Vulnerability InsightsURL confusion vulnerabilities in the wild: Exploring parser inconsistenciesJanuary 10, 2022
Vulnerability InsightsOpen source maintainer pulls the plug on npm packages colors and faker, now what?January 9, 2022
Vulnerability InsightsFTC highlights the importance of securing Log4j and software supply chainJanuary 7, 2022
Vulnerability InsightsCTF secrets revealed: TopLang challenge from SnykCon 2021 explainedJanuary 6, 2022
Vulnerability InsightsNew Log4j 2.17.1 fixes CVE-2021-44832 remote code execution (but it’s not as bad as it sounds)December 29, 2021
Vulnerability InsightsSnyk makes it easier to fix Log4Shell with extended free scansDecember 21, 2021
Vulnerability InsightsLog4j 2.16 High Severity Vulnerability (CVE-2021-45105) DiscoveredDecember 18, 2021
Vulnerability InsightsFind Log4Shell vulnerabilities in your unmanaged and shaded jars with the Snyk CLIDecember 18, 2021
Vulnerability InsightsLog4j 2.15 vulnerability CVE-2021-45046 upgraded to a critical severity arbitrary code executionDecember 17, 2021
Vulnerability InsightsLog4Shell in a nutshell (for non-developers & non-Java developers)December 15, 2021
Vulnerability InsightsThe Log4j vulnerability and its impact on software supply chain securityDecember 13, 2021
Vulnerability InsightsLog4j vulnerability explained: Prevent Log4Shell RCE by updating to version 2.17.1December 10, 2021
Vulnerability InsightsJava JSON deserialization problems with the Jackson ObjectMapperDecember 1, 2021
Vulnerability InsightsHow to effectively detect and mitigate Trojan Source attacks in JavaScript codebases with ESLintNovember 10, 2021