Skip to main content

Articles

Stay informed on security insights and best practices from Snyk’s leading experts.

Mostrando 1 - 20 de 200 artículos

AI Attacks and Adversarial AI in Machine Learning

Bad actors can alter machine learning systems through adversarial AI attacks. Learn about common attack types and how to safeguard your systems here.

Achieving Security Coverage and Control Over Application Risk

Stop reacting to vulnerabilities. Build proactive application security with universal asset visibility, smart policies, and risk-based prioritization. Secure your SDLC.

OWASP Top 10 Code Vulnerabilities and How SAST Can Stop Them

Discover the OWASP Top 10 vulnerabilities and how SAST tools like Snyk Code empower developers to detect and fix them early in the development lifecycle.

Navigating the Challenges of GenAI Adoption for Modern AppSec Teams

With an increase in GenAI adoption, AppSec teams face challenges. Learn what challenges AppSec teams are facing and how they can address risks with Snyk.

14 MCP Servers for UI/UX Engineers

As LLMs' capabilities continue to expand through Anthropic’s Model Context Protocol (MCP), UI/UX engineers have access to a growing ecosystem of specialized tools that can significantly enhance their workflows. This article explores 14 open-source MCP servers for UI/UX professionals.

The Risks and Impact of Data Leakage: Data Leakage Causes and Prevention

Knowing the risks and impact of data leakage can help protect your organization. Learn more about data leakage, its causes, and how to prevent it here.

7 Reasons to use an open source vulnerability scanner

Cybercrime is on the mind of every business — from the largest enterprise to small and mid-sized companies that may have limited technical expertise.

What is LLMjacking? How AI Attacks Exploit Stolen Cloud Credentials

Attackers can exploit cloud LLMs through stolen credentials. Learn more about LLMjacking and how to protect your organization here.

What is MCP in AI? Everything you wanted to ask

MCP (Model Context Protocol) is Anthropic’s specification for how LLMs (large language models) would communicate, share data, and leverage external resources beyond the model’s data.

Software Supply Chain Security

Learn more about software supply chain security, why it’s important to organizations, and how you can secure your supply chains with Snyk.

AI Glossary

Snyk’s glossary for learning about AI, including its science, common AI use cases, and how it relates to cybersecurity.

What is Cloud Security Architecture? Principles, Framework, and Architecture Assessment

Protect your organization in the cloud with a robust cloud security architecture. Learn more about cloud security architecture and its importance.

In Localhost We Trust: Exploring Vulnerabilities in Cortex.cpp, Jan’s AI Engine

Discover critical security vulnerabilities recently found in Cortex.cpp, the engine behind the local AI platform Jan AI, revealing that self-hosted AI isn't automatically secure. Learn how attackers could exploit these flaws and the importance of prioritizing security in the growing ecosystem of on-premise AI solutions.

7 Surprising Roadblocks on the Path to DevSecOps Maturity

Understand how your organization's DevSecOps maturity compares to industry benchmarks. Learn about common challenges in risk reduction, security fatigue, and developer adoption. Get the insights.

Adversarial Inputs to Image Classifiers: Understanding the Threat of Adversarial AI

Explore the vulnerabilities of AI image classifiers to adversarial attacks. Understand techniques like C&W, PGDL2, DeepFool, their implications, and the importance of AI security.

The Essential Guide to AI Bills of Materials (AIBOMs)

This guide is your one-stop shop on AI Bill of Materials (AIBOMs). Learn how to build an inventory of your AI model.

AI Attacks & Threats: What are they and how do they work?

Discover more about AI cyber-attacks: what they are, how they work, and how to protect your business against them.

How is AI being used in cybersecurity?

Learn how the emergence of AI is changing organizations' approaches to cybersecurity, leveraging different AI models to improve the efficiency of cybersecurity programs.

Why open source governance is key for security

What is open source governance? Open source governance is the recognized rules and customs that guide an open source project.

Cloud Compliance Standards: Frameworks & Controls

When choosing a cloud compliance tool, consider capabilities such as policy as code and historical reporting to help maintain and verify your compliance.