<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:mobile="http://www.google.com/schemas/sitemap-mobile/1.0" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
<url><loc>https://snyk.io/blog/litellm-ai-blast-radius/</loc><lastmod>2026-04-02T22:49:55.879Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/building-ai-security-with-our-customers/</loc><lastmod>2026-04-01T18:36:51.217Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/axios-npm-package-compromised-supply-chain-attack-delivers-cross-platform/</loc><lastmod>2026-03-31T16:36:57.857Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/poisoned-security-scanner-backdooring-litellm/</loc><lastmod>2026-03-31T13:58:28.157Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/defense-ai-red-teaming/</loc><lastmod>2026-03-30T16:06:55.526Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/introducing-agent-security/</loc><lastmod>2026-03-27T18:10:51.803Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/5-principles-of-snyk-developer-experience/</loc><lastmod>2026-03-26T12:00:10.141Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/the-next-era-of-appsec-why-ai-generated-code-needs-offensive-dynamic-testing/</loc><lastmod>2026-03-20T17:23:02.785Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/ai-is-building-your-attack-surface-are-you-testing-it/</loc><lastmod>2026-03-19T22:30:32.316Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-uv-partnership/</loc><lastmod>2026-03-19T18:14:29.255Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-san-francisco-innovation-hub/</loc><lastmod>2026-03-18T16:00:11.807Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/cursor-security-agent-prompts/</loc><lastmod>2026-03-17T19:50:13.586Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-tessl-partnership/</loc><lastmod>2026-03-17T13:43:14.136Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/fetch-the-flag-ctf-2026-official-challenge-write-ups/</loc><lastmod>2026-03-10T13:11:20.721Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/llms-resurrecting-open-source-dormant-majority/</loc><lastmod>2026-03-04T14:39:57.500Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/the-ai-security-engineer/</loc><lastmod>2026-02-24T17:43:55.437Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/claude-code-remediation-loop-evolution/</loc><lastmod>2026-02-23T14:54:01.787Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/cline-supply-chain-attack-prompt-injection-github-actions/</loc><lastmod>2026-02-19T19:01:13.859Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-vercel-securing-agent-skill-ecosystem/</loc><lastmod>2026-02-18T17:49:20.273Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-cline-partnership/</loc><lastmod>2026-02-18T13:12:40.905Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/new-snyk-studio-capabilities-ai-security-fabric/</loc><lastmod>2026-02-17T14:30:35.349Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/future-of-ai-agent-security-guardrails/</loc><lastmod>2026-02-14T05:09:45.112Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/why-ai-demands-mature-appsec/</loc><lastmod>2026-02-12T16:00:11.319Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/exploitability-isn-t-the-answer-breakability-is/</loc><lastmod>2026-02-12T15:05:39.818Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/skill-scanner-false-security/</loc><lastmod>2026-02-11T22:00:48.058Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/clawhub-malicious-google-skill-openclaw-malware/</loc><lastmod>2026-02-10T18:27:59.604Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/securing-low-code-agentic-ai-mcp-guardrails/</loc><lastmod>2026-02-10T12:08:27.755Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/toxicskills-malicious-ai-agent-skills-clawhub/</loc><lastmod>2026-02-09T18:13:12.614Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/prescriptive-path/</loc><lastmod>2026-02-06T17:07:21.441Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/openclaw-skills-credential-leaks-research/</loc><lastmod>2026-02-06T16:53:38.641Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/old-ai-security-vs-evo/</loc><lastmod>2026-02-03T13:26:38.632Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/pypi-malware-discord-roblox-credential-payment-info/</loc><lastmod>2026-02-03T13:12:09.928Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="de" href="https://snyk.io/de/blog/pypi-malware-discord-roblox-credential-payment-info/"/><xhtml:link rel="alternate" hreflang="fr" href="https://snyk.io/fr/blog/pypi-malware-discord-roblox-credential-payment-info/"/><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/pypi-malware-discord-roblox-credential-payment-info/"/><xhtml:link rel="alternate" hreflang="pt-BR" href="https://snyk.io/pt-BR/blog/pypi-malware-discord-roblox-credential-payment-info/"/></url>
<url><loc>https://snyk.io/blog/ai-security-fabric/</loc><lastmod>2026-02-03T12:45:18.430Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-named-a-leader-in-the-2025-gartner-r-magic-quadrant-tm-for-application/</loc><lastmod>2026-02-03T12:34:26.967Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-advisor-security-database/</loc><lastmod>2026-02-02T15:08:48.497Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/4-advantages-of-ai-code-review/</loc><lastmod>2026-01-29T11:47:13.969Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-log-sniffer/</loc><lastmod>2026-01-28T21:49:16.515Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/ctfs-grow-cybersecurity/</loc><lastmod>2026-01-27T15:43:54.599Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/live-from-davos/</loc><lastmod>2026-01-21T15:38:57.130Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/fetch-the-flag-ctf-2025-community-writeups/</loc><lastmod>2026-01-20T14:11:08.360Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/servicenow-virtual-agent-vulnerability/</loc><lastmod>2026-01-15T13:21:09.087Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/shai-hulud-post-mortem/</loc><lastmod>2026-01-08T14:32:18.285Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/sneak-peek-into-fetch-the-flag-ctf-2025/</loc><lastmod>2026-01-07T20:08:20.558Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/an-introduction-to-capture-the-flag/</loc><lastmod>2026-01-07T20:08:01.075Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyks-fetch-the-flag-ctf/</loc><lastmod>2026-01-07T20:07:47.134Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-augment-code-partnership/</loc><lastmod>2026-01-07T14:17:15.936Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/shai-hulud-3-0/</loc><lastmod>2025-12-29T17:33:02.519Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/evo-agent-guard-cursor-integration/</loc><lastmod>2025-12-22T19:18:39.966Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/evo-adds-cyclonedx/</loc><lastmod>2025-12-19T17:25:33.330Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/application-security-best-practices/</loc><lastmod>2025-12-17T14:11:52.516Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-genesis-mission/</loc><lastmod>2025-12-15T13:30:11.667Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/how-evo-complements-new-agentic-tools/</loc><lastmod>2025-12-10T21:25:15.713Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/why-ai-trust-will-shape-your-next-decade-of-software-development/</loc><lastmod>2025-12-08T17:02:11.483Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-named-a-leader-in-the-2025-forrester-sast-wave-sast-solutions-q3-2025/</loc><lastmod>2025-12-08T17:00:43.959Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/introducing-the-snyk-ai-trust-platform/</loc><lastmod>2025-12-08T17:00:10.231Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/govern-and-secure-AI-driven-workflows/</loc><lastmod>2025-12-08T16:58:40.648Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/building-ai-trust-with-snyk-code-and-snyk-agent-fix/</loc><lastmod>2025-12-08T16:57:47.852Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/security-advisory-critical-rce-vulnerabilities-react-server-components/</loc><lastmod>2025-12-05T16:22:13.337Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/newest-snyk-ambassadors-mar-2022/</loc><lastmod>2025-12-03T20:40:01.639Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-selected-as-an-aws-pattern-partner/</loc><lastmod>2025-12-03T20:37:56.028Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/run-automcp-libraries-mcp-servers/</loc><lastmod>2025-12-03T13:30:08.329Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-kiro-partner-integration/</loc><lastmod>2025-12-01T13:30:19.554Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/sha1-hulud-npm-supply-chain-incident/</loc><lastmod>2025-11-24T20:48:51.982Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-studio-for-qodo/</loc><lastmod>2025-11-24T13:30:05.927Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-voices-returning-from-maternity-leave/</loc><lastmod>2025-11-21T18:55:18.610Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/snyk-voices-returning-from-maternity-leave/"/><xhtml:link rel="alternate" hreflang="pt-BR" href="https://snyk.io/pt-BR/blog/snyk-voices-returning-from-maternity-leave/"/><xhtml:link rel="alternate" hreflang="fr" href="https://snyk.io/fr/blog/snyk-voices-returning-from-maternity-leave/"/><xhtml:link rel="alternate" hreflang="de" href="https://snyk.io/de/blog/snyk-voices-returning-from-maternity-leave/"/></url>
<url><loc>https://snyk.io/blog/snyk-engineering-culture/</loc><lastmod>2025-11-21T18:55:18.540Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/snyk-engineering-culture/"/><xhtml:link rel="alternate" hreflang="fr" href="https://snyk.io/fr/blog/snyk-engineering-culture/"/><xhtml:link rel="alternate" hreflang="pt-BR" href="https://snyk.io/pt-BR/blog/snyk-engineering-culture/"/><xhtml:link rel="alternate" hreflang="de" href="https://snyk.io/de/blog/snyk-engineering-culture/"/></url>
<url><loc>https://snyk.io/blog/snyk-recharge-days-making-time-to-take-time/</loc><lastmod>2025-11-21T18:55:18.423Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/snyk-recharge-days-making-time-to-take-time/"/><xhtml:link rel="alternate" hreflang="fr" href="https://snyk.io/fr/blog/snyk-recharge-days-making-time-to-take-time/"/><xhtml:link rel="alternate" hreflang="pt-BR" href="https://snyk.io/pt-BR/blog/snyk-recharge-days-making-time-to-take-time/"/><xhtml:link rel="alternate" hreflang="de" href="https://snyk.io/de/blog/snyk-recharge-days-making-time-to-take-time/"/></url>
<url><loc>https://snyk.io/blog/amplifying-aapi-voices/</loc><lastmod>2025-11-21T18:55:18.313Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/amplifying-aapi-voices/"/><xhtml:link rel="alternate" hreflang="fr" href="https://snyk.io/fr/blog/amplifying-aapi-voices/"/><xhtml:link rel="alternate" hreflang="pt-BR" href="https://snyk.io/pt-BR/blog/amplifying-aapi-voices/"/><xhtml:link rel="alternate" hreflang="de" href="https://snyk.io/de/blog/amplifying-aapi-voices/"/></url>
<url><loc>https://snyk.io/blog/threat-modeling-critical-ai-native-applications/</loc><lastmod>2025-11-20T19:51:11.199Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-continue-partner-integration/</loc><lastmod>2025-11-19T18:43:23.493Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-learn-anthem-awards-2025/</loc><lastmod>2025-11-19T15:18:24.338Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/automated-package-publication-incident-indonesianfoods/</loc><lastmod>2025-11-14T23:45:35.343Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/future-threat-modeling-ai-native-apps/</loc><lastmod>2025-11-12T15:26:03.795Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/forrester-tei-snyk-roi/</loc><lastmod>2025-11-12T15:00:17.455Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/javascript-and-nodejs-security-the-common-pitfalls/</loc><lastmod>2025-11-10T18:26:48.896Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/agentic-ooda-loop/</loc><lastmod>2025-11-10T13:30:04.503Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-factory-partner-integration/</loc><lastmod>2025-11-05T13:30:23.140Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-studio-announcement/</loc><lastmod>2025-11-04T15:06:58.680Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/future-snyk-container/</loc><lastmod>2025-11-04T13:00:12.843Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/Securing-the-future-of-AI-generated-code/</loc><lastmod>2025-10-29T13:08:24.846Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/devseccon-2025-recap-securing-the-ai-revolution-together/</loc><lastmod>2025-10-23T14:03:29.600Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/introducing-evo-by-snyk/</loc><lastmod>2025-10-22T12:00:09.664Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/how-mercato-solutions-tackles-appsec-flexibility-conundrum-with-Snyk/</loc><lastmod>2025-10-17T17:15:18.370Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/from-two-years-to-two-weeks-how-labelbox-erased-its-security-debt-with-snyks/</loc><lastmod>2025-10-17T13:20:41.367Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/beyond-the-hype-5-major-reasons-to-attend-devseccon-2025/</loc><lastmod>2025-10-15T17:17:40.533Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-cognition-partner-integration/</loc><lastmod>2025-10-15T13:23:38.671Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/phishing-campaign-leveraging-the-npm-ecosystem/</loc><lastmod>2025-10-10T16:24:41.826Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/malicious-mcp-server-on-npm-postmark-mcp-harvests-emails/</loc><lastmod>2025-10-09T14:03:37.086Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/the-ultimate-guide-to-upcoming-ctfs/</loc><lastmod>2025-09-30T14:21:17.762Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/top-ten-most-popular-docker-images-each-contain-at-least-30-vulnerabilities/</loc><lastmod>2025-09-23T15:41:40.715Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-named-2022-gartner-peer-insights-customers-choice/</loc><lastmod>2025-09-23T15:40:53.336Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-gartner-peer-insights-customers-choice-2023/</loc><lastmod>2025-09-23T15:40:20.018Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/security-vulnerability-exploits-threats/</loc><lastmod>2025-09-23T15:39:02.015Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/redos-vulnerabilities-in-npm-spikes-by-143-and-xss-continues-to-grow/</loc><lastmod>2025-09-23T15:37:53.661Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/python-security-best-practices-cheat-sheet/</loc><lastmod>2025-09-23T15:37:06.006Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/pwnkit-linux-exploit-cve-2021-4034/</loc><lastmod>2025-09-23T15:36:25.581Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/open-source-maintainers-want-to-be-secure-but-70-lack-skills/</loc><lastmod>2025-09-23T14:54:46.860Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/new-years-security-resolutions-for-2024/</loc><lastmod>2025-09-23T14:53:44.199Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/key-points-from-ransomware-white-paper/</loc><lastmod>2025-09-23T14:53:02.361Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/how-to-crash-an-email-server-with-a-single-email/</loc><lastmod>2025-09-23T14:52:12.873Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/five-ways-to-get-nodejs-vulnerability-alerts/</loc><lastmod>2025-09-23T14:48:45.890Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/ethical-hacking-tools/</loc><lastmod>2025-09-23T14:47:13.975Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/aws-security-hub-integration/</loc><lastmod>2025-09-23T14:44:03.106Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/aws-reinforce-2022-recap/</loc><lastmod>2025-09-23T14:43:17.028Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/amazon-eventbridge-integration/</loc><lastmod>2025-09-23T14:42:10.912Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/88-increase-in-application-library-vulnerabilities-over-two-years/</loc><lastmod>2025-09-23T14:41:39.731Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/78-of-vulnerabilities-are-found-in-indirect-dependencies-making-remediation-complex/</loc><lastmod>2025-09-23T14:40:49.557Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/4-steps-to-remediate-vulnerabilities/</loc><lastmod>2025-09-23T14:39:59.500Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/10-serverless-security-best-practices/</loc><lastmod>2025-09-23T14:38:41.063Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/10-docker-image-security-best-practices/</loc><lastmod>2025-09-23T14:36:51.394Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="de" href="https://snyk.io/de/blog/10-docker-image-security-best-practices/"/><xhtml:link rel="alternate" hreflang="fr" href="https://snyk.io/fr/blog/10-docker-image-security-best-practices/"/><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/10-docker-image-security-best-practices/"/></url>
<url><loc>https://snyk.io/blog/how-snyk-learn-helps-you-meet-pci-dss-v4-0-developer-training-requirements/</loc><lastmod>2025-09-23T14:09:54.118Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-ranked-51-on-2025-forbes-cloud-100-list/</loc><lastmod>2025-09-22T14:41:38.789Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/embedded-malicious-code-in-tinycolor-and-ngx-bootstrap-releases-on-npm/</loc><lastmod>2025-09-19T15:25:43.155Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/scan-your-ai-generated-code-from-cursor-using-model-context-protocol-mcp/</loc><lastmod>2025-09-18T15:59:19.319Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/speaking-different-languages-how-to-align-dev-and-sec-teams-effectively/</loc><lastmod>2025-09-16T11:00:09.427Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/welcoming-helios-to-snyk/</loc><lastmod>2025-09-12T19:13:28.020Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/prioritize-vulnerabilities-based-on-risk/</loc><lastmod>2025-09-12T18:43:05.996Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-forrester-wave-2024/</loc><lastmod>2025-09-12T18:34:22.913Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="es" href="https://snyk.io/es/blog/snyk-forrester-wave-2024/"/><xhtml:link rel="alternate" hreflang="fr" href="https://snyk.io/fr/blog/snyk-forrester-wave-2024/"/><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/snyk-forrester-wave-2024/"/><xhtml:link rel="alternate" hreflang="pt-BR" href="https://snyk.io/pt-BR/blog/snyk-forrester-wave-2024/"/><xhtml:link rel="alternate" hreflang="de" href="https://snyk.io/de/blog/snyk-forrester-wave-2024/"/></url>
<url><loc>https://snyk.io/blog/zero-day-rce-in-cups-vulnerability-sept-2024/</loc><lastmod>2025-09-12T18:26:34.187Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/zero-day-rce-in-cups-vulnerability-sept-2024/"/></url>
