Open Source SecurityIdentify, prioritize, and fix vulnerabilities with Reachable Vulnerabilities for GitHubJanuary 28, 2021
Vulnerability InsightsWhat is typosquatting and how typosquatting attacks are responsible for malicious modules in npmJanuary 12, 2021
Open Source SecuritySerialization and deserialization in Java: explaining the Java deserialize vulnerabilityDecember 18, 2020
Vulnerability InsightsCommand injection: how it works, what are the risks, and how to prevent itNovember 25, 2020
Open Source SecurityDocker for Java developers: 5 things you need to know not to fail your securityNovember 20, 2020
Open Source SecurityEnterprise security best practices for managing vulnerabilities at scaleNovember 9, 2020
Open Source SecurityDeveloping secure software: how to implement the OWASP top 10 Proactive ControlsNovember 5, 2020
Open Source SecurityVulnerability remediation process: reducing your vulnerability backlog with Snyk’s automatic backlog PRsOctober 22, 2020