Skip to main content

Blog Archiv

Thema
Zielgruppe

Anzeige 1 - 24 von 219 posts

KI

How “Clinejection” Turned an AI Bot into a Supply Chain Attack

19. Februar 2026

KI

Snyk and Cline: Securing the Future of Autonomous Coding

18. Februar 2026

KI

Weaving Security into the Flow: New Snyk Studio Capabilities Power the AI Security Fabric

17. Februar 2026

KI

Exploitability Isn’t the Answer. Breakability Is.

12. Februar 2026

KI

The Future of AI Agent Security Is Guardrails

12. Februar 2026

KI

Why Your “Skill Scanner” Is Just False Security (and Maybe Malware)

11. Februar 2026

KI

280+ Leaky Skills: How OpenClaw & ClawHub Are Exposing API Keys and PII

5. Februar 2026

KI

Snyk Finds Prompt Injection in 36%, 1467 Malicious Payloads in a ToxicSkills Study of Agent Skills Supply Chain Compromise

5. Februar 2026

KI

ServiceNow's Virtual Agent Vulnerability Shows Why AI Security Needs Traditional AppSec Foundations

14. Januar 2026

KI

Beyond Detection: Building a Resilient Software Supply Chain (Lessons from the Shai-Hulud Post-Mortem)

8. Januar 2026

Anwendungssicherheit

The Holiday Whisper: Shai-Hulud 3.0

29. Dezember 2025

Schwachstellen-Insights

Security Advisory: Critical RCE Vulnerabilities in React Server Components (CVE-2025-55182)

3. Dezember 2025

Sicherheit für die Lieferkette

SHA1-Hulud, npm supply chain incident

24. November 2025

KI

Malicious MCP Server on npm postmark-mcp Harvests Emails

25. September 2025

KI

When “Private" Isn't: The Security Risk of GPT Chats Leaking to Search Engines

1. August 2025

Anwendungssicherheit

Maintainers of ESLint Prettier Plugin Attacked via npm Supply Chain Malware

22. Juli 2025

Schwachstellen-Insights

Snyk’s Statement on the MITRE CVEs Program Funding Update

16. April 2025

Schwachstellen-Insights

CVE-2025-29927 Authorization Bypass in Next.js Middleware

23. März 2025

Schwachstellen-Insights

Reconstructing the TJ Actions Changed Files GitHub Actions Compromise

17. März 2025

Open-Source-Sicherheit

Best practices for continuous vulnerability management

29. Oktober 2024

Anwendungssicherheit

Want to avoid a data breach? Employ secrets detection

16. September 2024

SW-Entwicklung

Exploiting HTTP/2 CONTINUATION frames for DoS attacks

8. April 2024

Anwendungssicherheit

The XZ backdoor CVE-2024-3094

31. März 2024

Anwendungssicherheit

Vulnerability vs Weakness: Understanding Key Differences in AppSec

17. November 2023

Snyk Newsletter abonnieren

Immer up-to-date: Ihr direkter Draht zu allen aktuellen News und Insights von Snyk.