<url><loc>https://snyk.io/blog/dev-first-dynamic-testing-security/</loc><lastmod>2025-09-12T18:20:51.518Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/dev-first-dynamic-testing-security/"/><xhtml:link rel="alternate" hreflang="de" href="https://snyk.io/de/blog/dev-first-dynamic-testing-security/"/><xhtml:link rel="alternate" hreflang="es" href="https://snyk.io/es/blog/dev-first-dynamic-testing-security/"/><xhtml:link rel="alternate" hreflang="fr" href="https://snyk.io/fr/blog/dev-first-dynamic-testing-security/"/><xhtml:link rel="alternate" hreflang="pt-BR" href="https://snyk.io/pt-BR/blog/dev-first-dynamic-testing-security/"/></url>
<url><loc>https://snyk.io/blog/npm-supply-chain-attack-via-open-source-maintainer-compromise/</loc><lastmod>2025-09-10T21:14:38.196Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/weaponizing-ai-coding-agents-for-malware-in-the-nx-malicious-package/</loc><lastmod>2025-09-04T17:36:41.553Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/what-an-aha-moment-with-an-org-admin-token-taught-one-devseccon-speaker/</loc><lastmod>2025-09-04T14:59:27.304Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/finding-software-flaws-early-in-the-development-process-provides-clear-roi/</loc><lastmod>2025-08-22T16:17:47.203Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/whats-an-npm-dependency/</loc><lastmod>2025-08-21T14:37:04.169Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/prioritize-with-snyks-open-source-vulnerability-experience/</loc><lastmod>2025-08-20T16:41:40.632Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/ai-agents-in-cybersecurity-revolutionizing-appsec/</loc><lastmod>2025-08-14T17:01:20.050Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/agentic-container-security-with-snyk-mcp-server/</loc><lastmod>2025-08-13T19:07:58.560Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/chatgpt-chat-google/</loc><lastmod>2025-08-11T17:33:40.115Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/from-ideas-to-impact/</loc><lastmod>2025-08-07T12:10:35.773Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/why-federal-teams-trust-snyk/</loc><lastmod>2025-08-07T12:08:59.064Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-akamai-integration-api-discovery-testing/</loc><lastmod>2025-08-06T12:58:19.810Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/the-hidden-costs-of-false-positives-in-healthtech-security/</loc><lastmod>2025-08-05T13:44:47.268Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-joins-cisas-secure-by-design-pledge/</loc><lastmod>2025-08-05T12:51:54.829Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/secure-at-inception-black-hat-2025/</loc><lastmod>2025-08-04T12:26:54.182Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/minimizing-false-positives-enhancing-security-efficiency/</loc><lastmod>2025-07-30T13:21:50.827Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/from-risk-to-resilience-achieving-hipaa-standards-in-your-app/</loc><lastmod>2025-07-30T13:14:02.741Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/fend-off-ai-fatigue-with-the-snyk-ai-trust-platform/</loc><lastmod>2025-07-29T14:56:13.648Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/actionable-and-aggregated-slack-notifications/</loc><lastmod>2025-07-23T15:45:58.845Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/modern-vs-code-extension-development-tutorial/</loc><lastmod>2025-07-23T15:43:03.057Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/webassembly-security-concerns/</loc><lastmod>2025-07-23T15:41:26.608Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/maintainers-of-eslint-prettier-plugin-attacked-via-npm-supply-chain-malware/</loc><lastmod>2025-07-22T12:35:26.392Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/from-hype-to-trust-building-the-foundations-of-secure-ai-development/</loc><lastmod>2025-07-21T20:05:43.533Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/cursor-ide-malware-extension-compromise-in-usd500k-crypto-heist/</loc><lastmod>2025-07-21T15:29:25.050Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/navigating-enterprise-ai-implementation-risks-rewards-and-where-to-start/</loc><lastmod>2025-07-21T13:28:01.928Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/human-ai-the-next-era-of-snyks-vulnerability-curation/</loc><lastmod>2025-07-14T13:43:12.536Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/fixing-fix-fatigue-building-developer-trust-for-secure-ai-code/</loc><lastmod>2025-06-30T16:18:31.319Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/understanding-cra-compliance/</loc><lastmod>2025-06-26T15:48:46.063Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/ai-code-generation-code-security-quality-benefits-risks-top-tools/</loc><lastmod>2025-06-25T19:12:15.540Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/ai-hallucinations/</loc><lastmod>2025-06-25T19:11:39.534Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="de" href="https://snyk.io/de/blog/ai-hallucinations/"/><xhtml:link rel="alternate" hreflang="fr" href="https://snyk.io/fr/blog/ai-hallucinations/"/><xhtml:link rel="alternate" hreflang="pt-BR" href="https://snyk.io/pt-BR/blog/ai-hallucinations/"/><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/ai-hallucinations/"/></url>
<url><loc>https://snyk.io/blog/ai-risk-management-benefits-challenges-and-best-practices/</loc><lastmod>2025-06-25T19:11:02.383Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/deepcode-ai-vulnerability-autofixing/</loc><lastmod>2025-06-25T19:10:29.350Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="de" href="https://snyk.io/de/blog/deepcode-ai-vulnerability-autofixing/"/><xhtml:link rel="alternate" hreflang="fr" href="https://snyk.io/fr/blog/deepcode-ai-vulnerability-autofixing/"/><xhtml:link rel="alternate" hreflang="pt-BR" href="https://snyk.io/pt-BR/blog/deepcode-ai-vulnerability-autofixing/"/><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/deepcode-ai-vulnerability-autofixing/"/></url>
<url><loc>https://snyk.io/blog/find-auto-fix-prioritize-intelligently-snyks-ai-powered-code/</loc><lastmod>2025-06-25T19:08:50.627Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="es" href="https://snyk.io/es/blog/find-auto-fix-prioritize-intelligently-snyks-ai-powered-code/"/><xhtml:link rel="alternate" hreflang="fr" href="https://snyk.io/fr/blog/find-auto-fix-prioritize-intelligently-snyks-ai-powered-code/"/><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/find-auto-fix-prioritize-intelligently-snyks-ai-powered-code/"/><xhtml:link rel="alternate" hreflang="pt-BR" href="https://snyk.io/pt-BR/blog/find-auto-fix-prioritize-intelligently-snyks-ai-powered-code/"/><xhtml:link rel="alternate" hreflang="de" href="https://snyk.io/de/blog/find-auto-fix-prioritize-intelligently-snyks-ai-powered-code/"/></url>
<url><loc>https://snyk.io/blog/gartners-generative-ai-insights-part-2/</loc><lastmod>2025-06-25T18:59:46.290Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/integrating-snyk-language-server-with-intellij-ide/</loc><lastmod>2025-06-25T18:58:21.162Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/why-snyk-wins-open-source-security-battle/</loc><lastmod>2025-06-25T15:25:20.442Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/ai-code-security-snyk-autofix-deepcode-ai/</loc><lastmod>2025-06-24T17:19:25.987Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="de" href="https://snyk.io/de/blog/ai-code-security-snyk-autofix-deepcode-ai/"/><xhtml:link rel="alternate" hreflang="fr" href="https://snyk.io/fr/blog/ai-code-security-snyk-autofix-deepcode-ai/"/><xhtml:link rel="alternate" hreflang="pt-BR" href="https://snyk.io/pt-BR/blog/ai-code-security-snyk-autofix-deepcode-ai/"/><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/ai-code-security-snyk-autofix-deepcode-ai/"/></url>
<url><loc>https://snyk.io/blog/code-review/</loc><lastmod>2025-06-24T15:20:58.574Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/the-future-of-developer-upskilling-is-human-led-ai-supported/</loc><lastmod>2025-06-23T14:49:17.791Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/the-new-threat-landscape-ai-native-apps-and-agentic-workflows/</loc><lastmod>2025-06-18T13:19:01.173Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/announcing-snyk-api-and-web-infrastructure-instance-for-asia-pacific/</loc><lastmod>2025-06-17T18:26:09.430Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/why-anz-tech-leaders-are-rethinking-how-ai-speed-security-intersect/</loc><lastmod>2025-06-16T14:45:49.407Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/automatically-fix-code-vulnerabilities-ai/</loc><lastmod>2025-06-12T16:02:20.797Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="de" href="https://snyk.io/de/blog/automatically-fix-code-vulnerabilities-ai/"/></url>
<url><loc>https://snyk.io/blog/vulnerability-free-c-and-c-development-in-automotive-manufacturing-and/</loc><lastmod>2025-06-12T16:02:20.581Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="de" href="https://snyk.io/de/blog/vulnerability-free-c-and-c-development-in-automotive-manufacturing-and/"/></url>
<url><loc>https://snyk.io/blog/build-fast-stay-secure-guardrails-for-ai-coding-assistants/</loc><lastmod>2025-06-11T16:48:14.760Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/transform-your-appsec-program-with-the-power-of-snyk-analytics/</loc><lastmod>2025-06-11T13:57:02.866Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/security-testing-for-single-page-applications-spas/</loc><lastmod>2025-06-06T15:10:39.642Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/security-testing-for-single-page-applications-spas/"/></url>
<url><loc>https://snyk.io/blog/snyk-for-government-achieves-fedramp-moderate-authorization/</loc><lastmod>2025-06-06T13:51:48.167Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/humans-at-the-center-redefining-the-role-of-developers-in-an-ai-powered/</loc><lastmod>2025-06-05T14:01:39.148Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/ai-trust-in-action-how-snyk-agent-redefines-secure-development/</loc><lastmod>2025-06-03T21:04:35.444Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/scaling-security-education-with-snyks-new-learn-add-on/</loc><lastmod>2025-05-29T13:54:11.601Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/welcome-to-the-new-era-of-ai-driven-development/</loc><lastmod>2025-05-29T13:51:56.722Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/ai-is-reshaping-software-is-your-security-strategy-keeping-up/</loc><lastmod>2025-05-29T13:51:26.698Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/securing-genai-development-with-snyk/</loc><lastmod>2025-05-28T13:27:39.592Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/securing-genai-development-with-snyk/"/></url>
<url><loc>https://snyk.io/blog/snyk-announces-the-future-of-dast-ai-driven-security-for-the-age-of-ai/</loc><lastmod>2025-05-28T13:22:52.496Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-helps-secure-the-golang-bento-project/</loc><lastmod>2025-05-28T13:21:02.850Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-ranked-19-on-2023-forbes-cloud-100-list/</loc><lastmod>2025-05-28T13:20:30.350Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-safe-adoption-of-ai/</loc><lastmod>2025-05-28T13:17:49.347Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-security-solution-now-integrated-into-google-clouds-gemini-code-assist/</loc><lastmod>2025-05-28T13:16:21.523Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyklaunch-june-2023-recap/</loc><lastmod>2025-05-28T13:09:56.395Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/SnykLaunch-Oct-2024/</loc><lastmod>2025-05-28T13:01:58.088Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/stack-overflow-ai-development-survey/</loc><lastmod>2025-05-28T13:00:58.136Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/top-5-sast-auto-fixing-tools-how-they-compare/</loc><lastmod>2025-05-28T12:59:25.134Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/unburdening-developers-from-vulnerability-fatigue-with-snyk-delta-findings/</loc><lastmod>2025-05-28T12:47:57.855Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/welcome-to-snyk-labs-charting-the-course-for-ai-native-security/</loc><lastmod>2025-05-28T12:22:11.116Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/the-inevitability-of-developer-security/</loc><lastmod>2025-05-28T11:27:58.520Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="de" href="https://snyk.io/de/blog/the-inevitability-of-developer-security/"/><xhtml:link rel="alternate" hreflang="fr" href="https://snyk.io/fr/blog/the-inevitability-of-developer-security/"/><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/the-inevitability-of-developer-security/"/><xhtml:link rel="alternate" hreflang="pt-BR" href="https://snyk.io/pt-BR/blog/the-inevitability-of-developer-security/"/></url>
<url><loc>https://snyk.io/blog/improving-developer-experience-with-security-tools-at-pinterest/</loc><lastmod>2025-05-28T11:27:26.944Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/unintimidating-intro-to-c-cpp-vulnerabilities/</loc><lastmod>2025-05-28T11:27:26.885Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyks-risk-based-approach-to-prioritization/</loc><lastmod>2025-05-23T16:18:12.873Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/snyks-risk-based-approach-to-prioritization/"/></url>
<url><loc>https://snyk.io/blog/snyk-rsac-2025/</loc><lastmod>2025-05-23T14:31:30.596Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-learn-in-the-exosphere-securing-space-at-hackspacecon/</loc><lastmod>2025-05-23T14:21:45.369Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-report-shows-88-of-cisos-are-concerned-with-current-state-of-u-s-cyber/</loc><lastmod>2025-05-21T17:12:36.032Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/python-code-review-tools/</loc><lastmod>2025-05-14T16:48:04.086Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/java-code-review-tools/</loc><lastmod>2025-05-14T16:45:12.216Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/driving-ai-security-innovation-snyk-enhances-global-channel-and-gsi-partner/</loc><lastmod>2025-05-08T13:24:51.413Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/learn-about-open-source-security-risks-with-the-new-snyk-learn-learning-path/</loc><lastmod>2025-05-05T20:16:52.601Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/new-snyk-learn-learning-path-api-security-risks/</loc><lastmod>2025-05-05T18:51:14.516Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/secure-ai-generated-code-at-speed-with-snyk-and-servicenow/</loc><lastmod>2025-05-01T17:58:05.859Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/black-hat-asia-2025-my-journey-as-a-reviewer-speaker-and-community-connector/</loc><lastmod>2025-04-28T14:48:37.592Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyks-statement-on-the-mitre-cves-program-funding-update/</loc><lastmod>2025-04-17T20:08:35.220Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-partners-with-nova8-to-empower-secure-development-across-latin-america/</loc><lastmod>2025-04-15T13:01:11.330Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/cve-2025-29927-authorization-bypass-in-next-js-middleware/</loc><lastmod>2025-04-09T19:32:53.128Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/how-to-secure-rest-api/</loc><lastmod>2025-04-09T19:32:12.461Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/4-ai-coding-risks/</loc><lastmod>2025-04-09T19:30:46.147Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/polyfill-supply-chain-attack-js-cdn-assets/</loc><lastmod>2025-04-09T19:29:41.367Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/10-best-practices-for-securely-developing-with-ai/</loc><lastmod>2025-04-09T19:29:01.389Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/nine-docker-pro-tips-node-js-developers/</loc><lastmod>2025-04-09T19:28:23.121Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/preventing-server-side-request-forgery-node-js/</loc><lastmod>2025-04-09T19:27:24.426Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/building-npm-package-compatible-with-esm-and-cjs-2024/</loc><lastmod>2025-04-09T19:26:35.216Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/top-5-vs-code-extensions-security/</loc><lastmod>2025-04-09T19:25:36.747Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/choosing-the-best-node-js-docker-image/</loc><lastmod>2025-04-09T19:22:54.402Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="de" href="https://snyk.io/de/blog/choosing-the-best-node-js-docker-image/"/><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/choosing-the-best-node-js-docker-image/"/><xhtml:link rel="alternate" hreflang="fr" href="https://snyk.io/fr/blog/choosing-the-best-node-js-docker-image/"/></url>
<url><loc>https://snyk.io/blog/snyk-accelerate-with-accenture/</loc><lastmod>2025-04-08T13:53:04.783Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/detect-infrastructure-drift-unmanaged-resources-snyk-iac/</loc><lastmod>2025-04-03T19:21:17.470Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="de" href="https://snyk.io/de/blog/detect-infrastructure-drift-unmanaged-resources-snyk-iac/"/><xhtml:link rel="alternate" hreflang="fr" href="https://snyk.io/fr/blog/detect-infrastructure-drift-unmanaged-resources-snyk-iac/"/><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/detect-infrastructure-drift-unmanaged-resources-snyk-iac/"/><xhtml:link rel="alternate" hreflang="pt-BR" href="https://snyk.io/pt-BR/blog/detect-infrastructure-drift-unmanaged-resources-snyk-iac/"/></url>
<url><loc>https://snyk.io/blog/improve-cloud-coverage-reduce-infrastructure-drift/</loc><lastmod>2025-04-03T19:21:17.264Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="de" href="https://snyk.io/de/blog/improve-cloud-coverage-reduce-infrastructure-drift/"/><xhtml:link rel="alternate" hreflang="fr" href="https://snyk.io/fr/blog/improve-cloud-coverage-reduce-infrastructure-drift/"/><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/improve-cloud-coverage-reduce-infrastructure-drift/"/><xhtml:link rel="alternate" hreflang="pt-BR" href="https://snyk.io/pt-BR/blog/improve-cloud-coverage-reduce-infrastructure-drift/"/></url>
<url><loc>https://snyk.io/blog/infrastructure-drift-detection-mitigation/</loc><lastmod>2025-04-03T19:21:17.145Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="de" href="https://snyk.io/de/blog/infrastructure-drift-detection-mitigation/"/><xhtml:link rel="alternate" hreflang="fr" href="https://snyk.io/fr/blog/infrastructure-drift-detection-mitigation/"/><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/infrastructure-drift-detection-mitigation/"/><xhtml:link rel="alternate" hreflang="pt-BR" href="https://snyk.io/pt-BR/blog/infrastructure-drift-detection-mitigation/"/></url>
<url><loc>https://snyk.io/blog/surveymonkey-developer-security-hypergrowth/</loc><lastmod>2025-04-03T19:20:24.458Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="de" href="https://snyk.io/de/blog/surveymonkey-developer-security-hypergrowth/"/><xhtml:link rel="alternate" hreflang="fr" href="https://snyk.io/fr/blog/surveymonkey-developer-security-hypergrowth/"/><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/surveymonkey-developer-security-hypergrowth/"/></url>
