Skip to main content

Blog Archive

Topic
Audience

Showing 1 - 24 of 58 posts

AI

Governing Security in the Age of Infinite Signal – From Discovery to Control

April 10, 2026

AI

You Patched LiteLLM, But Do You Know Your AI Blast Radius?

April 2, 2026

Supply Chain Security

Axios npm Package Compromised: Supply Chain Attack Delivers Cross-Platform RAT

March 30, 2026

AI

How a Poisoned Security Scanner Became the Key to Backdooring LiteLLM

March 24, 2026

AI

Introducing Agent Security

March 23, 2026

AI

I Read Cursor's Security Agent Prompts, So You Don't Have To

March 17, 2026

AI

Securing the Agent Skills Registry: How Snyk and Tessl Are Setting the Standard

March 17, 2026

AI

How “Clinejection” Turned an AI Bot into a Supply Chain Attack

February 19, 2026

AI

Weaving Security into the Flow: New Snyk Studio Capabilities Power the AI Security Fabric

February 17, 2026

AI

Securing the Agent Skill Ecosystem: How Snyk and Vercel Are Locking Down the New Software Supply Chain

February 17, 2026

AI

Exploitability Isn’t the Answer. Breakability Is.

February 12, 2026

AI

How a Malicious Google Skill on ClawHub Tricks Users Into Installing Malware

February 10, 2026

AI

Beyond Detection: Building a Resilient Software Supply Chain (Lessons from the Shai-Hulud Post-Mortem)

January 8, 2026

AI

Secure by Default: Why Snyk and Augment Code are the New Standard for AI Development

January 7, 2026

Application Security

The Holiday Whisper: Shai-Hulud 3.0

December 29, 2025

AI

Evo Adds CycloneDX Support to Give Full AI Visibility

December 19, 2025

Supply Chain Security

SHA1-Hulud, npm supply chain incident

November 24, 2025

Supply Chain Security

Automated Package-Publication Incident IndonesianFoods in the NPM Ecosystem Linked to Crypto Reward-Farming Scam

November 13, 2025

Supply Chain Security

Phishing Campaign Leveraging the NPM Ecosystem

October 9, 2025

Supply Chain Security

Zero-day Extensive NPM Package Compromise - Shai Hulud Supply Chain Attack

September 15, 2025

Application Security

Snyk Joins CISA's Secure by Design Pledge

August 5, 2025

Application Security

Maintainers of ESLint Prettier Plugin Attacked via npm Supply Chain Malware

July 22, 2025

AI

Cursor IDE Malware Extension Compromise in $500k Crypto Heist

July 21, 2025

AI

Human + AI: The Next Era of Snyk's Vulnerability Curation

July 14, 2025

Subscribe to our newsletter

Get all latest content from Snyk directly to your mailbox.