SnykSec

SnykSec @snyk_sec

About: Automatically find and fix vulnerabilities in your code, open source, and containers. Sign up for free at https://snyk.co/dev.to

Joined:
Sep 5, 2022

SnykSec
articles - 234 total

Finding Software Flaws Early in the Development Process Provides Clear ROI

The Consortium for Information and Software Quality estimated that the cost of poor software quality in the United States reached $2.41 trillion in 2022. As we will show, it makes sense that the cost of poor software quality is so high. It’s also completely avoidable, and software flaws must be avoided with the world’s increased dependency on software.

Learn More 0 1Jun 13

Snyk for Government Achieves FedRAMP Moderate Authorization: A Milestone for Secure Government Software

Snyk for Government is our FedRAMP Moderate authorized solution for the public sector. This authorization underscores our unwavering commitment to providing secure development solutions that meet the rigorous standards of the Federal Risk and Authorization Management Program (FedRAMP).

Learn More 0 2Jun 7

Black Hat Asia 2025: My Journey as a Reviewer, Speaker & Community Connector

Explore a personal journey through Black Hat Asia 2025 as a speaker, reviewer, and community connector. Discover insights on cloud security, women in cyber, AI, and building connections.

Learn More 0 0Apr 29

Get Off My Lawn and Fix Your Vulnerabilities!

Tired of boring scans? Meet Greybeard, Snyk's humorous AI security CLI that gives unforgettable, brutally honest vulnerability feedback developers won't forget. Greybeard is an April Fool's tool that really works.

Learn More 1 0Apr 2

CVE-2025-29927 Authorization Bypass in Next.js Middleware

On Friday morning, March 21, 2025, at 9:00 a.m. UTC, a security advisory identified as CVE-2025-29927 was published. It cited a critical 9.1 severity vulnerability for mainstream Next.js applications.

Learn More 3 0Mar 25

Unburdening Developers From Vulnerability Fatigue with Snyk Delta Findings

Tired of endless security alerts? Snyk Delta Findings in the IDE helps developers cut through the noise and focus on *new* vulnerabilities introduced in their code. Reduce vulnerability fatigue and ship secure software faster. Get started for free!

Learn More 4 0Mar 19

Reconstructing the TJ Actions Changed Files GitHub Actions Compromise

A critical security exploit in the popular GitHub Action changed-files (tj-actions/changed-files) exposed encrypted secrets in plaintext within GitHub Action logs. This vulnerability, affecting over 23,000 repositories, was enabled by orphaned commits and manipulated release tags. Learn how to protect your GitHub workflows from similar exploits.

Learn More 1 0Mar 18

Snyk Helps Secure the Golang Bento Project

Discover how Snyk helps secure the open source Golang project Bento by contributing vulnerability fixes and leveraging AI-powered tools. Learn about our efforts to enhance Bento’s security and support open source maintainers through the Snyk Secure Developer Program.

Learn More 0 0Mar 13

Can Snyk Detect JWT Security Issues?

How to detect and prevent JWT security risks? Follow Snyk’s JWT security best practices for enhanced security.

Learn More 1 0Mar 5

ChatGPT and Secure Coding: Benefits and Security Vulnerabilities of ChatGPT-Generated Code

Using ChatGPT for coding has benefits but can also introduce security vulnerabilities. Learn more about ChatGPT and secure coding and how to offset risk here.

Learn More 0 0Mar 5

Leveraging Generative AI with DevSecOps for Enhanced Security

Learn about the top advantages of secure AI coding tools for stronger DevSecOps practices with Snyk.

Learn More 1 1Feb 28

Does Claude 3.7 Sonnet Generate Insecure Code?

Anthropic’s Claude 3.7 Sonnet shows improvements in secure code generation, but vulnerabilities like regex-based denial-of-service still emerge. See how it compares to other AI models and why Snyk’s security tools remain essential for developers.

Learn More 2 0Feb 27

Can Snyk Find Weak Cryptographic Algorithms? Bye Bye MD5

Weak encryption algorithms are cryptographic algorithms that provide inadequate security against attacks. Find out how Snyk Code can help find weak cryptographic algorithms and with weak cryptography testing.

Learn More 0 0Feb 26

Do not pass GO - Malicious Package Alert

Recently, researchers have found another Software Supply Chain issue in BoltDB, a popular database tool in the Go programming environment. The BoltDB Go Module was found backdoored and contained hidden malicious code.

Learn More 0 0Feb 13

BFI’s Journey in Digital Transformation: A Fireside Chat on Elevating Application Security and Developer Experience

Discover how BFI Finance Indonesia transformed their SDLC with proactive security practices, improving compliance, developer experience, and collaboration. Learn key insights from their journey shared at CISO Indonesia 2024, moderated by Snyk's Didik Achmadi.