<url><loc>https://snyk.io/blog/building-sbom-open-source-supply-chain-security/</loc><lastmod>2025-04-03T19:20:24.153Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="de" href="https://snyk.io/de/blog/building-sbom-open-source-supply-chain-security/"/><xhtml:link rel="alternate" hreflang="fr" href="https://snyk.io/fr/blog/building-sbom-open-source-supply-chain-security/"/><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/building-sbom-open-source-supply-chain-security/"/></url>
<url><loc>https://snyk.io/blog/snykcon-recap-automation/</loc><lastmod>2025-04-03T19:18:25.126Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-new-reporting-beta/</loc><lastmod>2025-04-03T19:18:25.025Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="de" href="https://snyk.io/de/blog/snyk-new-reporting-beta/"/><xhtml:link rel="alternate" hreflang="fr" href="https://snyk.io/fr/blog/snyk-new-reporting-beta/"/><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/snyk-new-reporting-beta/"/></url>
<url><loc>https://snyk.io/blog/understanding-software-supply-chain-security-requirements-cybersecurity-executive-order/</loc><lastmod>2025-04-03T19:15:35.471Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="de" href="https://snyk.io/de/blog/understanding-software-supply-chain-security-requirements-cybersecurity-executive-order/"/><xhtml:link rel="alternate" hreflang="fr" href="https://snyk.io/fr/blog/understanding-software-supply-chain-security-requirements-cybersecurity-executive-order/"/><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/understanding-software-supply-chain-security-requirements-cybersecurity-executive-order/"/><xhtml:link rel="alternate" hreflang="pt-BR" href="https://snyk.io/pt-BR/blog/understanding-software-supply-chain-security-requirements-cybersecurity-executive-order/"/></url>
<url><loc>https://snyk.io/blog/get-off-my-lawn-and-fix-your-vulnerabilities/</loc><lastmod>2025-04-01T14:37:58.898Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/your-fetch-the-flag-questions-answered-with-snyk-and-john-hammond/</loc><lastmod>2025-04-01T13:12:51.854Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/google-security-command-center-integration/</loc><lastmod>2025-03-31T21:43:11.180Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/go-malicious-package-alert/</loc><lastmod>2025-03-31T21:40:03.851Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/new-year-new-security-goals-improve-your-appsec-in-2025/</loc><lastmod>2025-03-31T21:39:47.140Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/naughty-and-nice-security-practices/</loc><lastmod>2025-03-31T21:39:15.133Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/mitigating-ssrf-vulnerabilities-in-go/</loc><lastmod>2025-03-31T21:38:59.599Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/include-license-info-in-your-sboms/</loc><lastmod>2025-03-31T21:38:36.230Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/incorporating-security-by-design-managing-risk-in-devsecops/</loc><lastmod>2025-03-31T21:36:57.439Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/aspm-boosts-visibility-manage-app-risk/</loc><lastmod>2025-03-31T21:32:54.395Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/can-snyk-detect-jwt-security-issues/</loc><lastmod>2025-03-31T21:32:32.241Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/6-software-composition-analysis-sca-best-practices/</loc><lastmod>2025-03-31T21:32:04.365Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/devsecops-automation-framework/</loc><lastmod>2025-03-31T21:29:41.083Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-servicenow-snyk-learn-vr-assignment-rules/</loc><lastmod>2025-03-31T21:29:32.300Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/responding-and-remediating-best-practices-for-handling-security-alerts/</loc><lastmod>2025-03-31T21:28:51.155Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/building-a-culture-of-secure-coding-empowering-developers-to-build-resilient/</loc><lastmod>2025-03-31T21:28:12.246Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/securing-the-digital-future-appsec-best-practices-in-digital-banking/</loc><lastmod>2025-03-31T21:26:44.575Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/can-snyk-find-weak-cryptographic-algorithms-bye-bye-md5/</loc><lastmod>2025-03-31T21:25:14.045Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/solving-security-challenges-with-snyk-code-and-symbolic-ai/</loc><lastmod>2025-03-31T21:23:26.194Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/4-tips-for-securing-genai-assisted-development/</loc><lastmod>2025-03-31T21:23:10.884Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/overcoming-appsec-challenges-in-finserv-how-cibc-balances-speed-security-and/</loc><lastmod>2025-03-31T21:20:19.390Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/find-fix-log4shell-quickly-snyk/</loc><lastmod>2025-03-31T13:42:38.233Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/new-openssl-critical-vulnerability/</loc><lastmod>2025-03-31T13:42:38.125Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/find-and-fix-webp-vulnerability-cve-2023-4863/</loc><lastmod>2025-03-31T13:42:37.999Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/curl-high-severity-vulnerability-oct-2023/</loc><lastmod>2025-03-31T13:42:37.734Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="de" href="https://snyk.io/de/blog/curl-high-severity-vulnerability-oct-2023/"/><xhtml:link rel="alternate" hreflang="fr" href="https://snyk.io/fr/blog/curl-high-severity-vulnerability-oct-2023/"/><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/curl-high-severity-vulnerability-oct-2023/"/><xhtml:link rel="alternate" hreflang="pt-BR" href="https://snyk.io/pt-BR/blog/curl-high-severity-vulnerability-oct-2023/"/></url>
<url><loc>https://snyk.io/blog/governance-in-devsecops-measuring-improving-security-outcomes/</loc><lastmod>2025-03-27T15:27:44.336Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-200-malicious-npm-packages-cobalt-strike-dependency-confusion-attacks/</loc><lastmod>2025-03-21T19:34:40.705Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="de" href="https://snyk.io/de/blog/snyk-200-malicious-npm-packages-cobalt-strike-dependency-confusion-attacks/"/><xhtml:link rel="alternate" hreflang="fr" href="https://snyk.io/fr/blog/snyk-200-malicious-npm-packages-cobalt-strike-dependency-confusion-attacks/"/><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/snyk-200-malicious-npm-packages-cobalt-strike-dependency-confusion-attacks/"/></url>
<url><loc>https://snyk.io/blog/protestware-open-source-types-impact/</loc><lastmod>2025-03-21T19:29:44.215Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="de" href="https://snyk.io/de/blog/protestware-open-source-types-impact/"/><xhtml:link rel="alternate" hreflang="fr" href="https://snyk.io/fr/blog/protestware-open-source-types-impact/"/><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/protestware-open-source-types-impact/"/><xhtml:link rel="alternate" hreflang="pt-BR" href="https://snyk.io/pt-BR/blog/protestware-open-source-types-impact/"/></url>
<url><loc>https://snyk.io/blog/reconstructing-tj-actions-changed-files-github-actions-compromise/</loc><lastmod>2025-03-17T18:09:38.109Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/php-security-support-snyk-code/</loc><lastmod>2025-03-10T13:46:27.604Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="de" href="https://snyk.io/de/blog/php-security-support-snyk-code/"/><xhtml:link rel="alternate" hreflang="fr" href="https://snyk.io/fr/blog/php-security-support-snyk-code/"/><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/php-security-support-snyk-code/"/></url>
<url><loc>https://snyk.io/blog/session-management-security/</loc><lastmod>2025-03-10T13:37:28.016Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/ultimate-guide-creating-secure-python-package/</loc><lastmod>2025-03-10T13:36:31.916Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/secure-python-flask-applications/</loc><lastmod>2025-03-10T13:34:51.488Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/malicious-packages-open-source-ecosystems/</loc><lastmod>2025-03-05T13:50:18.245Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/cloud-application-security/</loc><lastmod>2025-02-28T16:00:56.028Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/celebrating-black-history-month-2025-at-snyk/</loc><lastmod>2025-02-26T21:32:43.748Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/announcing-2022-state-of-open-source-security-report/</loc><lastmod>2025-02-25T23:53:42.538Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="de" href="https://snyk.io/de/blog/announcing-2022-state-of-open-source-security-report/"/><xhtml:link rel="alternate" hreflang="fr" href="https://snyk.io/fr/blog/announcing-2022-state-of-open-source-security-report/"/><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/announcing-2022-state-of-open-source-security-report/"/></url>
<url><loc>https://snyk.io/blog/first-round-changes-matching-snyks-design-language/</loc><lastmod>2025-02-25T17:55:56.073Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/4-steps-to-implement-devsecops/</loc><lastmod>2025-02-24T21:13:49.252Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/security-companion-ai-generated-code/</loc><lastmod>2025-02-21T21:15:31.956Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/creating-sboms-snyk-cli/</loc><lastmod>2025-02-20T21:22:34.866Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/creating-sboms-snyk-cli/"/></url>
<url><loc>https://snyk.io/blog/best-practices-create-modern-npm-package/</loc><lastmod>2025-02-20T17:16:30.770Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-white-house-cybersecurity-recommendations/</loc><lastmod>2025-02-12T15:44:37.943Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/security-compliance-cheat-sheet/</loc><lastmod>2025-01-30T14:05:04.081Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/introducing-the-snyk-ambassador-program-a-call-for-nomination-to-champion-application-security/</loc><lastmod>2025-01-29T14:59:33.765Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/women-in-security-inspiring-leaders/</loc><lastmod>2025-01-29T14:45:49.502Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/reviving-devsecops-snyks-new-framework/</loc><lastmod>2025-01-23T17:03:48.166Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/understanding-the-eus-cyber-resilience-act-cra/</loc><lastmod>2025-01-22T14:35:40.426Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/bfis-journey-in-digital-transformation/</loc><lastmod>2025-01-14T23:53:05.941Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-security-labs-testing-update-cursor-com-ai-code-editor/</loc><lastmod>2025-01-14T20:10:59.255Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-recognized-as-trusted-partner-and-innovator-by-jpmorganchase/</loc><lastmod>2025-01-14T20:00:19.619Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/javascript-runtime-compare-node-deno-bun/</loc><lastmod>2025-01-08T18:54:47.155Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/appsec-maturity-models/</loc><lastmod>2025-01-06T20:26:46.851Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/cloud-security-challenges/</loc><lastmod>2025-01-06T20:22:17.819Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/aws-security-risks-prevention/</loc><lastmod>2025-01-06T20:10:50.536Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/security-misconfiguration/</loc><lastmod>2025-01-06T19:57:19.784Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/ultralytics-ai-pwn-request-supply-chain-attack/</loc><lastmod>2024-12-13T14:08:49.228Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/disaster-recovery-testing-best-practices/</loc><lastmod>2024-12-12T15:37:04.614Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/who-uses-cpp/</loc><lastmod>2024-12-12T15:37:04.561Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/microservices-security/</loc><lastmod>2024-12-12T15:37:04.509Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/risks-of-open-source-software/</loc><lastmod>2024-12-12T15:37:04.336Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/devops-tools/</loc><lastmod>2024-12-12T15:37:04.215Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/ai-security-developer-tools/</loc><lastmod>2024-12-12T15:37:04.078Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/8-aws-security-best-practices/</loc><lastmod>2024-12-12T15:37:03.937Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/devops-security/</loc><lastmod>2024-12-12T15:27:51.306Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/owasp-top-10-vulnerabilities/</loc><lastmod>2024-12-12T15:27:50.983Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/what-is-bsd-license/</loc><lastmod>2024-12-12T15:27:50.941Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/cybersecurity-hygiene/</loc><lastmod>2024-12-12T15:27:50.892Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/secrets-management/</loc><lastmod>2024-12-12T15:27:50.845Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/defense-in-depth-explained/</loc><lastmod>2024-12-12T15:27:50.802Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/asset-first-application-security/</loc><lastmod>2024-12-12T15:27:50.650Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/container-security-monitoring/</loc><lastmod>2024-12-12T15:27:50.607Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/owasp-top-10-api-security-vulnerabilities/</loc><lastmod>2024-12-12T15:27:50.556Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/application-security-api-security/</loc><lastmod>2024-12-12T15:27:50.514Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/application-security-vulnerability-vs-weakness/</loc><lastmod>2024-12-12T15:27:50.468Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/automated-code-review/</loc><lastmod>2024-12-12T15:27:50.375Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/application-security-assessment/</loc><lastmod>2024-12-12T15:27:50.326Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/secure-sdlc-best-practices/</loc><lastmod>2024-12-12T15:27:50.201Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/top-5-docker-security-vulnerabilities/</loc><lastmod>2024-12-12T15:27:50.158Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/supply-chain-security-tools-guide/</loc><lastmod>2024-12-12T15:27:49.969Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/developer-first-supply-chain-security/</loc><lastmod>2024-12-12T15:27:49.923Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/getting-started-new-organization/</loc><lastmod>2024-12-12T15:27:49.878Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/4-best-devsecops-tools/</loc><lastmod>2024-12-12T15:27:49.826Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/multi-cloud-security/</loc><lastmod>2024-12-12T15:27:49.720Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/managing-open-source-components/</loc><lastmod>2024-12-12T15:27:49.676Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/supply-chain-risks-and-best-practices/</loc><lastmod>2024-12-12T15:27:49.588Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/what-is-virtual-ciso-vciso/</loc><lastmod>2024-12-12T15:27:49.535Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/enterprise-level-security-best-practices/</loc><lastmod>2024-12-12T15:27:49.477Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/aws-security-breaches/</loc><lastmod>2024-12-12T15:27:49.429Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/top-8-devsecops-best-practices/</loc><lastmod>2024-12-12T15:27:49.361Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/empowering-women-in-security-the-impact-of-mentorship/</loc><lastmod>2024-12-05T14:58:15.090Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/2024-open-source-security-report-slowing-progress-and-new-challenges-for/</loc><lastmod>2024-12-04T14:02:25.753Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/seven-steps-to-close-coverage-gaps-with-aspm/</loc><lastmod>2024-12-03T14:23:49.094Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/6-reasons-to-use-source-code-analysis/</loc><lastmod>2024-12-02T21:10:36.498Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/ensuring-comprehensive-devops-security-testing/</loc><lastmod>2024-11-27T19:51:00.107Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/solid-devops-foundation-for-effective-devsecops/</loc><lastmod>2024-11-27T19:49:34.809Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/measuring-appsec-success-key-kpis-demonstrate-value/</loc><lastmod>2024-11-26T20:28:33.296Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/container-security-trends-report-2022/</loc><lastmod>2024-11-22T20:48:15.355Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/japan-meti-guide-to-sbom-for-software-management/</loc><lastmod>2024-11-22T20:47:21.223Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/japan-meti-guide-to-sbom-for-software-management/"/></url>
<url><loc>https://snyk.io/blog/welcome-enso-aspm/</loc><lastmod>2024-11-22T20:46:00.210Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/10-best-practices-to-containerize-nodejs-web-applications-with-docker/</loc><lastmod>2024-11-22T20:30:38.169Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="fr" href="https://snyk.io/fr/blog/10-best-practices-to-containerize-nodejs-web-applications-with-docker/"/><xhtml:link rel="alternate" hreflang="de" href="https://snyk.io/de/blog/10-best-practices-to-containerize-nodejs-web-applications-with-docker/"/><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/10-best-practices-to-containerize-nodejs-web-applications-with-docker/"/></url>
