Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Does Deep Network Visibility Elevate Your Vulnerability Management?

Every month, thousands of new vulnerabilities flood security feeds, yet many organizations still depend on quarterly scans and static inventories. That means critical flaws on shadow-IT devices or lateral-movement paths go unnoticed until it’s too late. Meanwhile, your team wastes precious cycles chasing low-risk issues while genuine exploits spread unchecked. It doesn’t have to be this way.

Cursor's One-click Install MCP in Action

In this video, I’m checking out the brand new Cursor 1.0 release and testing one of its most exciting new features — the one-click MCP install. Setting up MCP servers has never been this easy! Join me as I walk through the process, share my first impressions, and see how smooth (or not) the setup really is. If you’ve been curious about Cursor or want to simplify your MCP workflows, this one’s for you.

Building AI Trust with Snyk Code and Snyk Agent Fix

Many businesses are using AI to innovate and boost productivity. But to truly benefit from AI, you need to trust it. That's where the Snyk AI Trust Platform comes in. As we announced at the 2025 Snyk Launch, the Snyk AI Trust Platform is designed to unleash innovation, reduce business risk, and accelerate software delivery in the age of AI.

Scan your AI-generated code from Cursor using Model Context Protocol (MCP)

We’re happy to announce that Cursor has validated Snyk’s CLI MCP server and added Snyk to their curated set of MCP tools from official providers. At Snyk, we recognized early on that although AI assistants accelerate development, they can inadvertently introduce vulnerable patterns, leverage outdated libraries, or even code with known security flaws. In order to maintain the rapid iteration cycles that AI enables, developers need security to be as agile as AI itself.

What is CSRF (Cross-Site Request Forgery)?

CSRF is a web security vulnerability that tricks users into performing unwanted actions on a website where they are already authenticated like changing account settings or making a purchase without their knowledge. In this video, we explain how CSRF attacks work and how attackers exploit user trust to hijack authenticated sessions.

OWASP MASTG Best Practices Checklist for Mobile App Security

Mobile applications are at the heart of today’s digital experience, but with their convenience comes a growing landscape of security threats. For developers and security teams, simply building a functional app is no longer enough—protecting user data and business assets must be woven into every stage of the mobile app lifecycle. That’s where the OWASP Mobile Application Security Testing Guide (MASTG) steps in.

Vulnerability Data in Next Gen-SIEM with Falcon Exposure Management

Vulnerability data is often siloed and captured in static dashboards, disconnected from real-time investigation. But with Falcon Exposure Management streaming into NG-SIEM, that changes. This demo shows how teams can correlate live vulnerability events with endpoint behavior, network activity, and even cloud telemetry. Using a Firefox example, we trace active and historical exposure, revealing how ExPRT.AI, asset metadata, and cloud-aware context come together in Next Gen SIEM.

Website Vulnerability Scanners: How They Work and Boost Security

Website vulnerability scanners enable organizations to continuously identify vulnerabilities by crawling the website and its diverse parts, including web pages, third-party components, and software. It simulates attack techniques to detect weaknesses such as: These tools are essential in modern DevSecOps and continuous security testing environments, helping identify flaws early in the development or deployment lifecycle.

How Automated Vulnerability Scanners Can Improve Your Threat Detection

Web applications are central to how modern businesses operate, driving customer engagement, managing critical workflows, and enabling seamless digital experiences. But as applications become more dynamic and distributed, their attack surfaces grow more complex, and harder to defend. According to the 2025 Verizon Data Breach Investigations Report, 20% of confirmed breaches began with the exploitation of known vulnerabilities, a 34% increase over the previous year.