Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Managing Cyber Risk Exposure in a Hyperconnected World

Not long ago, “visibility” was the North Star of cybersecurity. If you could just see all your assets, vulnerabilities, and misconfigurations, you could manage the risk. But that logic doesn’t hold up anymore; not in a world where your infrastructure is scattered across multiple clouds, tied together by APIs you didn’t build, and partially run by vendors you barely know.

SafeBreach Coverage for CVE-2025-53770: ToolShell Exploits Targeting Microsoft SharePoint

A newly disclosed zero-day vulnerability in Microsoft SharePoint Server — CVE-2025-53770 — is currently being exploited in the wild and poses a critical threat to organizations running on-premises SharePoint instances.

Navigating Enterprise AI Implementation: Risks, Rewards, and Where to Start

At Snyk, we believe that AI innovation starts with trust, which must be earned through clear governance, sound security practices, and proven value delivery. As we scale our AI initiatives across the business, we’re continually refining how to implement AI in a way that is not just fast and functional, but also secure and responsible.

Cursor IDE Malware Extension Compromise in $500k Crypto Heist

Cursor IDE, as many are aware, is a fork of the open source and popular VS Code IDE project from Microsoft. Similarly to VS Code, Cursor has support for IDE extensions, which prompts many developers to migrate over with their favorite extensions and long-lived workflows, shortcuts, themes, and other configurations. Back in May 2021, Snyk’s Security Labs conducted research that uncovered VS Code extensions vulnerable to insecure code patterns.

From Hype to Trust: Building the Foundations of Secure AI Development

Generative AI and Agentic AI are changing everything from who writes software to how we define secure architecture. At Snyk’s recent Lighthouse event in NYC, leaders from cloud, security, and development teams came together to answer one essential question: how do we move fast with AI without breaking trust? The answer? Start with visibility, bake in security by design, and never lose sight of the humans behind the code.

CVE-2025-53770: Widespread Exploitation of ToolShell RCE Vulnerability Observed in Microsoft SharePoint On-Premises

On July 19, 2025, Microsoft disclosed active exploitation of a zero-day vulnerability (CVE-2025-53770) affecting on-premises SharePoint Server instances. Originally, no patch was available for this vulnerability, but fixes were released late on the evening of July 20. CVE-2025-53770 is caused by the deserialization of untrusted data, allowing unauthenticated threat actors to execute code remotely over the network.

CVE-2025-54309: Critical Admin Access Vulnerability in CrushFTP - What You Need to Know and Do

A critical remote code execution vulnerability, CVE-2025-54309, has been identified in CrushFTP server, impacting versions prior to 10.8.5 and 11.3.4_23. This vulnerability exists when the DMZ proxy feature is not in use. It stems from improper validation in the AS2 (Applicability Statement 2) protocol over HTTPS, allowing unauthenticated remote attackers to gain administrative access to the system.

Microsoft SharePoint CVE-2025-53770: Actively Exploited Remote Code Execution via Insecure Deserialization

Microsoft recently disclosed a critical remote code execution (RCE) vulnerability in Microsoft SharePoint Server, tracked as CVE-2025-53770. This flaw has been actively exploited in the wild, making it a high-priority concern for enterprises relying on SharePoint for content management and collaboration. In this blog, we’ll unpack the technical root of the vulnerability, how exploitation works, the risks posed, mitigation steps, and what to do if you think you may be impacted. In this article.

How Credit Card Data Theft Impacts Personal Security

Credit card data theft poses real risks to your personal security. Beyond financial losses, it can affect your privacy, your credit history, and your peace of mind. Understanding these impacts helps you take proactive steps to protect yourself.