Vulnerability InsightsHow to effectively detect and mitigate Trojan Source attacks in JavaScript codebases with ESLintNovember 10, 2021
Vulnerability InsightsExploring extensions of dependency confusion attacks via npm package aliasingNovember 4, 2021
Vulnerability InsightsJavaScript type confusion: Bypassed input validation (and how to remediate)November 3, 2021
Vulnerability InsightsSnykCon 2021 recap #2: Supply chain security, the future of cybersecurity, automation as an enabler, and moreOctober 8, 2021
Vulnerability InsightsDetect and prevent dependency confusion attacks on npm to maintain supply chain securitySeptember 13, 2021
Vulnerability InsightsHow Snyk Social Trends help you fix essential security vulnerabilitiesAugust 18, 2021
Vulnerability InsightsAnnouncing Social Trends: Use social media for security intelligenceJuly 28, 2021
Vulnerability InsightsSnyk takes on responsibility for Node.js ecosystem vulnerability disclosure programMay 25, 2021
Vulnerability InsightsSnyk uncovers malicious code activities in open source supply chain security on the npm registryMay 5, 2021
Vulnerability InsightsSnyk’s new vulnerability cards - fix issues fast with a new look and feelMarch 2, 2021
Vulnerability InsightsSolarWinds Orion Security Breach: A Shift In The Software Supply Chain ParadigmMarch 2, 2021
Vulnerability InsightsWhat is typosquatting and how typosquatting attacks are responsible for malicious modules in npmJanuary 12, 2021
Vulnerability InsightsGolang security: access restriction bypass vulnerability in JWTDecember 22, 2020
Vulnerability InsightsCommand injection: how it works, what are the risks, and how to prevent itNovember 25, 2020