Loading...

Tag trends are in beta. Feedback? Thoughts? Email me at [email protected]

Abusing Ubuntu 24.04 features for root privilege escalation

Polyfill supply chain attack embeds malware in JavaScript CDN assets, action required

"Leaky Vessels" Docker Container Breakout Vulnerability

Code injection in Python: examples and prevention

File encryption in Python: An in-depth exploration of symmetric and asymmetric techniques | The Snyk blog

Handling security vulnerabilities in Spring Boot

How to protect Node.js apps from CSRF attacks

Using JLink to create smaller Docker images for your Spring Boot Java application

XS leaks: What they are and how to avoid them

The importance of verifying webhook signatures

Session management security: Best practices for protecting user sessions

Security implications of HTTP response headers

Data loss prevention for developers

Comparing Node.js web frameworks: Which is most secure?

Node.js multithreading with worker threads: pros and cons

Mitigating path traversal vulns in Java

Advanced IntelliJ debugger features you’re missing out on

Building Vue 3 components with Tailwind CSS

Using Python libraries for secure network communication | Snyk

Adding security to Nuxt 3 | The Snyk blog

Unsafe deserialization in SnakeYaml - Exploring CVE-2022-1471

How to write tests in Python using doctest

Node.js multithreading with worker threads series: worker_threads tutorial

Dependency injection in JavaScript | The Snyk Blog

How to create SBOMs in Java with Maven and Gradle

Phony PyPi package imitates known developer

How to make a mock API server in JavaScript

Choosing the best Node.js Docker image

How to use Java DTOs to stay secure

How to add Playwright tests to your pull request CI with GitHub Actions

More →