Articles
Stay informed on security insights and best practices from Snyk’s leading experts.
Stay informed on security insights and best practices from Snyk’s leading experts.
表示中 81 - 100 / 195 記事
Can Machine Learning Find Path Traversal Vulnerabilities in Go? Snyk Code Can!
Explore how Snyk’s machine learning-powered security tools tackle path traversal vulnerabilities in Golang code. Learn how to secure your Go applications and challenge yourself to detect and exploit vulnerabilities like a pro!
Getting Started with Capture the Flag
If you're new to CTFs or looking to sharpen your skills, understanding how they work is key to success. This article breaks down the importance of CTFs in cybersecurity—how they help you develop critical security skills, understand real-world vulnerabilities, and improve your ability to defend systems effectively.
Cloud Security Architecture - Secure by Design
The leading cloud platforms like Amazon Web Services (AWS), Google Cloud (GCP), and Microsoft Azure have thousands of security professionals working to secure their public cloud infrastructure around the clock, but they are not solely responsible for securing cloud deployments.
Enterprise security tools: types and key considerations
Security tooling is a financial investment and an investment of time and resources to deploy, maintain, and manage. Therefore, organizations must carefully evaluate and prioritize their security needs to choose the best tools for their unique needs.
Decoding CVEs: A practical guide to assessing and mitigating security risks
Let's explore the world of Common Vulnerabilities and Exposures (CVEs) with step-by-step examples of evaluating if a CVE impacts your project and pragmatic strategies for effective mitigation. This guide will empower you to tackle security vulnerabilities head-on. Don't let CVE warnings go unnoticed — learn how to address them confidently and efficiently.
Top 10 npm power-user commands every JavaScript developer should know
Master essential npm commands to streamline your JavaScript development. Whether it's dependency management or security enhancements, you can boost efficiency and protect your projects. Learn how to leverage npm ls, npm why, npm run, and more to elevate your npm skills today.
How Snyk uncovers libuv CVE-2024-24806 SSRF vulnerabilities in the Node.js project
Node.js is a powerful and widely used runtime that allows developers to build scalable and high-performance applications using JavaScript. However, many developers might not realize that Node.js relies heavily on several third-party open-source components to function effectively. Key among these components are libuv, OpenSSL, and V8
How to secure Node.js applications from Open Redirect vulnerabilities
Secure your Node.js applications from Open Redirect vulnerabilities. Learn how to prevent malicious redirection attacks, protect user data, and maintain a strong security posture. Discover best practices, tools like Snyk, and actionable tips to safeguard your Node.js apps.