Skip to main content

Recursos

Relatório

What’s Lurking in Your AI? - Download Snyk’s AISPM Deep Dive

Leia agora

Ebook

The Gorilla Guide to Security & Governance for AI

Leia agora
Tipo
Tópico

Mostrando 217 - 240 de 580 recursos

Article

AI Attacks and Adversarial AI in Machine Learning

Bad actors can alter machine learning systems through adversarial AI attacks. Learn about common attack types and how to safeguard your systems here.

Video

ChatGPT's NEW Model Almost Got Me FIRED...

Video

Can AI Solve This Meme? (Automating with AI)

Article

Achieving Security Coverage and Control Over Application Risk

Stop reacting to vulnerabilities. Build proactive application security with universal asset visibility, smart policies, and risk-based prioritization. Secure your SDLC.

Video

How to Spin Up Prototype Apps Fast! (GitHub Spark)

Video

How Secure is this NEW AI Coding Tool? Bolt by Stackblitz

Video

Understanding CSRF and SSRF Attacks (Demo and Examples)

Article

OWASP Top 10 Code Vulnerabilities and How SAST Can Stop Them

Discover the OWASP Top 10 vulnerabilities and how SAST tools like Snyk Code empower developers to detect and fix them early in the development lifecycle.

Video

Claude AI BLEW MY MIND! (Board Game Challenge)

Video

How to Secure a REST API

Video

How I Completed My First Reverse Shell (TryHackMe)

Video

Most Important Asset for Web Developers (Web Almanac)

Article

Navigating the Challenges of GenAI Adoption for Modern AppSec Teams

With an increase in GenAI adoption, AppSec teams face challenges. Learn what challenges AppSec teams are facing and how they can address risks with Snyk.

Article

14 MCP Servers for UI/UX Engineers

As LLMs' capabilities continue to expand through Anthropic’s Model Context Protocol (MCP), UI/UX engineers have access to a growing ecosystem of specialized tools that can significantly enhance their workflows. This article explores 14 open-source MCP servers for UI/UX professionals.

Video

How Dark Mode Got Me Hacked

Video

Application Security 101: A Simple Guide

Video

How to Build a Discord Bot (Part 1)

Article

The Risks and Impact of Data Leakage: Data Leakage Causes and Prevention

Knowing the risks and impact of data leakage can help protect your organization. Learn more about data leakage, its causes, and how to prevent it here.

Video

How to Build a Discord Bot in 16 Minutes (Part 2)

Video

A Simple Guide to Building a Discord Bot! (Part 3)

Video

A Simple Guide to Building a Discord Bot! (Part 4)

Video

Everything you NEED to know about DevSecOps in 5 Minutes

Article

What is LLMjacking? How AI Attacks Exploit Stolen Cloud Credentials

Attackers can exploit cloud LLMs through stolen credentials. Learn more about LLMjacking and how to protect your organization here.

Video

The Ultimate Guide to Building and Publishing Modern npm Packages (PART 1)