<url><loc>https://snyk.io/blog/snyk-learn-commitment-to-future/</loc><lastmod>2024-11-22T14:46:18.930Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/best-practices-continuous-vulnerability-management/</loc><lastmod>2024-11-19T14:28:42.542Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/elevating-views-risk-holistic-application-risk-management-with-snyk/</loc><lastmod>2024-11-19T14:27:27.041Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/identifying-insecure-c-code-valgrind/</loc><lastmod>2024-11-19T14:26:08.615Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/nodejs-add-on-extensions/</loc><lastmod>2024-11-18T16:27:43.496Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/6-kubernetes-tools-secure-containers-runtime/</loc><lastmod>2024-11-14T17:17:49.733Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/5-disaster-recovery-testing-methodologies/</loc><lastmod>2024-11-14T15:33:20.076Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/5-best-practices-container-security/</loc><lastmod>2024-11-14T15:14:21.138Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/understanding-go-command-injection-vulnerabilities/</loc><lastmod>2024-11-14T13:57:06.439Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/if-you-dont-know-about-http-archives-web-almanac-yet/</loc><lastmod>2024-11-01T14:19:48.858Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/Reachability-for-vuln-prioritization/</loc><lastmod>2024-10-31T15:24:20.967Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/Extensive-AppSec-visibility-with-Snyk-Analytics/</loc><lastmod>2024-10-31T15:00:51.277Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/Why-developer-experience-is-top-priority/</loc><lastmod>2024-10-31T14:39:21.499Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/lottie-player-npm-package-compromised-crypto-wallet-theft/</loc><lastmod>2024-10-31T13:07:34.731Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/incyber-forum-europe-recap/</loc><lastmod>2024-10-25T14:16:29.587Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/women-kickstart-your-application-security-career/</loc><lastmod>2024-10-22T13:49:47.017Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-announces-commitment-to-service-for-america-bringing-security-education-access-to-all/</loc><lastmod>2024-10-17T12:32:20.296Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/analyze-taint-analysis-contextual-dataflow-snyk-code/</loc><lastmod>2024-10-10T13:39:16.977Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/supply-chain-string-width-cjs-npm/</loc><lastmod>2024-10-03T13:23:21.832Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-gartner-customers-choice/</loc><lastmod>2024-10-03T13:00:02.759Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/proactive-appsec-continuous-vulnerability-management/</loc><lastmod>2024-10-02T13:04:36.717Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/prevent-log-injection-vulnerability-javascript-node-js/</loc><lastmod>2024-09-26T13:06:57.712Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/integrate-aspm-with-application-security/</loc><lastmod>2024-09-25T14:02:05.058Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/announcing-snyk-apprisk-aspm/</loc><lastmod>2024-09-25T14:01:16.257Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/security-naughty-or-nice-list/</loc><lastmod>2024-09-25T14:00:12.328Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/introducing-aspm-masterclass/</loc><lastmod>2024-09-25T13:59:04.620Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyks-appsec-dream-team/</loc><lastmod>2024-09-25T13:58:31.074Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/six-takeaways-from-aspm-masterclass/</loc><lastmod>2024-09-25T13:57:51.770Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/empower-application-risk-management-with-snyk-apprisk/</loc><lastmod>2024-09-25T13:57:05.327Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/appsec-spring-cleaning-checklist/</loc><lastmod>2024-09-25T13:26:57.027Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/why-aspm-is-future-of-appsec-whitepaper/</loc><lastmod>2024-09-25T13:26:21.817Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/announcing-snyk-apprisk-integration-orca/</loc><lastmod>2024-09-25T13:25:40.085Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/promise-queues-concurrent-tasks-deno/</loc><lastmod>2024-09-25T13:06:02.551Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/dive-into-ai-llm-learning-with-new-snyk-learn-learning-path/</loc><lastmod>2024-09-25T13:04:04.560Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/introducing-new-snyk-ui/</loc><lastmod>2024-09-20T16:21:04.071Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/c-cpp-security-scanning-unmanaged-snyk-open-source/</loc><lastmod>2024-09-20T16:19:54.151Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/make-snyk-notifications-work-for-you/</loc><lastmod>2024-09-20T16:18:17.280Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/3-best-practices-snyk-apprisk-essentials/</loc><lastmod>2024-09-19T16:23:36.605Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-users-dont-have-to-worry-about-nvd-delays/</loc><lastmod>2024-09-19T14:31:30.596Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/how-sas-secures-ai-generated-code/</loc><lastmod>2024-09-18T17:14:19.424Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-for-government-developer-security-solution-with-fedramp-ato/</loc><lastmod>2024-09-17T18:58:04.030Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/want-to-avoid-data-breach-employ-secrets-detection/</loc><lastmod>2024-09-17T15:17:17.007Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/developers-at-finserv-outpacing-security/</loc><lastmod>2024-09-10T13:00:03.446Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/log4shell-spring4shell-threat/</loc><lastmod>2024-09-05T14:43:22.320Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/php-code-security/</loc><lastmod>2024-09-04T20:49:29.545Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/appsec-modernization-for-financial-services/</loc><lastmod>2024-09-03T17:01:02.507Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/axel-springer-national-media-and-tech/</loc><lastmod>2024-09-03T15:58:42.717Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/finding-yaml-injection-with-snyk-code/</loc><lastmod>2024-08-30T15:16:27.509Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/avoiding-smtp-injection/</loc><lastmod>2024-08-30T15:11:57.870Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/ai-powered-development-financial-services/</loc><lastmod>2024-08-28T13:26:53.410Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/a-developers-best-friend/</loc><lastmod>2024-08-26T16:06:34.187Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/shaping-supply-chain-security/</loc><lastmod>2024-08-22T16:59:47.192Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-named-leader-in-strategy-category-forrester-wave-sca-q2-2023/</loc><lastmod>2024-08-15T16:46:50.779Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-visionary-2021-gartner-magic-quadrant-for-ast/</loc><lastmod>2024-08-15T16:39:54.595Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-redhunt-labs-scanning-top-1000-orgs-on-github/</loc><lastmod>2024-08-15T16:38:58.788Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/announcement-insights-open-beta/</loc><lastmod>2024-08-15T16:37:57.763Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/5-security-best-practices-generative-ai-code-assistants-copilot/</loc><lastmod>2024-08-15T16:34:47.656Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="de" href="https://snyk.io/de/blog/5-security-best-practices-generative-ai-code-assistants-copilot/"/><xhtml:link rel="alternate" hreflang="fr" href="https://snyk.io/fr/blog/5-security-best-practices-generative-ai-code-assistants-copilot/"/><xhtml:link rel="alternate" hreflang="pt-BR" href="https://snyk.io/pt-BR/blog/5-security-best-practices-generative-ai-code-assistants-copilot/"/><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/5-security-best-practices-generative-ai-code-assistants-copilot/"/></url>
<url><loc>https://snyk.io/blog/snyk-enhanced-docker-desktop-extension/</loc><lastmod>2024-08-15T16:32:25.531Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/stress-free-security-for-devs-and-ops-on-aws/</loc><lastmod>2024-08-15T16:31:36.470Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-in-30-democast/</loc><lastmod>2024-08-15T16:30:37.365Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/how-atlassian-used-snyk-to-solve-log4shell/</loc><lastmod>2024-08-15T16:29:46.036Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/oreilly-book-cloud-native-application-security-developer-first-security/</loc><lastmod>2024-08-15T16:28:53.430Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/journey-to-appsec-gold/</loc><lastmod>2024-08-15T15:10:47.218Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/infosec-europe-4-tips-safer-ai-adoption/</loc><lastmod>2024-08-15T14:40:42.573Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/analyze-java-kotlin-code/</loc><lastmod>2024-08-13T16:41:54.713Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/10-dimensions-of-python-static-analysis/</loc><lastmod>2024-08-12T23:19:12.964Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/10-dimensions-of-python-static-analysis/"/></url>
<url><loc>https://snyk.io/blog/modern-security-leader-spotlight-marcin-hoppe-senior-manager-product-security-at-auth0/</loc><lastmod>2024-08-09T20:11:47.918Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-watcher-keep-snyk-in-sync/</loc><lastmod>2024-08-09T20:11:03.070Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-chats-with-shutterstock-about-building-a-devsecops-culture/</loc><lastmod>2024-08-09T20:10:16.773Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/securing-cloud-native-applications-activecampaigns-vp-information-security-provides-perspective/</loc><lastmod>2024-08-09T20:09:30.503Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/intuit-roundtable-breaking-silos-engaging-security-developer-communities/</loc><lastmod>2024-08-09T20:07:35.813Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/dun-bradstreet-shutterstock-security-champions-programs/</loc><lastmod>2024-08-09T20:05:00.576Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/datto-developer-first-security-snyk/</loc><lastmod>2024-08-09T20:04:08.690Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/lunar-shifted-security-left-building-cloud-native-bank/</loc><lastmod>2024-08-09T20:02:46.006Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/enterprise-security-anheuser-busch-inbev-manulife/</loc><lastmod>2024-08-09T20:01:45.700Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/liveramp-used-snyk-to-remediate-log4shell/</loc><lastmod>2024-08-09T19:58:42.216Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/how-onna-uses-snyk-and-sysdig-to-secure-the-sdlc/</loc><lastmod>2024-08-09T19:56:44.897Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/how-spotify-uses-snyk-to-secure-the-sdlc/</loc><lastmod>2024-08-09T19:56:02.994Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/achieving-developer-security-adoption-nylas-snyk/</loc><lastmod>2024-08-09T19:54:06.535Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/aws-reinvent-2022-neiman-marcus-developer-first-security/</loc><lastmod>2024-08-09T19:53:19.667Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/how-okta-empowers-devs-to-find-and-fix-security-issues-with-snyk/</loc><lastmod>2024-08-09T19:52:21.277Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/7-appsec-tips-snowflake/</loc><lastmod>2024-08-09T19:51:24.692Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/black-hat-asia-customer-panel-recap/</loc><lastmod>2024-08-09T19:50:40.822Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/krogers-approach-supply-chain-security/</loc><lastmod>2024-08-09T19:49:52.962Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/how-to-build-modern-devsecops-culture/</loc><lastmod>2024-08-09T19:49:17.418Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/rei-devsecops-culture-snyk-aws-reinvent/</loc><lastmod>2024-08-09T19:47:28.800Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/preventing-sql-injection-entity-framework/</loc><lastmod>2024-08-09T15:41:56.087Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/vulnerability-management-best-practices/</loc><lastmod>2024-08-06T16:03:08.667Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-snowflake-data-share/</loc><lastmod>2024-08-06T13:12:05.756Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/responding-to-open-source-criticism-post-log4shell/</loc><lastmod>2024-08-05T15:08:00.589Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/addressing-cybersecurity-challenges-in-open-source-software/</loc><lastmod>2024-08-05T15:07:56.433Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/new-snyk-apprisk-integrations/</loc><lastmod>2024-08-01T17:31:45.274Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/dos-regex-breaks-fastapi-security/</loc><lastmod>2024-07-31T13:00:14.639Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/welcoming-diana-brunelle-chief-people-officer/</loc><lastmod>2024-07-22T13:09:55.239Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/happy-1st-birthday-snyk-code/</loc><lastmod>2024-07-18T23:56:11.826Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="de" href="https://snyk.io/de/blog/happy-1st-birthday-snyk-code/"/><xhtml:link rel="alternate" hreflang="fr" href="https://snyk.io/fr/blog/happy-1st-birthday-snyk-code/"/><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/happy-1st-birthday-snyk-code/"/></url>
<url><loc>https://snyk.io/blog/security-risks-coding-with-ai/</loc><lastmod>2024-07-18T21:54:12.248Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="de" href="https://snyk.io/de/blog/security-risks-coding-with-ai/"/><xhtml:link rel="alternate" hreflang="fr" href="https://snyk.io/fr/blog/security-risks-coding-with-ai/"/><xhtml:link rel="alternate" hreflang="pt-BR" href="https://snyk.io/pt-BR/blog/security-risks-coding-with-ai/"/><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/security-risks-coding-with-ai/"/></url>
<url><loc>https://snyk.io/blog/setup-deno-dev-container-on-github-codespaces/</loc><lastmod>2024-07-18T13:00:02.301Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/10-kubernetes-security-context-settings-you-should-understand/</loc><lastmod>2024-07-15T19:59:23.697Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/working-from-home-tips/</loc><lastmod>2024-07-15T19:59:22.252Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/go-security-cheatsheet-for-go-developers/</loc><lastmod>2024-07-15T19:59:20.872Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/ten-npm-security-best-practices/</loc><lastmod>2024-07-15T19:59:18.965Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/cheatsheet-top-10-application-security-acronyms/</loc><lastmod>2024-07-15T19:59:17.533Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/10-react-security-best-practices/</loc><lastmod>2024-07-15T19:59:06.236Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/addressing-risks-in-the-owasp-top-10-for-llms/</loc><lastmod>2024-07-15T19:59:04.273Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-cli-cheat-sheet/</loc><lastmod>2024-07-15T19:56:38.013Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="fr" href="https://snyk.io/fr/blog/snyk-cli-cheat-sheet/"/><xhtml:link rel="alternate" hreflang="de" href="https://snyk.io/de/blog/snyk-cli-cheat-sheet/"/></url>
<url><loc>https://snyk.io/blog/ten-git-hub-security-best-practices/</loc><lastmod>2024-07-15T19:56:33.696Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/10-java-security-best-practices/</loc><lastmod>2024-07-15T19:54:34.732Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/sql-injection-cheat-sheet/</loc><lastmod>2024-07-15T19:54:26.431Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-bitbucket-best-practices-cheat-sheet/</loc><lastmod>2024-07-15T19:54:25.046Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/secure-code-review/</loc><lastmod>2024-07-15T19:54:24.516Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/angular-security-best-practices/</loc><lastmod>2024-07-15T19:54:23.668Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/zip-slip-vulnerability-cheat-sheet/</loc><lastmod>2024-07-15T19:51:00.052Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/8-tips-for-securing-containers/</loc><lastmod>2024-07-15T19:50:58.680Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/10-maven-security-best-practices/</loc><lastmod>2024-07-15T19:50:57.067Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/log4shell-remediation-cheat-sheet/</loc><lastmod>2024-07-15T19:50:56.710Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/spring-boot-security-best-practices/</loc><lastmod>2024-07-15T19:50:55.729Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/local-type-inference-java-cheat-sheet/</loc><lastmod>2024-07-15T19:50:06.218Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/best-practices-to-build-java-containers-with-docker/</loc><lastmod>2024-07-15T19:49:43.967Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/reasons-to-invest-in-an-aspm-solution/</loc><lastmod>2024-07-15T19:48:10.545Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/mitigating-path-traversal-java-snyk-code/</loc><lastmod>2024-07-15T15:49:08.348Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/preventing-xss-snyk-code/</loc><lastmod>2024-07-15T15:49:08.169Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/secure-s3-bucket-on-aws/</loc><lastmod>2024-07-15T13:00:03.505Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/whats-new-in-snyk/</loc><lastmod>2024-07-12T21:12:13.963Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/securing-s3-bucket-configuration-access-snyk-solvo/</loc><lastmod>2024-07-12T21:11:15.108Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/how-to-prevent-trojan-source-attacks-with-snyk-code/</loc><lastmod>2024-07-12T21:10:16.112Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/how-to-increase-serverless-observability-monitoring-and-security/</loc><lastmod>2024-07-12T21:08:43.567Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/uncharted-territory-discovering-vulnerabilities-in-public-helm-charts/</loc><lastmod>2024-07-12T21:07:24.267Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/the-docker-project-turns-10/</loc><lastmod>2024-07-12T21:05:26.311Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snykcon-2021-recap-2/</loc><lastmod>2024-07-12T21:04:15.117Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snykcon-2021-is-almost-here/</loc><lastmod>2024-07-12T21:02:18.707Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/sdr-series-meet-our-apj-team/</loc><lastmod>2024-07-12T20:59:32.777Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/open-source-vulnerabilities-and-security-with-microsofts-jeff-mcaffer/</loc><lastmod>2024-07-12T20:57:22.247Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/launching-serverless-snyk/</loc><lastmod>2024-07-12T20:55:44.551Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/give-employees-the-flexibility-to-do-their-best-work/</loc><lastmod>2024-07-12T20:54:53.228Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/generate-sbom-javascript-node-js-applications/</loc><lastmod>2024-07-12T20:53:42.747Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/differences-in-version-handling-gems-and-npm/</loc><lastmod>2024-07-12T20:49:54.677Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/bitbucket-cloud-snyk-app/</loc><lastmod>2024-07-12T20:49:11.170Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="de" href="https://snyk.io/de/blog/bitbucket-cloud-snyk-app/"/><xhtml:link rel="alternate" hreflang="fr" href="https://snyk.io/fr/blog/bitbucket-cloud-snyk-app/"/><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/bitbucket-cloud-snyk-app/"/></url>
