Skip to main content

Articles

Stay informed on security insights and best practices from Snyk’s leading experts.

表示中 101 - 120 / 299 記事

9 MCP Projects for AI Power Users

Explore 9 Model Context Protocol (MCP) projects that transform LLMs into versatile collaborators for power users looking to supercharge their AI workflow.

6 MCP Servers for Using AI to Generate 3D Models

Explore six MCP servers specifically designed for 3D modeling applications, spanning everything from professional architectural tools to open source modelers and 3D printing platforms.

Five Ways Shadow AI Threatens Your Organization

Uncover 5 ways Shadow AI threatens your organization's data, compliance, and security. Learn how to gain control and protect your business from hidden AI risks.

What is AI jailbreaking? Strategies to Mitigate LLM Jailbreaking

LLM Jailbreaking happens when adversarial prompts force unintended actions. Discover the best strategies to mitigate and defend against jailbreaking in GenAI models.

What is AI chip design, and how does it work?

AI chip design automates tasks, boosting engineering productivity and enhancing chip quality outcomes.

What If Everybody Can Code?

AI empowers citizen developers to code, posing new security & Shadow IT challenges. Explore how organizations can securely support widespread coding in this evolving landscape.

MCP Security – What's Old is New Again

MCP security faces old and new threats like injection attacks, supply chain risks, and AI-specific dangers like tool poisoning. Learn to mitigate risks to malicious, vulnerable, and insecure MCP servers.

Ensuring PCI DSS Compliance: The Role of SAST, DAST, and API Security Testing

Achieve PCI DSS compliance with best practices and tools like Snyk API & Web or Snyk Learn. Secure payment data and build trust while simplifying audits and testing.

Decoding CVEs: A practical guide to assessing and mitigating security risks

Let's explore the world of Common Vulnerabilities and Exposures (CVEs) with step-by-step examples of evaluating if a CVE impacts your project and pragmatic strategies for effective mitigation. This guide will empower you to tackle security vulnerabilities head-on. Don't let CVE warnings go unnoticed — learn how to address them confidently and efficiently.

How Snyk uncovers libuv CVE-2024-24806 SSRF vulnerabilities in the Node.js project

Node.js is a powerful and widely used runtime that allows developers to build scalable and high-performance applications using JavaScript. However, many developers might not realize that Node.js relies heavily on several third-party open-source components to function effectively. Key among these components are libuv, OpenSSL, and V8

How to secure Node.js applications from Open Redirect vulnerabilities

Secure your Node.js applications from Open Redirect vulnerabilities. Learn how to prevent malicious redirection attacks, protect user data, and maintain a strong security posture. Discover best practices, tools like Snyk, and actionable tips to safeguard your Node.js apps.

Top 10 npm power-user commands every JavaScript developer should know

Master essential npm commands to streamline your JavaScript development. Whether it's dependency management or security enhancements, you can boost efficiency and protect your projects. Learn how to leverage npm ls, npm why, npm run, and more to elevate your npm skills today.

How to prevent prototype pollution vulnerabilities in JavaScript

Safeguard your JavaScript applications from prototype pollution vulnerabilities. Learn how to prevent attackers from infiltrating object prototypes with malicious code, jeopardizing your data and application security. Read about effective strategies, leverage Snyk's potent tools, and shield your JavaScript projects from this critical threat.

Getting started with JavaScript static analysis

Static analysis tools are a must-have for JavaScript developers. They automatically scan your code for errors, security vulnerabilities, and formatting issues. This helps you write better code faster and improve your overall development process.

How Snyk Helps with the OWASP Software Assurance Maturity Model

Read how the OWASP Software Assurance Maturity Model (SAMM) and Snyk can work together to provide an effective approach to measuring, managing, and improving your software security. Learn about the key benefits, practical implementation steps, and the specific tools offered by Snyk to support your organization's security journey.

JavaScript Static Analysis with ESLint and Biome

Biome, a new tool in the JavaScript ecosystem, combines code formatting and quality linting. It offers speed and performance advantages over traditional tools like ESLint and Prettier, making it a compelling alternative. With its integration into development environments like VS Code and potential adoption by major projects, Biome is poised to reshape the way JavaScript developers approach code quality and formatting.

Oops I built a feature and created an Open Redirect Vulnerability in a Deno app

Build your first Deno web application with a step-by-step guide. Learn how to implement a redirect feature while avoiding common security pitfalls like open redirect vulnerabilities. Secure your Deno app with best practices and discover how to set up a Deno development environment in GitHub Codespaces.

Getting started with Practical Rego

Read this guide introducing Rego, a declarative policy language, for programmers familiar with imperative languages like Python or Java. It covers key concepts, common pitfalls, and best practices for writing effective Rego policies.

Improving your Java application with Records

Java Records revolutionizes the way you create data-centric classes in Java, offering a concise and secure approach. Embrace Java Records and unlock efficient and maintainable Java development.

How to respond to a newly discovered vulnerability

Learn how to effectively respond to newly discovered vulnerabilities with a structured approach using the Vulnerability Management Cycle. Discover the importance of tools like Snyk for centralizing, analyzing, and remediating vulnerabilities across your software development lifecycle.