Skip to main content

Resources

Analyst report

Snyk named a Leader in 2025 Gartner® Magic Quadrant™ for AST

Read now

Report

Secure Every Layer, Empower Every Team: The Unified Snyk Platform

Read now

Article

Patching Detected Vulnerabilities with Factory AI and Snyk Studio

Read now
Type
Topic

Showing 241 - 264 of 608 resources

Article

What is a Data Poisoning Attack?

It’s important to protect AI models from data poisoning, an attack that injects corrupt data. Learn key strategies to detect, prevent, and mitigate risks.

Article

ChatGPT and Secure Coding: Benefits and Security Vulnerabilities of ChatGPT-Generated Code

Using ChatGPT for coding has benefits but can also introduce security vulnerabilities. Learn more about ChatGPT and secure coding and how to offset risk here.

Article

Leveraging Generative AI with DevSecOps for Enhanced Security

Learn about the top advantages of secure AI coding tools for stronger DevSecOps practices with Snyk.

Article

What is RAG, and How to Secure It

Learn how Retrieval-Augmented Generation improves LLMs with your data. Understand critical RAG security risks & discover best practices to protect your AI.

Video

How to Choose the Best and Secure Node.js Docker Image

Video

Top 3 JWT Security Best Practices for Your Apps

Video

Is AI Coding Safe? ChatGPT vs DeepSeek

Article

AI Attacks and Adversarial AI in Machine Learning

Bad actors can alter machine learning systems through adversarial AI attacks. Learn about common attack types and how to safeguard your systems here.

Video

ChatGPT's NEW Model Almost Got Me FIRED...

Video

Can AI Solve This Meme? (Automating with AI)

Article

Achieving Security Coverage and Control Over Application Risk

Stop reacting to vulnerabilities. Build proactive application security with universal asset visibility, smart policies, and risk-based prioritization. Secure your SDLC.

Video

How to Spin Up Prototype Apps Fast! (GitHub Spark)

Video

How Secure is this NEW AI Coding Tool? Bolt by Stackblitz

Video

Understanding CSRF and SSRF Attacks (Demo and Examples)

Article

OWASP Top 10 Code Vulnerabilities and How SAST Can Stop Them

Discover the OWASP Top 10 vulnerabilities and how SAST tools like Snyk Code empower developers to detect and fix them early in the development lifecycle.

Video

Claude AI BLEW MY MIND! (Board Game Challenge)

Video

How to Secure a REST API

Video

How I Completed My First Reverse Shell (TryHackMe)

Video

Most Important Asset for Web Developers (Web Almanac)

Article

Navigating the Challenges of GenAI Adoption for Modern AppSec Teams

With an increase in GenAI adoption, AppSec teams face challenges. Learn what challenges AppSec teams are facing and how they can address risks with Snyk.

Article

14 MCP Servers for UI/UX Engineers

As LLMs' capabilities continue to expand through Anthropic’s Model Context Protocol (MCP), UI/UX engineers have access to a growing ecosystem of specialized tools that can significantly enhance their workflows. This article explores 14 open-source MCP servers for UI/UX professionals.

Video

How Dark Mode Got Me Hacked

Video

Application Security 101: A Simple Guide

Video

How to Build a Discord Bot (Part 1)