 2023 Why should developers care about container security? n2q0py7HSdM
Apr. 2024 Top 3 JWT Security Best Practices for Your Apps VxIK0xwyLbw
Apr. 2024 Are you using JWTs safely in your app? EubqlYnjuDU
Apr. 2024 How to find and fix security issues in your projects 4hZW81a3S4c
Apr. 2024 How to decode and validate a JWT in Python nTKTrW98OrY
Apr. 2024 How to validate JWTs 4UBrTxcuhNw
Apr. 2024 How to safely store JWTs bPzhcZBBtic
Apr. 2024 How to Choose the Best Node.js Docker Image QSGrqOgFFgk
Apr. 2024 How Node.js Container Images Can Be Problematic PBg0al7rHHM
Apr. 2024 How to Find Vulnerabilities in Containers _mEzbdw6ziI
Apr. 2024 What is Node.js Alpine Container Image? bMfWT9UYCdE
Apr. 2024 How to Choose the Best Node js Docker Image lppAnzSCCtI
Apr. 2024 What Node.js Docker Container Image Tags Mean AObeJvUcvoQ
Apr. 2024 Why you NEED an Open Source Vulnerability Scanner SOa2zw0-K4E
Apr. 2024 Why You Should Use Open Source Vulnerability Scanners 0rw7WkjnZBU
Apr. 2024 Unmask Threats with Open Source Vulnerability Scanners hO-iiiCkvCU
Apr. 2024 How Open Source Vulnerability Scanners Help with Remediation FidfSvl1W_U
Apr. 2024 How to use Snyk SBOM and Review Project Open Source Dependencies c2952HPC8bM
Apr. 2024 How to Analyze a Vulnerability from Snyk's Vulnerability Database - Snyk VulnDB dwxxl9onIF0
Apr. 2024 How to Use GitHub Actions Environment Variables and Secrets 5xngh29yx9A
May. 2024 What are the Built-in GitHub Environment Variables? cTB4m9cfgnY
May. 2024 Why You Should Use Environment Variables in GitHub Actions fhK1jqxig4Q
May. 2024 Why You Should Use Secrets in GitHub Actions dNJPA8mFsvM
May. 2024 How to Fork a Repository on GitHub XvxWFST1i4A
May. 2024 How to Create Environment Variables in GitHub Actions APHhi50K8q0
May. 2024 10 Node.js runtime features you SHOULD be using in 2024 sKZOC5HHX1I
May. 2024 How to Mock in Node.js with the Built-in Test Module Fyphycm-N5o
May. 2024 How to Get Test Coverage in Node.js Dk_EP2zAJSg
May. 2024 How to Test in Node.js with the New Test Runner 5XMifgDgGdE
May. 2024 What is Corepack in Node.js? ZSKiLrcMyQM
May. 2024 How to Watch for Changes in Node.js 7lsa9-Oxd58
May. 2024 Top 5 VS Code SECURITY Extensions 4jA1uAIdt8U
May. 2024 Top 5 VS Code Security Extensions - 1Password -d6XKm9NBxw
May. 2024 Top 5 VS Code Security Extensions - ESLint RGmppNPIXxw
May. 2024 Top 5 VS Code Security Extensions - Cloak ECanZ6Vaoyc
May. 2024 Top 5 VS Code Security Extensions - Decompiler V1aBpfmTuiM
May. 2024 Top 5 VS Code Security Extensions - Snyk 52E45onJbg4
May. 2024 How to Build an NPM Package for ESM and CJS PrGvhqKgV3Y
May. 2024 How to Provide Types for your Node.js/JavaScript NPM Package JFrlqGoUtFU
May. 2024 How to Target ESM for Your npm Package UxevOz-Tqt0
May. 2024 How to Secure Projects with Snyk XF4fE_JB0b0
May. 2024 Supporting ESM and CJS in an npm Package RAPDzXGDL-8
May. 2024 Using Exports for Both ESM and CJS in an npm Package bZximzM3E2o
May. 2024 How to prevent SSRF Attacks in Node.js fC6CFSN9BPI
