Skip to main content

Articles

Stay informed on security insights and best practices from Snyk’s leading experts.

Anzeige 1 - 20 von 341 artikel

Getting Started with Capture the Flag

If you're new to CTFs or looking to sharpen your skills, understanding how they work is key to success. This article breaks down the importance of CTFs in cybersecurity—how they help you develop critical security skills, understand real-world vulnerabilities, and improve your ability to defend systems effectively.

Catch Vulnerabilities Early: Your Snyk MCP Cheat Sheet

Integrate security into AI workflows with the Snyk MCP Server cheat sheet. Learn installation, configuration, transport types, core security scanning functions (Code, SCA, IaC), and rules for agentic AI tools.

Top CI/CD Pipeline Security Best Practices for AI-Powered Development

Fortify your AI development lifecycle. Learn top CI/CD security best practices to protect against prompt injection, data poisoning, and model inversion from code to cloud.

Implementing SAST in Azure DevOps: A Complete Guide for DevSecOps Integration

By integrating SAST directly into our Azure DevOps pipelines, we catch issues like SQL injection, cross-site scripting, and insecure authentication patterns before they reach production.

AI in SDLC: A Complete Guide to AI-Powered Software Development

Discover how AI is transforming the Software Development Life Cycle (SDLC). Learn the benefits, challenges, and real-world use cases of AI-powered software development.

Buffer Overflow Security Analysis: From Prevention to Detection & Defense

Protect your applications from buffer overflow attacks with a multi-layered security approach. Learn how SAST, DAST, runtime protections, and Snyk’s proactive tools help detect, prevent, and remediate memory corruption vulnerabilities in C/C++ and other high-risk environments.

What Is Toxic Flow Analysis in Cybersecurity? Framework, Identification Techniques & Implementation

Toxic Flow Analysis maps how sensitive data moves across systems to uncover hidden risks, strengthen defenses, and improve security posture.

Secure AI Coding With Snyk: Now Supporting Model Context Protocol (MCP)

Snyk’s newfound support for Model Context Protocol (MCP) offers real-time security to AI-powered workflows, expanding secure development across other MCP-supported AI developer tools.

OpenRouter in Python: Use Any LLM with One API Key

Simplify AI development by using OpenRouter to access dozens of LLMs with a single API key in Python. Learn the bare-bones implementation and explore features like model routing, streaming, and vision models, all while building securely with Snyk.

Anwendungssicherheit: Der Guide

Jede Aktion zur Beseitigung von Schwachstellen, alle Maßnahmen zur Stärkung des Security-Status und zum Schutz sensibler Daten, in sämtlichen Phasen des App-Lifecycle: Das ist Anwendungssicherheit.

How is AI being used in cybersecurity?

Learn how the emergence of AI is changing organizations' approaches to cybersecurity, leveraging different AI models to improve the efficiency of cybersecurity programs.

5 AI Cloud Security Best Practices: A Comprehensive Guide for Securing AI Systems in the Cloud

Discover the top 5 AI cloud security best practices to protect your AI models, data, and pipelines. Learn how to secure AI systems in the cloud against emerging threats with this comprehensive guide.

How Claude Code Is Raising the Ceiling of Intelligence

Anthropic's Claude Code is evolving into a customizable agent framework. Learn about 7 new features: extended thinking, tool use, MCP, memory, and secure execution.

From Gatekeeper to Guardrail: Embracing the Role of Governance for the AI Era

AI code assistants demand a new AppSec governance model. Shift from late-stage "gatekeepers" to real-time "guardrails" with Policy-as-Code and developer-first security. Learn how to secure Al-generated code from inception.

Gemini Nano Banana Cheat Sheet for JavaScript Developers

Explore this cheat sheet for JavaScript/TypeScript developers on integrating Google's Gemini Nano Banana model. Master the AI SDK, prompt engineering, image generation, Data URL conversion, and security best practices with Snyk Studio.

Understanding Toxic Flows in MCP and the Hidden Risk of AI-Native Systems

A deep dive into toxic flows in MCP and how AI agents can unintentionally create attack paths across tools, data, and systems.

The Dissemination of the Term Vibe Coding

Vibe coding accelerates development but risks security. Learn how Andrej Karpathy's viral term describes Al-driven, minimal-oversight coding, and why it leads to XSS, SQL injection, and data leaks. Read the security implications and best practices.

NPM Security Best Practices: How to Protect Your Packages After the 2025 Shai Hulud Attack

Harden your npm environment against supply chain attacks like Shai-Hulud. Learn 12 essential best practices for developers and maintainers, covering post-install scripts, 2FA, provenance, and deterministic installs.

What is ASPM? (Application Security Posture Management)

Application security posture management (ASPM) overview - Learn how to strengthen app security using holistic visibility, automation & robust security measures.

Why AI-Native Apps Break Traditional AppSec Models

AI-native apps break traditional AppSec. Learn why dynamic models, agents, and model-layer risks demand a modern, AI-aligned security approach.