Learn More 0 0Jan 15

10 Docker Security Best Practices

Understand the basics of Docker security best practices with our Docker Cheat Sheet to improve container security.

Learn More 4 0Jan 9

Ultralytics AI Pwn Request Supply Chain Attack

Discover the details of the Ultralytics AI supply chain attack, a sophisticated two-phase breach targeting PyPI releases and GitHub Actions with cryptocurrency mining malware. Learn how to detect exposure, secure your projects, and protect against future vulnerabilities using tools like Snyk.

Learn More 0 0Dec 12 '24

How to mitigate SSRF vulnerabilities in Go

Dive into Server-Side Request Forgery (SSRF) vulnerabilities in Go applications and explore mitigation techniques. Learn how to secure your Go code and leverage tools like Snyk Code for proactive security.

Learn More 4 0Dec 11 '24

A commitment to future generations: Snyk’s 2024 Student Edition Capture The Flag Recap

Looking to boost your cybersecurity skills? Snyk's CTF 101 Workshop offers a hands-on introduction to Capture the Flag competitions, empowering students to tackle real-world security challenges. Learn about application security, network vulnerabilities, and more through free, engaging training.

Learn More 0 0Nov 23 '24

Understanding command injection vulnerabilities in Go

Read how command injection works and the dangers it poses. Learn about practical guidance on how to prevent it. By following best practices and using tools like Snyk, you can significantly reduce the risk of command injection attacks in your Go projects.

Learn More 13 2Nov 15 '24

If you don’t know about HTTP Archive’s Web Almanac yet, you should!

Learn about the HTTP Archive’s Web Almanac, a valuable, community-driven resource for today’s security teams.

Learn More 1 0Nov 2 '24

Lottie Player npm package compromised for crypto wallet theft

On October 31st, 2024, another package compromise and cryptocurrency hijack story unfolded for a popular npm package. Scan open source dependencies and container images in the CLI or your SCM with Snyk to determine if you're using one of the vulnerable versions of lottie-player, and potentially uncover any other security vulnerabilities you may have in your projects.

Learn More 0 0Nov 1 '24

Best Practices for Continuous Vulnerability Management

By integrating security practices into the development lifecycle, providing continuous education and training, and automating security workflows, organizations can effectively mitigate risks from open-source supply chain incidents, AI-generated code, and emerging threats. Snyk provides the tools and resources to establish a proactive security culture and ensure application security.

Learn More 1 0Oct 30 '24

Vulnerability-Free C and C++ Development in Automotive Manufacturing and Software Defined Vehicles (SDV)

Look into the security challenges facing the booming Software-Defined Vehicle (SDV) market. While SDV promises exciting features and revenue streams, its reliance on C and C++ code, notorious for vulnerabilities, raises concerns.

Learn More 0 0Oct 24 '24

Women - Kickstart your Application Security Career!

Discover how to break into the exciting field of application security. Learn about free online resources, community involvement, mentorship opportunities, and exclusive communities for women in cybersecurity. Get inspired by industry leaders and start your journey today.

Learn More 2 0Oct 23 '24

Automatically fix code vulnerabilities with AI

Explore Snyk Deep Code AI Fix (DCAIF), a game-changer for developers. Unlike generative AI assistants that may introduce security vulnerabilities, DCAIF leverages a hybrid AI model to automatically fix common security issues like XSS right in your IDE.

Learn More 8 0Oct 15 '24

Analyze Taint Analysis Faster with Improved Contextual Dataflow in Snyk Code

Snyk Code's enhanced dataflow analysis simplifies vulnerability identification and remediation. Learn how this powerful tool streamlines the security process and saves developers valuable time.

Learn More 0 0Oct 11 '24

The mysterious supply chain concern of string-width-cjs npm package

Npm package aliasing can be a security threat. Learn about how malicious actors can exploit this feature to introduce fake packages into your projects. Protect your projects with best practices and stay vigilant against supply chain attacks.

Learn More 0 0Oct 4 '24

Proactive AppSec continuous vulnerability management for developers and security teams

Protect against modern threats like open-source supply chain attacks and AI-generated code vulnerabilities. Automate dependency scanning, remediation, and container security to ensure your applications are safe and compliant. Secure your software development with Snyk's comprehensive vulnerability management solution.

Learn More 0 0Oct 3 '24

Zero-day RCE vulnerability found in CUPS - Common UNIX Printing System

Security researcher evilsocket.net (Simone Margaritelli) published information about several vulnerabilities in CUPS that allow for remote code execution (RCE)

Learn More 15 0Sep 28 '24