Skip to main content

Security Fundamentals

Cybersecurity Exploits

Learn about common attacks and vulnerabilities in cybersecurity. Protect your application from vulnerabilities with Snyk tools, start free today.

Showing 10 Posts

wordpress-sync/owasp_logo_1c

OWASP Top 10 Vulnerabilities

wordpress-sync/AH-blog-header-

Security Vulnerability: types and remediation

wordpress-sync/sequelize-attack

Malicious Code Explained

Vulnerability vs Weakness: Understanding Key Differences in AppSec

wordpress-sync/Priority-blog-Featured

OWASP API Security Top 10 Risks

wordpress-sync/blog-hero-snyk-iac-magenta

What Are Security Misconfigurations and How Can You Prevent Them?

wordpress-sync/SnykCon-Header-2

Securing Front-end Attack Surfaces

wordpress-sync/SnykCon-Header-2

Sour Mint - The case of malicious advertisement SDK affecting thousands of mobile apps

Man-in-the-Middle (MITM) Attack