May. 2024 How to Validate URL or URI in Node.js/JavaScript with Zod AZDXGAgx0bA
May. 2024 How to Validate Schemas in JavaScript Node.js I7EzN-NT9Co
May. 2024 How to Limit Trusted Domains for Requests in JavaScript and Node.js GoqRYwO6Wrc
Jun. 2024 How to Make Sure Your JavaScript and Node.js Dependencies are Updated N3L5gJFKFcY
Jun. 2024 Using a Firewall to Prevent SSRF in Node.js 64fVSo1aQME
Jun. 2024 How to Publish a VS Code Extension pj3uetwbo00
Jun. 2024 How to Create Azure DevOps Organization and VS Code Personal Access Token (Visual Studio Code) eIssVMtdWJI
Jun. 2024 How to Create a Publisher Account for Your VS Code Extension (Visual Studio Code) Hul3vtC9toU
Jun. 2024 How to Prepare Your VS Code Extension for Publishing (Visual Studio Code) 7Kxml4g_GMg
Jul. 2024 How Does a Browser Polyfill Work? NQPLUKzV1o4
Jul. 2024 How the Supply Chain Attack for Polyfill.io Started 30_0Bmyj4-o
Jul. 2024 Supply Chain Attack on the Polyfill.io Service fqTuAa5nUJo
Jul. 2024 How to Address the Supply Chain Attack on the Polyfill.io Service gm_tduEPlrM
Jul. 2024 Best Practices for Supply Chain Security in Response to Polyfill.io Attack aCVRecUssL8
Jul. 2024 The Ultimate Guide to Choose the Best Open Source Packages b9B_PfWaXT0
Jul. 2024 How to Monitor Security of Open Source Packages with Snyk 8wfMHTE-G4c
Jul. 2024 How to Evaluate Popularity of Open Source Packages byJAJPCvhVs
Jul. 2024 How to Evaluate Maintainability of Open Source Packages lNT3BfUXYsA
Jul. 2024 How to Evaluate Security of Open Source Packages KwZ-TI4e6C0
Jul. 2024 How to Evaluate Community of Open Source Packages 6qn8PxPzMcs
Jul. 2024 4 Hidden AI Coding Risks and How to Address Them -2S1njN_Urs
Jul. 2024 AI Generated Code Risk: Absence of Policies oSSnt6pGXnY
Jul. 2024 AI Generated Code Risk: IP Infringement n-UxPswSn7A
Jul. 2024 Why Not to Trust AI Generated Code: Explainability and Transparency 9OITw6xVchg
Jul. 2024 How AI Generated SQL Injection ep9FTkdgc9g
Jul. 2024 A Risk of AI Generated Code: Security Vulnerabilities 3mlCiwfIaeo
Jul. 2024 GitHub Copilot Makes You Vulnerable -5N8TVA1EO0
Jul. 2024 A Major Flaw with AI Coding Tools - GitHub Copilot, etc. KMMt3-fVCLk
Aug. 2024 How Broken Windows Theory Applies to AI mKwB__MwqEg
Aug. 2024 GitHub Copilot Created a SQL Injection XIHVf-GqQwE
Aug. 2024 Advice for Using AI - Part 1 BIOGUxiUJeU
Aug. 2024 Advice for Using AI - Part 2 Yk4Q-oPLRR0
Aug. 2024 More Ways GitHub Copilot Makes You Vulnerable EIdsJsKAkvM
Aug. 2024 How You Should Use AI Coding Tools TuRU4DC2pIU
Aug. 2024 An Example of Using AI to Code x-eanYKvNKE
Aug. 2024 Testing GitHub Copilot Chat Code Output Security 2v9AzJxIAhM
Aug. 2024 How to Get Better Results from GitHub Copilot EYJJ2tAmDac
Aug. 2024 Using GitHub Copilot Chat to Write Secure Code hKlUXvVMCR0
Aug. 2024 How AI Almost Got Me FIRED: Part 1 gNQS14JUlyg
Aug. 2024 This AI Code Must Be Secure Or I'm Fired nCwwayOpJtQ
Aug. 2024 Auto Fix Vulnerable Code with Snyk LZvugzTvVzU
Aug. 2024 Testing AI Code Security C_O5JwhUNWo
