Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What is CSRF (Cross-Site Request Forgery)?

CSRF is a web security vulnerability that tricks users into performing unwanted actions on a website where they are already authenticated like changing account settings or making a purchase without their knowledge. In this video, we explain how CSRF attacks work and how attackers exploit user trust to hijack authenticated sessions.

How to spot risky chatbot behavior before your customers do

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Falcon Exposure Management ExPRT.AI: Demo Drill Down

Most vulnerability tools flood teams with static scores and long lists but ExPRT.AI changes the game by predicting what adversaries are most likely to exploit. This demo drill down shows how ExPRT.AI dynamically scores risk across asset types, network exposures, and third-party findings. You’ll see how it re-prioritizes vulnerabilities based on real-world telemetry, attacker behavior, and environmental context including a Tenable example.

Scan your AI-generated code from Cursor using Model Context Protocol (MCP)

We’re happy to announce that Cursor has validated Snyk’s CLI MCP server and added Snyk to their curated set of MCP tools from official providers. At Snyk, we recognized early on that although AI assistants accelerate development, they can inadvertently introduce vulnerable patterns, leverage outdated libraries, or even code with known security flaws. In order to maintain the rapid iteration cycles that AI enables, developers need security to be as agile as AI itself.

Building AI Trust with Snyk Code and Snyk Agent Fix

Many businesses are using AI to innovate and boost productivity. But to truly benefit from AI, you need to trust it. That's where the Snyk AI Trust Platform comes in. As we announced at the 2025 Snyk Launch, the Snyk AI Trust Platform is designed to unleash innovation, reduce business risk, and accelerate software delivery in the age of AI.

Introducing Veracode Package Firewall: Your First Line of Defense Against Software Supply Chain Attacks

Open-source and third-party packages drive innovation but expose your software supply chain to relentless cyberattacks. Veracode’s 2025 State of Software Security (SoSS) report reveals a chilling truth: 70% of critical security debt originates from third-party code.

The 10 Most Costly GDPR Mistakes Banks and Financial Institutions Make

Financial services firms operate in a high-risk environment where personal and financial data converge — and errors are expensive. Despite robust back-end controls, many still: GDPR’s complexity — 99 articles and multiple regional interpretations — creates audit friction even for mature teams.

A Clicking Time Bomb: What To Do About Repeat Clickers

I recently had several conversations about repeat clickers. First with a Forrester analyst and then, shortly after, at KB4-CON Orlando following a presentation on the subject by Matthew Canham, Executive Director of the Cognitive Security Institute. After that, my approach was a little less organic: intrigued by the topic, I spoke with several KnowBe4 customers to find out how they manage repeat clickers.

FTC States That Scams Cost U.S. Consumers $158.3 Billion in One Year

I am used to repeating some pretty big numbers when talking about the financial impact of cybercrimes. When you look into the data, it is pretty easy to start talking about tens of billions of dollars. I occasionally come across figures that are in the hundreds of billions of dollars in damage across multiple years globally. So, imagine my surprise when I learned the U.S. Federal Trade Commission (FTC) said Americans lost $158.3B in 2023, one year, to scammers, and that annual figure is getting worse.

5 Multi-Cloud Environments

Multi-cloud environments have become the backbone of modern enterprise IT, offering unparalleled flexibility, scalability, and access to a diverse array of innovative services. This distributed architecture empowers organizations to avoid vendor lock-in, optimize costs, and leverage specialized functionalities from different providers. However, this very strength introduces a significant challenge: increased complexity in security management.