<url><loc>https://snyk.io/blog/80-of-developers-are-not-addressing-docker-security/</loc><lastmod>2024-07-12T20:47:43.474Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/biden-ai-safety-executive-order/</loc><lastmod>2024-07-12T20:47:28.094Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/2020-q4-in-review-ios-remote-code-execution-developer-first-sast/</loc><lastmod>2024-07-12T20:43:35.400Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/application-risk-digital-operational-resiliency-act/</loc><lastmod>2024-07-12T16:51:00.526Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/how-to-update-curl/</loc><lastmod>2024-07-11T22:21:07.687Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="de" href="https://snyk.io/de/blog/how-to-update-curl/"/><xhtml:link rel="alternate" hreflang="fr" href="https://snyk.io/fr/blog/how-to-update-curl/"/><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/how-to-update-curl/"/><xhtml:link rel="alternate" hreflang="pt-BR" href="https://snyk.io/pt-BR/blog/how-to-update-curl/"/></url>
<url><loc>https://snyk.io/blog/how-to-install-ruby-in-mac-os/</loc><lastmod>2024-07-11T22:17:31.560Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="de" href="https://snyk.io/de/blog/how-to-install-ruby-in-mac-os/"/><xhtml:link rel="alternate" hreflang="fr" href="https://snyk.io/fr/blog/how-to-install-ruby-in-mac-os/"/><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/how-to-install-ruby-in-mac-os/"/><xhtml:link rel="alternate" hreflang="pt-BR" href="https://snyk.io/pt-BR/blog/how-to-install-ruby-in-mac-os/"/></url>
<url><loc>https://snyk.io/blog/how-to-use-github-actions-environment-variables/</loc><lastmod>2024-07-11T22:16:38.008Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="de" href="https://snyk.io/de/blog/how-to-use-github-actions-environment-variables/"/><xhtml:link rel="alternate" hreflang="fr" href="https://snyk.io/fr/blog/how-to-use-github-actions-environment-variables/"/><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/how-to-use-github-actions-environment-variables/"/><xhtml:link rel="alternate" hreflang="pt-BR" href="https://snyk.io/pt-BR/blog/how-to-use-github-actions-environment-variables/"/></url>
<url><loc>https://snyk.io/blog/fixing-exposed-hardcoded-secrets/</loc><lastmod>2024-07-09T13:00:07.669Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/extend-appsec/</loc><lastmod>2024-07-09T12:51:54.263Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/lessons-from-openssl-vulnerabilities-part-2/</loc><lastmod>2024-06-26T15:11:02.889Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/detect-prevent-dependency-confusion-attacks-npm-supply-chain-security/</loc><lastmod>2024-06-26T15:07:00.817Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-developer-security-platform-2022-review/</loc><lastmod>2024-06-26T14:49:23.791Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/10-modern-node-js-runtime-features/</loc><lastmod>2024-06-25T14:27:22.412Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-code-secures-ai-builds/</loc><lastmod>2024-06-25T13:00:03.326Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/automate-security-on-google-cloud/</loc><lastmod>2024-06-18T12:42:30.498Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/cvss-4/</loc><lastmod>2024-06-17T13:33:34.492Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/why-vulnerability-management-falls-short-in-appsec/</loc><lastmod>2024-06-13T19:41:29.888Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/lessons-from-trust-bank-and-tasconnect/</loc><lastmod>2024-06-13T19:36:02.957Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/essential-node-js-backend-examples-2024/</loc><lastmod>2024-06-12T17:15:29.961Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/eks-add-on-aws-marketplace/</loc><lastmod>2024-06-12T13:46:20.070Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/ai-quality-garbage-in-garbage-out/</loc><lastmod>2024-06-11T14:38:36.482Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/talk-to-us-snyk-cli/</loc><lastmod>2024-06-06T13:29:58.308Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-snowflake-partnership/</loc><lastmod>2024-06-05T22:55:19.402Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/ai-tool-adoption-perceptions-and-realities/</loc><lastmod>2024-06-04T17:10:00.832Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/5-tips-adopting-ai-code-assistance/</loc><lastmod>2024-05-30T15:20:53.696Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/fastify-plugins-for-backend-node-js-api/</loc><lastmod>2024-05-29T15:05:32.074Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-code-sast-servicenow-workflows/</loc><lastmod>2024-05-22T18:09:52.265Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/snyk-code-sast-servicenow-workflows/"/></url>
<url><loc>https://snyk.io/blog/preventing-broken-access-control-express-node-js/</loc><lastmod>2024-05-22T15:44:35.760Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/learning-from-cloud-transformation-to-ai/</loc><lastmod>2024-05-21T13:00:03.161Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/symmetric-vs-asymmetric-encryption-python/</loc><lastmod>2024-05-15T14:09:48.491Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/day-in-the-life-food-giant-ciso/</loc><lastmod>2024-05-14T15:09:56.424Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/new-host-for-secure-developer-podcast/</loc><lastmod>2024-05-09T15:12:40.181Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/top-3-security-best-practices-for-handling-jwts/</loc><lastmod>2024-05-07T15:35:38.397Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/pci-dss-compliance-sca-sast-tools/</loc><lastmod>2024-05-07T14:26:01.219Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-cli-semantic-versioning-and-release-channels/</loc><lastmod>2024-04-30T15:23:06.802Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/mulesoft-fosters-developer-first-shift-left-culture-with-snyk/</loc><lastmod>2024-04-30T12:00:04.394Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/getting-started-php-static-analysis-2024/</loc><lastmod>2024-04-24T17:26:45.301Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/360-degrees-application-security-with-snyk/</loc><lastmod>2024-04-24T15:39:56.396Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-partnership-gemini-code-assist/</loc><lastmod>2024-04-23T20:34:17.207Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/snyk-partnership-gemini-code-assist/"/><xhtml:link rel="alternate" hreflang="fr" href="https://snyk.io/fr/blog/snyk-partnership-gemini-code-assist/"/><xhtml:link rel="alternate" hreflang="pt-BR" href="https://snyk.io/pt-BR/blog/snyk-partnership-gemini-code-assist/"/><xhtml:link rel="alternate" hreflang="de" href="https://snyk.io/de/blog/snyk-partnership-gemini-code-assist/"/></url>
<url><loc>https://snyk.io/blog/devopsdays-singapore-ai-generated-code/</loc><lastmod>2024-04-23T14:10:57.197Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/install-java-on-macos/</loc><lastmod>2024-04-17T16:17:38.237Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/code-injection-vulnerabilities-caused-by-generative-ai/</loc><lastmod>2024-04-16T14:29:09.969Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/securing-sbom-google-cloud/</loc><lastmod>2024-04-10T02:22:04.835Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/securing-sbom-google-cloud/"/></url>
<url><loc>https://snyk.io/blog/exploiting-http-2-continuation-frames-dos-attacks/</loc><lastmod>2024-04-08T16:33:24.054Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/the-xz-backdoor-cve-2024-3094/</loc><lastmod>2024-04-03T11:56:57.113Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/the-xz-backdoor-cve-2024-3094/"/></url>
<url><loc>https://snyk.io/blog/jinja2-xss-vulnerability/</loc><lastmod>2024-04-02T15:01:22.008Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/github-malware-repositories-repo-confusion/</loc><lastmod>2024-04-02T15:00:35.156Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/improving-ui-ux-snyk-vscode-extension/</loc><lastmod>2024-04-02T14:59:40.804Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/secure-password-hashing-in-go/</loc><lastmod>2024-04-02T14:58:49.222Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/kicking-off-2022-by-recognizing-devsecops-leaders/</loc><lastmod>2024-03-07T20:25:13.970Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/willowtree-hypergrowth-security-roundtable/</loc><lastmod>2024-03-07T20:00:36.288Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/how-mongodb-built-successful-security-champions-program/</loc><lastmod>2024-03-07T19:57:00.083Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/appsec-2021-reddit/</loc><lastmod>2024-03-07T19:55:36.076Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/operating-security-ownership-at-scale-twilios-perspective/</loc><lastmod>2024-03-07T19:52:46.958Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/a-recap-from-our-latest-pci-webinar-and-compliance-tips-from-deliveroo/</loc><lastmod>2024-03-07T19:51:24.841Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-documentation-journey/</loc><lastmod>2024-03-07T16:20:31.683Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-learn-nist-cybersecurity-framework-csf/</loc><lastmod>2024-03-06T14:00:02.939Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/welcoming-gary-olson/</loc><lastmod>2024-03-04T14:00:04.082Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/5-node-js-security-code-snippets-every-backend-developer-should-know/</loc><lastmod>2024-02-28T14:00:02.667Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-servicenow-partnership/</loc><lastmod>2024-02-26T16:10:21.179Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/snyk-servicenow-partnership/"/></url>
<url><loc>https://snyk.io/blog/snyk-servicenow-sbom-solution/</loc><lastmod>2024-02-26T16:09:00.387Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/snyk-servicenow-sbom-solution/"/></url>
<url><loc>https://snyk.io/blog/preventing-sql-injection-attacks-node-js/</loc><lastmod>2024-02-21T13:00:03.431Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/introducing-new-risk-score/</loc><lastmod>2024-02-16T19:46:51.283Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-and-atlassian-embed-security-ai-assisted-software-development/</loc><lastmod>2024-02-14T18:35:43.845Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/with-love-your-applications-valentines-2024/</loc><lastmod>2024-02-14T14:00:03.090Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/reporting-appsec-risk-to-your-ciso/</loc><lastmod>2024-02-13T21:40:41.849Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/automatic-source-locations-rego/</loc><lastmod>2024-02-13T15:08:24.227Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/exploiting-buffer/</loc><lastmod>2024-02-07T16:15:26.007Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/hacking-docker-containers-by-exploiting-base-image-vulnerabilities/</loc><lastmod>2024-02-07T14:52:34.733Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/welcoming-danny-allan-brian-rogan/</loc><lastmod>2024-02-06T14:00:03.407Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/git-checkout-remote-branch/</loc><lastmod>2024-02-02T16:52:24.484Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/7-tips-to-become-bug-bounty-hunter/</loc><lastmod>2024-01-25T17:45:43.034Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-dynatrace-ai-fireside-chat/</loc><lastmod>2024-01-22T18:00:08.633Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/struts-path-traversal-vulnerability/</loc><lastmod>2024-01-16T15:36:28.875Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/introducing-parlay/</loc><lastmod>2024-01-10T18:14:15.939Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/mastering-python-virtual-environments/</loc><lastmod>2024-01-10T15:15:23.821Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/how-to-choose-a-security-tool-for-your-ai-generated-code/</loc><lastmod>2024-01-09T13:00:04.208Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/build-deploy-node-js-security-scanning-api-platformatic-cloud/</loc><lastmod>2024-01-05T21:09:12.396Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/command-injection-python-prevention-examples/</loc><lastmod>2024-01-03T16:50:10.885Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/3-tips-rebuild-docker-image-fast/</loc><lastmod>2023-12-28T18:26:11.692Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/how-to-prevent-open-redirect-vulnerabilities-in-laravel/</loc><lastmod>2023-12-27T16:32:47.911Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/vulnerability-disclosure-php-use-after-free/</loc><lastmod>2023-12-19T21:31:52.012Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/common-saml-vulnerabilities-remediate/</loc><lastmod>2023-12-19T18:43:10.788Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-top-cybersecurity-company-fortune-cyber-60-2023/</loc><lastmod>2023-12-18T15:45:21.661Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/enhancing-code-to-cloud-security-common-configuration-scoring/</loc><lastmod>2023-12-15T13:00:03.997Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-highlights-aws-reinvent-2023/</loc><lastmod>2023-12-14T17:07:32.319Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-emerging-segment-leader-application-security-snowflake-cybersecurity-report-2023/</loc><lastmod>2023-12-11T14:00:03.757Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/code-injection-python-prevention-examples/</loc><lastmod>2023-12-06T19:09:04.805Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/accelerate-c-cpp-security-snyk/</loc><lastmod>2023-12-05T14:47:25.332Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/node-js-multithreading-worker-threads-pros-cons/</loc><lastmod>2023-12-04T23:29:26.668Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/building-security-into-your-azure-devops-pipeline/</loc><lastmod>2023-12-01T16:47:06.176Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/2023-snyk-fetch-the-flag-ctf-writeups/</loc><lastmod>2023-11-30T21:15:10.215Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-fetch-the-flag-ctf-2023-writeup-audiopolis/</loc><lastmod>2023-11-30T21:13:51.596Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-fetch-the-flag-ctf-2023-writeup-silent-cartographer/</loc><lastmod>2023-11-30T21:13:36.779Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-fetch-the-flag-ctf-2023-writeup-i-do-math/</loc><lastmod>2023-11-30T21:13:21.931Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-fetch-the-flag-ctf-2023-writeup-protect-the-environment/</loc><lastmod>2023-11-30T21:13:07.535Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-fetch-the-flag-ctf-2023-writeup-honey-baked-messages/</loc><lastmod>2023-11-30T21:12:52.577Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-fetch-the-flag-ctf-2023-writeup-off-the-setuid/</loc><lastmod>2023-11-30T21:11:49.791Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-achieves-aws-security-competency/</loc><lastmod>2023-11-29T23:33:32.078Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/devsecops-solution-apps-aws-snyk/</loc><lastmod>2023-11-29T23:32:51.891Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-with-amazon-codewhisperer-for-security/</loc><lastmod>2023-11-29T20:55:12.488Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/nightfall-ai-and-snyk-partner/</loc><lastmod>2023-11-29T19:00:03.070Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/security-vulnerabilities-spring-boot/</loc><lastmod>2023-11-29T16:26:29.801Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/webextension-security-vulnerabilities-react-developer-tools-vue-js/</loc><lastmod>2023-11-27T16:37:34.486Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/symmetric-asymmetric-file-encryption-in-python/</loc><lastmod>2023-11-22T20:24:06.321Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-apps-ga/</loc><lastmod>2023-11-20T13:00:03.505Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/rego-103-values-and-rules/</loc><lastmod>2023-11-16T19:53:39.628Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/rego-for-beginners-part-2/</loc><lastmod>2023-11-15T19:01:14.811Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/introduction-to-rego/</loc><lastmod>2023-11-15T18:58:35.400Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/aws-shared-security-responsibility-model/</loc><lastmod>2023-11-13T17:09:52.947Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-sentinelone-built-time-runtime-solution/</loc><lastmod>2023-11-09T16:06:48.009Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-week-of-impact-2023/</loc><lastmod>2023-11-08T20:26:09.554Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-vulnerability-intelligence-sbom-servicenow/</loc><lastmod>2023-11-07T16:52:00.266Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/security-vs-development-priorities/</loc><lastmod>2023-11-06T16:18:31.931Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/how-to-add-playwright-tests-pr-ci-github-actions/</loc><lastmod>2023-11-01T14:38:39.951Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/github-security-code-scanning/</loc><lastmod>2023-11-01T14:36:42.141Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/dependency-injection-python/</loc><lastmod>2023-10-31T21:28:01.329Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/welcoming-reviewpad-to-snyk/</loc><lastmod>2023-10-30T14:59:27.921Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/conditional-rendering-react-next-js/</loc><lastmod>2023-10-30T13:00:04.314Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/symmetric-encryption-algorithms-java/</loc><lastmod>2023-10-27T13:45:00.506Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-partner-speak-slack/</loc><lastmod>2023-10-26T19:40:02.507Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/weak-hash-vulnerability-crypto-js-crypto-es/</loc><lastmod>2023-10-25T17:48:00.825Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/adding-snyk-security-jira-bitbucket-cloud/</loc><lastmod>2023-10-25T15:39:25.055Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/how-to-secure-javascript-applications-right-from-the-cli/</loc><lastmod>2023-10-24T18:34:28.779Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/getting-started-query-parameterization/</loc><lastmod>2023-10-24T14:16:32.679Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/how-to-keep-http-connection-alive-9-hours/</loc><lastmod>2023-10-23T18:45:07.434Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/how-to-protect-node-js-apps-from-csrf-attacks/</loc><lastmod>2023-10-17T18:03:52.253Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/6-steps-for-scaling-risk-based-appsec-programs/</loc><lastmod>2023-10-13T15:13:03.357Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/serverless-is-great-but-what-about-the-security-of-my-aws-lambda-functions-and-their-dependencies/</loc><lastmod>2023-10-13T14:39:37.558Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/how-sme-lender-new10-uses-aws-and-snyk-to-deliver-quickly-and-securely/</loc><lastmod>2023-10-13T14:39:19.266Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/installing-and-managing-java-on-macos/</loc><lastmod>2023-10-12T18:55:24.863Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/find-fix-http-2-rapid-reset-zero-day-vulnerability-cve-2023-44487/</loc><lastmod>2023-10-11T22:23:27.287Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/critical-webp-0-day-cve-2023-4863/</loc><lastmod>2023-10-10T16:37:24.481Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/critical-webp-0-day-cve-2023-4863/"/></url>
