
Showing 145 - 168 of 458 resources
Security Risks with Python Package Naming Convention: Typosquatting and Beyond
Beware of typosquatting and misleading Python package names—one small mistake in pip install can expose your system to backdoors, trojans, and malicious code. Learn how attackers exploit package naming conventions and discover best practices to secure your open-source supply chain.
5 Steps to Prioritize Based on Risk with Snyk - Risk-Based Prioritization Cheat Sheet
Keeping up with security can feel like a juggling act, but Snyk makes it easier by helping you focus on what matters. Follow these five steps to protect your most important application assets and prioritize issues based on the actual risk to your organization.
Can Machine Learning Find Path Traversal Vulnerabilities in Go? Snyk Code Can!
Explore how Snyk’s machine learning-powered security tools tackle path traversal vulnerabilities in Golang code. Learn how to secure your Go applications and challenge yourself to detect and exploit vulnerabilities like a pro!