Aug. 2024 Secure AI Code with Codeium and Snyk l2Mj7ntzCoM
Aug. 2024 How AI Almost Got Me FIRED: Part 2 q-OgeS6Djpw
Aug. 2024 Why Not to Trust AI Generated Code 5n0UY3v-ygo
Aug. 2024 Fixing Vulnerabilities in AI Generated Code qGi9NcGj-g0
Aug. 2024 How Some AI Respond to Security Prompts dQzWdgDxCG0
Aug. 2024 Can AI Generate Code without Vulnerabilities? -AmjADs6pkw
Aug. 2024 AI Generate Code with NoSQL Injection e6ScZH7n_s4
Aug. 2024 How AI Almost Got Me FIRED: Part 3 6sAs5WDFXcI
Aug. 2024 Warning: AI Might Be Training on Your Code b40UyK4B1A8
Aug. 2024 Get Started with AI Coding Tool: Cody SJ0voBFXwVk
Aug. 2024 Advice When Using AI Coding Tools x5Q2xrDMdME
Aug. 2024 Can Mixtral LLM Create a Secure App? Pz7W1DiJtPc
Sep. 2024 Can AI Provide Secure Code? z92jTSMPs78
Sep. 2024 How AI Impacts Reconnaissance and Bug Bounties 4nNhLzGTuVI
Sep. 2024 What Are The Risks of AI in Security Research? DAeJ6uHTofE
Sep. 2024 Can Using AI Be an Advantage for Pentesters? HvzioWGepuo
Sep. 2024 Sharing an Embarassing Moment with AI jhULDAf9s-k
Sep. 2024 The Promising Uses of AI for Security Research? 00ydP-YFTqI
Sep. 2024 Does Using AI Make You Lazy? jJgFuKCt8QA
Sep. 2024 Why ASPM is the Future of AppSec b0vlkL8mEMk
Sep. 2024 What ASPM Solves XEnpfhhB8x0
Sep. 2024 What Snyk's ASPM Provides JSmnAN62sug
Sep. 2024 What You Get with Snyk and Accenture E_Gpw6l6XrQ
Sep. 2024 Snyk AppRisk Pro and Accenture AR_Lsv2t8cI
Sep. 2024 What You Get With Snyk and Accenture ASPM Ij-zvFuhFUc
Sep. 2024 How AI Almost Got Me FIRED: Part 4 VtVFnCNug3Y
Sep. 2024 Can AI Build a Secure App? Part 1 IgymUt93hYI
Sep. 2024 Can AI Build a Secure App? Part 2 sz3gS3NlOVs
Sep. 2024 Can Perplexity Build a Secure App? g0EEvLs4W9Y
Sep. 2024 How Can AI Help with Application Security? n5iRAs3CWa8
Sep. 2024 Perplexity AI and Secure App Code Qqz1d7moBqk
Sep. 2024 Exploiting AI Generated Code LT-mYYmUqIU
Sep. 2024 Successful Exploit for Cross Site Scripting Skmv9R1OHac
Sep. 2024 Exploit Attempt for a Cross Site Scripting Vulnerability tRAcL3DnJdY
Sep. 2024 Testing a NoSQL Injection Vulnerability r-svBCpPz5c
Sep. 2024 Fix Cross Site Scripting Vulnerability with Snyk T2KySR2aan8
Sep. 2024 Stealing Data via Cross Site Scripting komOds9hSwY
Sep. 2024 Cursor AI: The VS Code Competitor 59quOZDF2Lk
Oct. 2024 The Reason Cursor AI Isn't an Extension GtvdnQeUHWI
Oct. 2024 Migrating from VS Code to Cursor AI ABLHgcxiorw
Oct. 2024 I Was Smarter than the AI wcMkBm-GoQc
Oct. 2024 Using Cursor AI to Fix Errors hCuMH8EJDew
Oct. 2024 Using Cursor AI to Build a Secure App RV6NZZnFFnU
Oct. 2024 Exploiting Vulnerabilities in Cursor AI Code Ce2QLFTjWB4
Oct. 2024 Cursor AI is Helpful with Exploit Education aiXplhoQIrI
Oct. 2024 Learning About Security with Cursor AI and Snyk vDrJssBDmCo
Oct. 2024 Finding Exploits with Cursor AI MBH8y6BSVYE
Oct. 2024 Cross site Scripting XSS Payload Exploits from Cursor AI C3GPa0fctMM
Oct. 2024 Testing Exploits from Cursor AI jjTPAo3_K-A

By Matt Makai. 2021-2024.