<url><loc>https://snyk.io/blog/cybersecurity-ventures-2023-software-supply-chain-attack-report/</loc><lastmod>2023-10-10T12:00:04.220Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/sas-snyk-discuss-ai-for-development-and-security-teams/</loc><lastmod>2023-10-09T17:15:50.627Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-partner-speaks-hashicorp/</loc><lastmod>2023-10-05T19:29:35.600Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/introducing-the-snyk-app-for-compass/</loc><lastmod>2023-10-05T16:58:56.329Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/openssf-secure-open-source-software-summit-2023/</loc><lastmod>2023-10-04T21:07:37.807Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/ai-appsec-hell-or-nirvana/</loc><lastmod>2023-10-03T18:50:15.643Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/announcing-iac-plus-early-access/</loc><lastmod>2023-10-03T16:52:13.366Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/building-production-ready-dockerfile-php/</loc><lastmod>2023-09-27T15:23:44.740Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/signing-container-images/</loc><lastmod>2023-09-26T21:22:55.501Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snykcon-building-developer-appsec-program/</loc><lastmod>2023-09-25T20:29:42.855Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="de" href="https://snyk.io/de/blog/snykcon-building-developer-appsec-program/"/><xhtml:link rel="alternate" hreflang="fr" href="https://snyk.io/fr/blog/snykcon-building-developer-appsec-program/"/><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/snykcon-building-developer-appsec-program/"/></url>
<url><loc>https://snyk.io/blog/how-to-prevent-nullpointerexceptions-in-java/</loc><lastmod>2023-09-21T12:00:03.776Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/forrester-sast-wave-2023/</loc><lastmod>2023-09-20T13:23:51.240Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/ssl-tls-pinning-node-js/</loc><lastmod>2023-09-19T03:00:55.491Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/best-practices-attack-surface-analysis/</loc><lastmod>2023-09-15T17:47:00.980Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/modern-vs-code-extension-development-basics/</loc><lastmod>2023-09-14T12:00:03.940Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/security-implications-cors-node-js/</loc><lastmod>2023-09-13T16:17:34.278Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/dockerfile-optimization-and-docker-image-security-scanning/</loc><lastmod>2023-09-12T15:26:46.994Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/guide-to-input-validation-with-spring-boot/</loc><lastmod>2023-09-12T12:00:04.227Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/how-to-avoid-web-cache-poisoning-attacks/</loc><lastmod>2023-09-11T14:24:45.647Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/fetch-the-flag-ctf-2023-sneak-peek/</loc><lastmod>2023-09-06T12:00:10.951Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/using-the-snyk-api-to-find-and-fix-vulnerabilities/</loc><lastmod>2023-08-31T11:04:04.309Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/ai-assisted-development-and-cybersecurity/</loc><lastmod>2023-08-30T22:10:41.799Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/top-5-security-concerns-iac/</loc><lastmod>2023-08-30T15:44:47.319Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/what-kind-of-security-dog-are-you/</loc><lastmod>2023-08-26T17:54:29.462Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/npm-security-preventing-supply-chain-attacks/</loc><lastmod>2023-08-25T09:50:21.753Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-state-of-open-source-security-2023/</loc><lastmod>2023-08-25T09:46:55.875Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-software-supply-chain-security-2022-review/</loc><lastmod>2023-08-25T09:45:55.327Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/jlink-create-docker-images-spring-boot-java/</loc><lastmod>2023-08-24T16:04:18.598Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/gitops-application-security/</loc><lastmod>2023-08-24T15:19:39.603Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/dependency-updates-mergify-snyk/</loc><lastmod>2023-08-23T18:15:31.259Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/best-practices-ai-sdlc/</loc><lastmod>2023-08-21T18:28:15.495Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/limitations-of-single-ai-model/</loc><lastmod>2023-08-21T18:27:14.062Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-iac-security-terraform-cloud/</loc><lastmod>2023-08-16T17:18:12.125Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/java-url-encoding-decoding/</loc><lastmod>2023-08-14T17:29:02.806Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/keeping-docker-secrets-secure/</loc><lastmod>2023-08-10T18:11:13.978Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/best-practices-for-secrets-management-in-serverless-applications/</loc><lastmod>2023-08-10T18:03:42.376Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/codesecdays-conference-gitguardian/</loc><lastmod>2023-08-10T17:51:26.200Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/best-practices-for-kubernetes-secrets-management/</loc><lastmod>2023-08-10T17:28:18.736Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/moq-package-exfiltrates-user-emails/</loc><lastmod>2023-08-10T15:17:44.775Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/dockerize-php-application/</loc><lastmod>2023-08-10T14:46:26.426Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/top-5-aws-misconfigurations/</loc><lastmod>2023-08-09T19:54:33.209Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-security-in-jira-cloud/</loc><lastmod>2023-08-09T16:24:14.490Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/best-practices-for-api-gateway-security/</loc><lastmod>2023-08-09T14:48:28.674Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/fix-cloud-security-issues-with-snyk-cloud/</loc><lastmod>2023-08-09T13:55:08.405Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/mitigating-dom-clobbering-attacks-javascript/</loc><lastmod>2023-08-08T16:34:35.141Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/supercharge-app-security-code-to-cloud/</loc><lastmod>2023-08-08T14:49:01.946Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/new-sec-cybersecurity-rules-onus-on-ciso/</loc><lastmod>2023-08-04T13:01:06.246Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/improving-security-chaos-engineering/</loc><lastmod>2023-08-03T18:16:10.635Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/secure-javascript-url-validation/</loc><lastmod>2023-08-03T16:23:41.200Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/implementing-tls-kubernetes/</loc><lastmod>2023-07-31T17:43:14.396Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/swift-deserialization-security-primer/</loc><lastmod>2023-07-31T14:28:15.449Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/tools-infrastructure-drift-detection/</loc><lastmod>2023-07-31T14:14:18.303Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/kubernetes-rbac-explored/</loc><lastmod>2023-07-27T13:00:11.321Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/securing-ci-cd-pipeline-with-snyk/</loc><lastmod>2023-07-24T15:36:47.548Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/container-image-formats/</loc><lastmod>2023-07-24T15:32:14.356Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-iac-scanning-enhancements-include-aws-infrastructure-as-code/</loc><lastmod>2023-07-24T15:29:44.537Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/strengthen-security-ci-cd-pipeline/</loc><lastmod>2023-07-24T14:42:22.944Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/insecure-direct-object-references-python/</loc><lastmod>2023-07-19T16:33:34.770Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-top-10-code-vulnerabilities-report/</loc><lastmod>2023-07-18T16:42:55.954Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/snyk-top-10-code-vulnerabilities-report/"/></url>
<url><loc>https://snyk.io/blog/xs-leaks/</loc><lastmod>2023-07-17T17:11:02.617Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/preventing-malicious-packages-and-supply-chain-attacks-with-snyk/</loc><lastmod>2023-07-14T15:29:42.247Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/how-we-normalize-authentication-at-snyk-with-gloo-edge/</loc><lastmod>2023-07-13T15:37:19.244Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/cant-compare-sast-tools-lists-test-suites-benchmarks/</loc><lastmod>2023-07-13T15:36:16.476Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/parameters-to-measure-sast-testing/</loc><lastmod>2023-07-13T15:35:59.280Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/safer-together-snyk-and-cispa-collaborate/</loc><lastmod>2023-07-13T15:30:48.615Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/preventing-insecure-deserialization-node-js/</loc><lastmod>2023-07-13T14:57:08.253Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/building-security-conscious-ci-cd-pipeline/</loc><lastmod>2023-06-29T17:24:12.350Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/verifying-webhook-signatures/</loc><lastmod>2023-06-29T17:17:09.176Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/using-insecure-npm-package-manager-defaults/</loc><lastmod>2023-06-29T00:52:54.656Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/patches-of-pride/</loc><lastmod>2023-06-28T17:39:27.264Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/understanding-kubernetes-pod-security-standards/</loc><lastmod>2023-06-28T17:39:21.313Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/aws-permissions-boundaries-and-snyk/</loc><lastmod>2023-06-28T17:39:14.380Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/securitymanager-removed-java/</loc><lastmod>2023-06-28T17:39:13.629Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/the-secure-developer-security-champions-recap/</loc><lastmod>2023-06-28T17:39:13.567Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snakeyaml-unsafe-deserialization-vulnerability/</loc><lastmod>2023-06-28T17:39:13.251Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-partner-speak-dynatrace/</loc><lastmod>2023-06-28T17:39:04.841Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/reduce-risk-to-supply-chain-with-sbom/</loc><lastmod>2023-06-28T17:39:03.315Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/parlay-quickstart-guide/</loc><lastmod>2023-06-28T17:39:01.417Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/mimic-your-mental-model-project-collections/</loc><lastmod>2023-06-27T09:00:03.928Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-cloud-security-2022-review/</loc><lastmod>2023-06-22T15:08:56.718Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="de" href="https://snyk.io/de/blog/snyk-cloud-security-2022-review/"/><xhtml:link rel="alternate" hreflang="fr" href="https://snyk.io/fr/blog/snyk-cloud-security-2022-review/"/><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/snyk-cloud-security-2022-review/"/></url>
<url><loc>https://snyk.io/blog/automate-cloud-compliance-with-snyk-cloud/</loc><lastmod>2023-06-22T15:07:57.669Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/celebrating-juneteenth/</loc><lastmod>2023-06-16T15:55:15.907Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-learn-nist-nice-framework-alignment/</loc><lastmod>2023-06-13T14:51:59.918Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-teaming-up-with-sysdig/</loc><lastmod>2023-06-12T15:47:28.451Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="de" href="https://snyk.io/de/blog/snyk-teaming-up-with-sysdig/"/><xhtml:link rel="alternate" hreflang="fr" href="https://snyk.io/fr/blog/snyk-teaming-up-with-sysdig/"/><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/snyk-teaming-up-with-sysdig/"/></url>
<url><loc>https://snyk.io/blog/security-success-in-the-bay-area/</loc><lastmod>2023-06-06T18:12:17.033Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-security-jira-cloud/</loc><lastmod>2023-06-06T14:02:56.364Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/ethical-hacking-techniques/</loc><lastmod>2023-06-05T18:20:46.269Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/day-in-the-life-ethical-hacker/</loc><lastmod>2023-06-05T15:04:19.700Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/celebrating-disability-pride-month-at-snyk/</loc><lastmod>2023-06-03T03:37:40.784Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="de" href="https://snyk.io/de/blog/celebrating-disability-pride-month-at-snyk/"/><xhtml:link rel="alternate" hreflang="fr" href="https://snyk.io/fr/blog/celebrating-disability-pride-month-at-snyk/"/><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/celebrating-disability-pride-month-at-snyk/"/></url>
<url><loc>https://snyk.io/blog/quick-primer-ldap-injection/</loc><lastmod>2023-06-01T14:47:28.018Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-app-slack/</loc><lastmod>2023-05-30T19:18:47.292Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/5-ways-to-prevent-code-injection-in-javascript-and-node-js/</loc><lastmod>2023-05-30T17:13:04.205Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="de" href="https://snyk.io/de/blog/5-ways-to-prevent-code-injection-in-javascript-and-node-js/"/><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/5-ways-to-prevent-code-injection-in-javascript-and-node-js/"/><xhtml:link rel="alternate" hreflang="fr" href="https://snyk.io/fr/blog/5-ways-to-prevent-code-injection-in-javascript-and-node-js/"/></url>
<url><loc>https://snyk.io/blog/snyklaunch-april-2023-recap/</loc><lastmod>2023-05-30T17:06:12.644Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="ja" href="https://snyk.io/jp/blog/snyklaunch-april-2023-recap/"/></url>
<url><loc>https://snyk.io/blog/data-loss-prevention-for-developers/</loc><lastmod>2023-05-30T17:02:41.372Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/wellness-tips-mental-health-awareness-month/</loc><lastmod>2023-05-30T17:02:37.482Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/top-8-penetration-testing-tools/</loc><lastmod>2023-05-25T17:56:38.014Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-named-leader-2023-magic-quadrant/</loc><lastmod>2023-05-24T09:43:07.987Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/prevent-xpath-injection-attacks/</loc><lastmod>2023-05-23T20:42:48.044Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/improved-risk-assessment-with-epss-scores-in-snyk/</loc><lastmod>2023-05-22T16:31:09.993Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/earth-day-2022-tree-planted-for-each-new-snyker/</loc><lastmod>2023-05-22T16:20:22.376Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/verdaccio-project-spotlight/</loc><lastmod>2023-05-22T16:20:19.566Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/gradle-plugin-by-snyk-gradle-dependencies-scanning/</loc><lastmod>2023-05-22T16:20:19.519Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/diagnosing-and-fixing-memory-leaks-in-python/</loc><lastmod>2023-05-22T16:20:19.421Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/owasp-top-10-breaches/</loc><lastmod>2023-05-22T16:20:16.608Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/requiring-authentication/</loc><lastmod>2023-05-22T16:20:16.377Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-open-source-review-2021/</loc><lastmod>2023-05-22T16:20:15.312Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/announcing-snyk-impact/</loc><lastmod>2023-05-22T16:20:14.368Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/6-big-aws-iam-vulnerabilities-and-how-to-avoid-them/</loc><lastmod>2023-05-22T16:20:12.433Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/what-makes-fastify-a-successful-project/</loc><lastmod>2023-05-22T16:20:12.240Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-iac-for-terraform-enterprise/</loc><lastmod>2023-05-22T16:20:10.349Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/command-injection-vulnerability-cve-2022-40764/</loc><lastmod>2023-05-22T16:20:09.294Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/no-experience-needed-secure-applications/</loc><lastmod>2023-05-22T16:20:08.259Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/cloud-security-podcast-now-powered-by-snyk/</loc><lastmod>2023-05-22T16:20:08.237Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyklaunch-developer-first-appsec-c-cpp/</loc><lastmod>2023-05-22T16:20:08.214Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/5-ways-to-improve-security-during-digital-transformation/</loc><lastmod>2023-05-22T16:20:05.231Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/the-secret-to-building-a-truly-successful-freemium-product-and-more-with-guy-podjarny/</loc><lastmod>2023-05-22T16:20:04.254Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/welcoming-sanjay-poonen-to-the-snyk-board-of-directors/</loc><lastmod>2023-05-22T16:20:03.321Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-trek10-aws-secure-serverless-cicd-deployments/</loc><lastmod>2023-05-22T16:20:01.448Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-native-integration-atlassian-bitbucket-cloud-security/</loc><lastmod>2023-05-22T16:20:00.187Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/appsec-during-hypergrowth-empower-your-developers/</loc><lastmod>2023-05-22T16:19:59.255Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/see-snyk-and-github-in-action-at-github-universe/</loc><lastmod>2023-05-22T16:19:57.398Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/bringing-cloud-native-application-security-full-circle/</loc><lastmod>2023-05-22T16:19:56.319Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/angular-vs-react-security-bakeoff-2019/</loc><lastmod>2023-05-22T16:19:54.491Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/application-security-battle-plan-home-alone/</loc><lastmod>2023-05-22T16:19:53.369Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/mitigating-clickjacking-the-devsecops-way/</loc><lastmod>2023-05-22T16:19:52.424Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/spring-security-authorization-bypass-cve-2022-31692/</loc><lastmod>2023-05-22T16:19:51.384Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/cloud-security-fundamentals-part-3/</loc><lastmod>2023-05-22T16:19:50.271Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-support-for-azure-repos-server/</loc><lastmod>2023-05-22T16:19:49.393Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/devseccon24-2021-24-hours-of-development-security-and-inclusivity/</loc><lastmod>2023-05-22T16:19:49.351Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/sourmint-malicious-sdk-research-write-up/</loc><lastmod>2023-05-22T16:19:48.383Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/secure-coding-snyk-code-ignore-feature-twist/</loc><lastmod>2023-05-22T16:19:44.212Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/azure-bicep-security-fundamentals/</loc><lastmod>2023-05-22T16:19:43.303Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/to-our-community-from-the-snyk-team/</loc><lastmod>2023-05-22T16:19:43.285Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/best-intellij-plugins-for-improving-your-coding-experience/</loc><lastmod>2023-05-22T16:19:42.361Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-international-dog-day-recap/</loc><lastmod>2023-05-22T16:19:42.355Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/why-did-is-promise-happen-and-what-can-we-learn-from-it/</loc><lastmod>2023-05-22T16:19:42.259Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/security-testing-git-based-gradle-projects-lockfile/</loc><lastmod>2023-05-22T16:19:41.301Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/sdr-during-covid-19-snyk-style/</loc><lastmod>2023-05-22T16:19:38.288Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/corey-quinn-breaking-bad-security-habits/</loc><lastmod>2023-05-22T16:19:34.223Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/using-third-party-content-securely/</loc><lastmod>2023-05-22T16:19:32.308Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/openssl-high-severity-vulnerabilities/</loc><lastmod>2023-05-22T16:19:30.348Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/high-severity-vulnerability-qs/</loc><lastmod>2023-05-22T16:19:27.520Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/developer-centric-approach/</loc><lastmod>2023-05-22T16:19:27.467Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/vulnerability-remediation-process/</loc><lastmod>2023-05-22T16:19:27.247Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-board-of-directors-kathleen-murphy-zach-nelson/</loc><lastmod>2023-05-22T16:19:27.166Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/log4j-vulnerability-software-supply-chain-security-log4shell/</loc><lastmod>2023-05-22T16:19:25.287Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/77-percent-of-sites-still-vulnerable/</loc><lastmod>2023-05-22T16:19:24.623Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/fserverless-security-at-serverless-conf/</loc><lastmod>2023-05-22T16:19:24.513Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/kubernetes-open-sourced-their-security-audit-what-can-we-learn/</loc><lastmod>2023-05-22T16:19:24.495Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/is-your-website-vulnerable-lets-fix-it/</loc><lastmod>2023-05-22T16:19:24.226Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/mental-health-awareness-month/</loc><lastmod>2023-05-22T16:19:23.319Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/secure-your-build-workflow-on-bitbucket-pipes-with-snyk/</loc><lastmod>2023-05-22T16:19:21.292Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/open-source-security-with-oreilly-author-guy-podjarny/</loc><lastmod>2023-05-22T16:19:19.223Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/the-new-improved-snyk-container-cli/</loc><lastmod>2023-05-22T16:19:18.205Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/http-strict-transport-security-hsts-headers-node-js/</loc><lastmod>2023-05-22T16:19:17.185Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/enhanced-security-for-bitbucket-cloud-development/</loc><lastmod>2023-05-22T16:19:16.348Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/best-practices-for-managing-java-dependencies/</loc><lastmod>2023-05-22T16:19:15.898Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/social-media-for-security-intelligence/</loc><lastmod>2023-05-22T16:19:13.289Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-cli-for-ruby/</loc><lastmod>2023-05-22T16:19:12.692Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/bitbucket-server-beta/</loc><lastmod>2023-05-22T16:19:12.658Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/launching-net-support-for-github-bitbucket-and-gitlab/</loc><lastmod>2023-05-22T16:19:12.479Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/do-you-know-how-healthy-your-net-dependencies-are/</loc><lastmod>2023-05-22T16:19:12.265Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/spring4shell-zero-day-rce-spring-framework-explained/</loc><lastmod>2023-05-22T16:19:08.351Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/application-security-automation-github/</loc><lastmod>2023-05-22T16:19:06.215Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-partner-solutions-directory/</loc><lastmod>2023-05-22T16:19:02.275Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/backstage-integration-with-the-snyk-api/</loc><lastmod>2023-05-22T16:18:58.280Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/log4shell-in-a-nutshell/</loc><lastmod>2023-05-22T16:18:57.274Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-named-a-2018-gartner-cool-vendor-in-application-and-data-security/</loc><lastmod>2023-05-22T16:18:57.257Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/celebrating-four-years-of-developer-first-integrations-at-atlassian-team-21/</loc><lastmod>2023-05-22T16:18:57.250Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/welcoming-tamar-yehoshua-to-the-snyk-board-of-directors/</loc><lastmod>2023-05-22T16:18:54.163Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/import-existing-infrastructure-into-terraform/</loc><lastmod>2023-05-22T16:18:53.291Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-named-39-on-2021-forbes-cloud-100/</loc><lastmod>2023-05-22T16:18:51.498Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/dirty-pipe-vulnerability-cve-2022-0847-containerized-applications/</loc><lastmod>2023-05-22T16:18:48.433Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-developer-security-hashicorp-terraform-cloud-workflow/</loc><lastmod>2023-05-22T16:18:48.303Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/securing-bitbucket-cloud-with-snyk/</loc><lastmod>2023-05-22T16:18:47.152Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/tips-to-scale-your-devsecops-organization/</loc><lastmod>2023-05-22T16:18:46.429Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/announcing-customized-role-based-access-controls/</loc><lastmod>2023-05-22T16:18:45.584Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/npm-faker-package-open-source-libraries/</loc><lastmod>2023-05-22T16:18:45.267Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/fetch-the-flag-ctf-2022-writeup-not-so-smart-fridge/</loc><lastmod>2023-05-22T16:18:43.425Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-22m-series-b/</loc><lastmod>2023-05-22T16:18:43.178Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/dependency-health-assessing-package-risk-with-snyk/</loc><lastmod>2023-05-22T16:18:42.459Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/marked-xss-vulnerability/</loc><lastmod>2023-05-22T16:18:40.336Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/applying-the-principle-of-least-privilege-to-kubernetes-using-rbac/</loc><lastmod>2023-05-22T16:18:40.313Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/dont-show-security-tokens-on-stage/</loc><lastmod>2023-05-22T16:18:39.453Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/deploying-a-gatsby-site-to-github-pages-from-travis-ci/</loc><lastmod>2023-05-22T16:18:36.316Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/call-for-nominations-snykie-award-for-secure-development/</loc><lastmod>2023-05-22T16:18:35.263Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/announcing-snykcon-2021-build-securely/</loc><lastmod>2023-05-22T16:18:34.263Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/prioritizing-vulnerabilities-in-kubernetes-deployments/</loc><lastmod>2023-05-22T16:18:34.234Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/vuln-cost-security-scanner-vs-code/</loc><lastmod>2023-05-22T16:18:33.224Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/secure-elixir-development-with-snyk/</loc><lastmod>2023-05-22T16:18:31.415Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/welcome-ruby-users/</loc><lastmod>2023-05-22T16:18:31.318Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/whats-a-known-vulnerability/</loc><lastmod>2023-05-22T16:18:31.315Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/career-growth-in-a-scale-up-world/</loc><lastmod>2023-05-22T16:18:27.283Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/one-month-to-snykcon-2021-sessions-capture-the-flag/</loc><lastmod>2023-05-22T16:18:25.396Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snykcon-day-one-wrap-up/</loc><lastmod>2023-05-22T16:18:25.307Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/getting-started-react-native-security/</loc><lastmod>2023-05-22T16:18:24.222Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/securing-open-source-dependencies-snyk-visual-studio-code-extension/</loc><lastmod>2023-05-22T16:18:23.293Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/putting-container-security-in-the-hands-of-developers/</loc><lastmod>2023-05-22T16:18:17.346Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/advanced-technologies-behind-snyk-code/</loc><lastmod>2023-05-22T16:18:16.309Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/web-application-vulnerabilities-prioritisation/</loc><lastmod>2023-05-22T16:18:14.276Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/using-es2015-proxy-for-fun-and-profit/</loc><lastmod>2023-05-22T16:18:13.512Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/writing-unit-tests-in-java/</loc><lastmod>2023-05-22T16:18:13.355Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-integration-with-aws-ecr-and-lambda/</loc><lastmod>2023-05-22T16:18:13.289Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyks-appsec-2022-review/</loc><lastmod>2023-05-22T16:18:11.404Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/ruby-on-rails-docker-for-local-development-environment/</loc><lastmod>2023-05-22T16:18:10.307Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/platform-engineers-in-security/</loc><lastmod>2023-05-22T16:18:09.349Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/how-to-write-unit-test-in-javascript/</loc><lastmod>2023-05-22T16:18:08.273Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/how-to-maintain-npm-dependencies-in-your-project/</loc><lastmod>2023-05-22T16:18:07.253Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/how-much-do-we-really-know-about-how-packages-behave-on-the-npm-registry/</loc><lastmod>2023-05-22T16:18:05.349Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/exploring-3-types-of-directory-traversal-vulnerabilities-in-c-c/</loc><lastmod>2023-05-22T16:18:03.342Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/cloud-transforms-it-security-appsec/</loc><lastmod>2023-05-22T16:18:03.215Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/malicious-code-found-in-npm-package-event-stream/</loc><lastmod>2023-05-22T16:18:02.283Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-welcomes-cloudskiff-accelerates-infrastructure-as-code/</loc><lastmod>2023-05-22T16:18:01.374Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/a-post-mortem-of-the-malicious-event-stream-backdoor/</loc><lastmod>2023-05-22T16:18:00.383Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/introducing-the-secure-developer-community/</loc><lastmod>2023-05-22T16:17:57.374Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-security-policies/</loc><lastmod>2023-05-22T16:17:56.279Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/aws-vulnerability-scanning-using-the-snyk-integration/</loc><lastmod>2023-05-22T16:17:54.453Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/how-and-when-to-use-docker-labels-oci-container-annotations/</loc><lastmod>2023-05-22T16:17:54.275Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/getting-started-snyk-for-secure-python-development/</loc><lastmod>2023-05-22T16:17:54.238Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/opa-rego-usage-for-policy-as-code/</loc><lastmod>2023-05-22T16:17:50.300Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/introducing-snyk-training/</loc><lastmod>2023-05-22T16:17:49.411Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/pulsemeter-report-software-supply-chain/</loc><lastmod>2023-05-22T16:17:48.268Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/toplang-ctf-snykcon-2021-explained/</loc><lastmod>2023-05-22T16:17:47.402Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/safely-handling-containers/</loc><lastmod>2023-05-22T16:17:45.221Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/arbitrary-code-execution-in-js-grunt/</loc><lastmod>2023-05-22T16:17:44.380Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/container-security-throughout-the-sdlc/</loc><lastmod>2023-05-22T16:17:44.366Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/tips-for-hardening-container-image-security-strategy/</loc><lastmod>2023-05-22T16:17:44.355Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/a-denial-of-service-vulnerability-discovered-in-the-axios-javascript-package-affecting-all-versions-of-the-popular-http-client/</loc><lastmod>2023-05-22T16:17:44.241Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/the-state-of-open-source-security-survey/</loc><lastmod>2023-05-22T16:17:43.312Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/java-turns-25/</loc><lastmod>2023-05-22T16:17:41.233Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/magento-vulnerability-cve-2022-24087-sanitization/</loc><lastmod>2023-05-22T16:17:39.383Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/6-stages-of-refactoring-a-jest-test-case/</loc><lastmod>2023-05-22T16:17:38.398Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/implementing-tls-ssl-python/</loc><lastmod>2023-05-22T16:17:36.315Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-partner-speak-video-series-servicenow/</loc><lastmod>2023-05-22T16:17:33.249Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/ai-generated-security-fixes-in-snyk-code-now-available/</loc><lastmod>2023-05-22T16:17:32.272Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/security-alert-php-pdf-library-dompdf-rce/</loc><lastmod>2023-05-22T16:17:32.271Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-security-information-in-github-code-scanning/</loc><lastmod>2023-05-22T16:17:28.252Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-developer-challenge/</loc><lastmod>2023-05-22T16:17:27.293Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/provide-granular-permissions-and-groups-for-users-in-azure-repos/</loc><lastmod>2023-05-22T16:17:25.292Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/developers-dont-want-to-leave-java-8-as-64-hold-firm-on-their-preferred-release/</loc><lastmod>2023-05-22T16:17:25.186Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/10-tips-for-getting-that-conference-cfp-accepted/</loc><lastmod>2023-05-22T16:17:24.412Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-closes-150m/</loc><lastmod>2023-05-22T16:17:22.282Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-partners-with-greenkeeper-to-help-developers-proactively-maintain-dependency-health/</loc><lastmod>2023-05-22T16:17:22.240Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/jackson-deserialization-vulnerability/</loc><lastmod>2023-05-22T16:17:20.277Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/state-of-opensource-security-survey/</loc><lastmod>2023-05-22T16:17:20.173Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/goodbye-2020-lookout-2021/</loc><lastmod>2023-05-22T16:17:19.308Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/angularjs-security/</loc><lastmod>2023-05-22T16:17:17.356Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-voted-next-european-unicorn-for-b2b-enterprise/</loc><lastmod>2023-05-22T16:17:16.349Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/ignoring-vulnerabilities-with-snyk/</loc><lastmod>2023-05-22T16:17:14.285Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/celebrating-asian-american-pacific-islander-heritage-month/</loc><lastmod>2023-05-22T16:17:12.344Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/newest-snyk-ambassadors-sep-2022/</loc><lastmod>2023-05-22T16:17:11.188Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/under-the-c-vulnerabilities-in-python/</loc><lastmod>2023-05-22T16:17:08.350Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/31-percent-dont-track-application-dependencies-and-38-only-track-direct-dependencies/</loc><lastmod>2023-05-22T16:17:08.204Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/suitecrm-phar-deserialization-vulnerability-to-code-execution/</loc><lastmod>2023-05-22T16:17:07.421Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/engineering-equal-opportunities-at-snyk/</loc><lastmod>2023-05-22T16:17:05.505Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/whats-so-wild-about-exploits-in-the-wild-and-how-can-we-prioritize-accordingly/</loc><lastmod>2023-05-22T16:17:05.444Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/shipping-kubernetes-native-applications-with-confidence/</loc><lastmod>2023-05-22T16:17:02.283Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/stackhawk-integration-with-snyk-code/</loc><lastmod>2023-05-22T16:17:01.349Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/cloud-security-updates-reinvent-2022/</loc><lastmod>2023-05-22T16:17:00.386Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/enriched-content-on-snyks-publicly-available-vulnerability-database/</loc><lastmod>2023-05-22T16:16:59.458Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/generating-fake-security-data-python-faker-security/</loc><lastmod>2023-05-22T16:16:59.371Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/voltos-and-snyk/</loc><lastmod>2023-05-22T16:16:59.302Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/scanning-docker-images-for-key-binaries-going-beyond-package-managers/</loc><lastmod>2023-05-22T16:16:57.297Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/python-mocking-101/</loc><lastmod>2023-05-22T16:16:57.297Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-learn-free-developer-security-education/</loc><lastmod>2023-05-22T16:16:56.303Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/january-in-review-funding-news-devsecops-insights-study-and-much-more/</loc><lastmod>2023-05-22T16:16:56.227Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/launching-the-snyk-community-outreach-internship-program/</loc><lastmod>2023-05-22T16:16:52.209Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/scaling-snyk-fast-with-copy-paste-orgs/</loc><lastmod>2023-05-22T16:16:51.461Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/applying-risk-management-to-devops-practices/</loc><lastmod>2023-05-22T16:16:50.249Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/speed-matters-static-application-security-testing-sast/</loc><lastmod>2023-05-22T16:16:50.238Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-debuts-on-2021-cnbc-disruptor-50-list-at-15/</loc><lastmod>2023-05-22T16:16:48.158Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/container-images-simplified-with-google-ko/</loc><lastmod>2023-05-22T16:16:47.546Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-ranked-20-on-2022-forbes-cloud-100-list/</loc><lastmod>2023-05-22T16:16:45.433Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-joins-openssf-developer-first-open-source-supply-chain-security/</loc><lastmod>2023-05-22T16:16:40.411Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/congratulations-snyk-crn-women-of-the-channel-2022/</loc><lastmod>2023-05-22T16:16:40.326Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/add-a-security-md-file-to-your-azure-repos/</loc><lastmod>2023-05-22T16:16:38.462Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/open-source-security/</loc><lastmod>2023-05-22T16:16:37.462Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-container-certified-vmware-pks-partner-ready/</loc><lastmod>2023-05-22T16:16:37.289Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/git-the-easy-way-using-rebase-part-i/</loc><lastmod>2023-05-22T16:16:35.376Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/a-brief-history/</loc><lastmod>2023-05-22T16:16:32.450Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/log4j-2-16-vulnerability-cve-2021-45105-discovered/</loc><lastmod>2023-05-22T16:16:30.281Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/launching-state-of-oss-security/</loc><lastmod>2023-05-22T16:16:30.257Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/container-linux-security-and-relative-importance/</loc><lastmod>2023-05-22T16:16:29.446Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/sourmint-malicious-code-ad-fraud-and-data-leak-in-ios/</loc><lastmod>2023-05-22T16:16:29.357Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-and-atlassian/</loc><lastmod>2023-05-22T16:16:28.248Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/building-a-secure-amazon-s3-bucket-aws/</loc><lastmod>2023-05-22T16:16:28.234Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/february-in-review-jvm-ecosystem-report-python-and-container-updates-and-more/</loc><lastmod>2023-05-22T16:16:27.182Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/architecting-a-serverless-web-application-in-aws/</loc><lastmod>2023-05-22T16:16:26.320Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/gartner-guide-highlights-importance-of-software-composition-analysis/</loc><lastmod>2023-05-22T16:16:26.303Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/attacking-an-ftp-client/</loc><lastmod>2023-05-22T16:16:26.203Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/automated-vulnerability-fixes-dot-net-dependencies/</loc><lastmod>2023-05-22T16:16:25.335Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/pci-standards-open-source-security-requirements-how-to-comply/</loc><lastmod>2023-05-22T16:16:25.215Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/take-actions-to-improve-security-in-your-docker-images/</loc><lastmod>2023-05-22T16:16:24.432Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyker-spotlight-reflecting-on-juneteenth/</loc><lastmod>2023-05-22T16:16:24.294Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/a-snyk-peek-into-node-js-and-npms-state-of-open-source-security-report-2019/</loc><lastmod>2023-05-22T16:16:23.246Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/gdpr-compliance-and-open-source/</loc><lastmod>2023-05-22T16:16:22.360Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/biden-harris-national-cybersecurity-strategy/</loc><lastmod>2023-05-22T16:16:21.261Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/4-best-practices-developer-security-adoption/</loc><lastmod>2023-05-22T16:16:21.214Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/command-line-tools-for-containers/</loc><lastmod>2023-05-22T16:16:20.409Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/announcing-net-go-php/</loc><lastmod>2023-05-22T16:16:20.313Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-fix-automatic-vulnerability-remediation-snyk-cli/</loc><lastmod>2023-05-22T16:16:19.233Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/sast-tools-speed-comparison-snyk-code-sonarqube-lgtm/</loc><lastmod>2023-05-22T16:16:18.335Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/equifax-breach-vulnerable-open-source-libraries/</loc><lastmod>2023-05-22T16:16:18.282Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/quay-vulnerability-scanning-with-snyk/</loc><lastmod>2023-05-22T16:16:17.362Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/fetch-the-flag-ctf-2022-writeup-logster/</loc><lastmod>2023-05-22T16:16:14.270Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-unifies-open-source-and-container-security-for-coveo/</loc><lastmod>2023-05-22T16:16:12.370Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/securing-kubernetes-application-development-with-snyk-and-tilt/</loc><lastmod>2023-05-22T16:16:12.367Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/how-to-detect-mitigate-trojan-source-attacks-javascript-eslint/</loc><lastmod>2023-05-22T16:16:11.405Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/trend-micro-launches-cloud-one-open-source-security-powered-by-snyk/</loc><lastmod>2023-05-22T16:16:11.385Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/popular-python-library-urllib3-subject-to-a-denial-of-service-vulnerability/</loc><lastmod>2023-05-22T16:16:10.368Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/building-docker-images-kubernetes/</loc><lastmod>2023-05-22T16:16:06.301Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/ghostcat-breach-affects-all-tomcat-versions/</loc><lastmod>2023-05-22T16:16:03.504Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/how-to-scale-successfully-with-snyk/</loc><lastmod>2023-05-22T16:16:00.284Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-partner-speak-video-series/</loc><lastmod>2023-05-22T16:15:59.466Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/typosquatting-attacks/</loc><lastmod>2023-05-22T16:15:59.388Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/find-and-fix-vulnerabilities-in-artifactory-container-repositories/</loc><lastmod>2023-05-22T16:15:58.374Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/security-incident-management-snyk-opsgenie-integration/</loc><lastmod>2023-05-22T16:15:55.359Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/accouncement-new-datacenter-aus/</loc><lastmod>2023-05-22T16:15:54.263Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/python-language-support-now-beta-in-snyk-code/</loc><lastmod>2023-05-22T16:15:53.425Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-container-review-2021/</loc><lastmod>2023-05-22T16:15:51.260Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/introducing-snyk-technology-alliance-partner-program-tapp/</loc><lastmod>2023-05-22T16:15:50.831Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/reachable-vulnerabilities/</loc><lastmod>2023-05-22T16:15:50.581Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/vulnerability-monitoring-with-snyk-prometheus-and-grafana/</loc><lastmod>2023-05-22T16:15:49.451Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-and-lighthouse/</loc><lastmod>2023-05-22T16:15:48.231Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/solarwinds-orion-security-breach-a-shift-in-the-software-supply-chain-paradigm/</loc><lastmod>2023-05-22T16:15:47.546Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/best-practices-containerizing-python-docker/</loc><lastmod>2023-05-22T16:15:47.239Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/node-js-multithreading-with-worker-threads/</loc><lastmod>2023-05-22T16:15:47.205Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-aws-marketplace-private-offer-sppo/</loc><lastmod>2023-05-22T16:15:46.399Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/looking-back-black-hat-usa-2022/</loc><lastmod>2023-05-22T16:15:45.473Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/django-security-tips/</loc><lastmod>2023-05-22T16:15:45.353Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/ruby-gem-strong_password-found-to-contain-remote-code-execution-code-in-a-malicious-version-further-strengthening-worries-of-growth-in-supply-chain-attacks/</loc><lastmod>2023-05-22T16:15:44.725Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/sast-tools/</loc><lastmod>2023-05-22T16:15:41.197Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/kernel-privilege-escalation/</loc><lastmod>2023-05-22T16:15:39.960Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/best-practices-react-typescript-security/</loc><lastmod>2023-05-22T16:15:37.531Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-receives-best-ceo-award/</loc><lastmod>2023-05-22T16:15:34.708Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/join-the-big-fix/</loc><lastmod>2023-05-22T16:15:34.350Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/not-npm-packages-youre-looking-for/</loc><lastmod>2023-05-22T16:15:34.296Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/2022-state-of-cloud-security-report/</loc><lastmod>2023-05-22T16:15:32.727Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/aws-security-considerations-when-migrating/</loc><lastmod>2023-05-22T16:15:30.395Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/scan-aws-cloudformation-misconfigurations-snyk-iac/</loc><lastmod>2023-05-22T16:15:28.360Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/service-accounts/</loc><lastmod>2023-05-22T16:15:28.305Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/improving-code-quality-with-linting-in-python/</loc><lastmod>2023-05-22T16:15:24.734Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-launches-beta-support-for-cpp/</loc><lastmod>2023-05-22T16:15:20.361Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-series-a/</loc><lastmod>2023-05-22T16:15:20.271Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snykcon-2021-partner-day-recap/</loc><lastmod>2023-05-22T16:15:16.314Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/most-common-vulnerabilities-npm-maven/</loc><lastmod>2023-05-22T16:15:15.590Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/join-snyk-celebrating-31-days-of-cybersecurity-awareness-month-2021/</loc><lastmod>2023-05-22T16:15:15.256Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/launching-a-free-tier-version-of-our-container-vulnerability-management-solution/</loc><lastmod>2023-05-22T16:15:14.414Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-closes-200m-to-modernize-security-industry/</loc><lastmod>2023-05-22T16:15:14.374Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-kicks-off-community-outreach-internship-program/</loc><lastmod>2023-05-22T16:15:13.134Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/three-considerations-building-security-program/</loc><lastmod>2023-05-22T16:15:06.564Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/scanning-harbor-registry-images-for-vulnerabilities-snyk/</loc><lastmod>2023-05-22T16:15:06.495Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/coronavirus-adapting-fully-remote/</loc><lastmod>2023-05-22T16:15:05.545Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/vs-code-extension-building-auto-cicd-with-github-actions/</loc><lastmod>2023-05-22T16:15:03.610Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/building-a-secure-pipeline-with-github-actions/</loc><lastmod>2023-05-22T16:15:02.495Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/making-climate-positive-changes/</loc><lastmod>2023-05-22T16:14:58.297Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/scoring-security-vulnerabilities-101-introducing-cvss-for-cve/</loc><lastmod>2023-05-22T16:14:57.613Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/fetch-the-flag-ctf-2022-writeup-pay-attention/</loc><lastmod>2023-05-22T16:14:52.309Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/the-secure-developer-podcast/</loc><lastmod>2023-05-22T16:14:52.210Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/scaling-your-security-team-without-hiring/</loc><lastmod>2023-05-22T16:14:51.295Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/avoiding-mass-assignment-node-js/</loc><lastmod>2023-05-22T16:14:48.287Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/trend-micro-and-snyk-partner-to-deliver-complete-remediation-to-secure-containers/</loc><lastmod>2023-05-22T16:14:46.193Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/cloud-security-fundamentals-part-1/</loc><lastmod>2023-05-22T16:14:44.209Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/so-you-think-your-ci-cd-environment-is-secure/</loc><lastmod>2023-05-22T16:14:43.325Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/introducing-snyk-technology-alliance-partner-program-tapp-new-members-2023/</loc><lastmod>2023-05-22T16:14:42.328Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/navigating-your-own-career-growth-in-a-hyper-growth-startup/</loc><lastmod>2023-05-22T16:14:40.290Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/jvm-ecosystem-report-2018-tools/</loc><lastmod>2023-05-22T16:14:38.385Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/cloud-security-at-blackhat-and-defcon-2022/</loc><lastmod>2023-05-22T16:14:36.521Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/how-to-manage-terraform-state/</loc><lastmod>2023-05-22T16:14:35.279Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-and-rapid7-enhance-security-for-cloud-native-applications/</loc><lastmod>2023-05-22T16:14:35.272Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/code-injection-vulns-cli-ide-plugins-medium-sev/</loc><lastmod>2023-05-22T16:14:35.230Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/severe-security-vulnerability-in-bowers-zip-archive-extraction/</loc><lastmod>2023-05-22T16:14:35.221Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/keep-your-dependencies-up-to-date-enable-auto-upgrades-with-snyk/</loc><lastmod>2023-05-22T16:14:28.311Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/automate-snyk-kubernetes-pulumi/</loc><lastmod>2023-05-22T16:14:27.368Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/graphql-security-static-analysis-snyk-code/</loc><lastmod>2023-05-22T16:14:23.323Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/devsecops-with-snyk-and-dynatrace/</loc><lastmod>2023-05-22T16:14:19.486Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-your-next-career-move/</loc><lastmod>2023-05-22T16:14:18.296Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-code-security-scanning-c-sharp-dot-net/</loc><lastmod>2023-05-22T16:14:18.189Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/brian-vermeer-business-insider-21-top-developers-shaping-tech/</loc><lastmod>2023-05-22T16:14:17.394Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/welcoming-adriana-bokel-herde-snyk-chief-people-officer/</loc><lastmod>2023-05-22T16:14:16.273Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/write-secure-kubernetes-configuration-with-help-from-snyk/</loc><lastmod>2023-05-22T16:14:15.662Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/hypergrowth-playbook-7-best-practices-from-startup-to-scaleup/</loc><lastmod>2023-05-22T16:14:15.237Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/sum-list-of-numbers-in-java/</loc><lastmod>2023-05-22T16:14:13.230Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/secure-your-kubernetes-applications-with-snyk-container/</loc><lastmod>2023-05-22T16:14:13.193Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/embrace-your-next-cybersecurity-career-the-big-fix/</loc><lastmod>2023-05-22T16:14:12.214Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/secure-development-visual-studio-snyk-open-source/</loc><lastmod>2023-05-22T16:14:08.222Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/finding-meaning-amidst-unknown/</loc><lastmod>2023-05-22T16:14:07.324Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/ruby-gem-installation-lockfile-injection-attacks/</loc><lastmod>2023-05-22T16:14:07.314Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/welcoming-karyn-smith-snyk-chief-legal-officer/</loc><lastmod>2023-05-22T16:14:05.384Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/instant-security-information-with-the-snyk-security-badge/</loc><lastmod>2023-05-22T16:14:04.425Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/docker-image-scan-github-action/</loc><lastmod>2023-05-22T16:14:04.406Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/my-internship-journey-at-snyk/</loc><lastmod>2023-05-22T16:14:04.282Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/understanding-amazon-s3-security/</loc><lastmod>2023-05-22T16:14:03.433Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/numpy-arbitrary-code-execution-vulnerability/</loc><lastmod>2023-05-22T16:14:01.262Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/secure-development-for-teams-snyk-team-product-tier/</loc><lastmod>2023-05-22T16:14:00.192Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/advancing-sbom-standards-snyk-spdx/</loc><lastmod>2023-05-22T16:13:57.260Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/case-study-comic-relief/</loc><lastmod>2023-05-22T16:13:56.281Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/log4j-rce-log4shell-vulnerability-cve-2021-44228/</loc><lastmod>2023-05-22T16:13:53.226Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/three-expert-tips-for-secure-software-development/</loc><lastmod>2023-05-22T16:13:53.201Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/proxy-authentication-in-snyk-cli-for-windows/</loc><lastmod>2023-05-22T16:13:49.349Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/a-definitive-guide-to-ruby-gems-dependency-management/</loc><lastmod>2023-05-22T16:13:49.323Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/prevent-php-code-injection/</loc><lastmod>2023-05-22T16:13:49.223Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/rsa-2020-who-we-met-and-what-we-learned/</loc><lastmod>2023-05-22T16:13:47.412Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/opensourcesecurity-2020survey/</loc><lastmod>2023-05-22T16:13:45.204Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snyk-atlassian-remote-summit/</loc><lastmod>2023-05-22T16:13:43.447Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/java-configuration-prevent-security-misconfigurations/</loc><lastmod>2023-05-22T16:13:42.391Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/snykher-celebrates-international-womens-day-2022/</loc><lastmod>2023-05-22T16:13:42.243Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/java-ecosystem-survey-2021/</loc><lastmod>2023-05-22T16:13:38.461Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://snyk.io/blog/lessons-from-openssl-vulnerabilities-part-1/</loc><lastmod>2023-05-22T16:13:38.290Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
</urlset>