Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Announcing a Dedicated Snyk API & Web Infrastructure Instance for Asia-Pacific

Snyk is delighted to announce a significant milestone for our customers and partners in the Asia-Pacific (APAC) region: the launch of a dedicated Snyk API & Web infrastructure instance, which is now available and hosted locally within the region. This investment addresses the critical needs of our growing customer base in the region, ensuring that they can benefit from our modern, developer-first DAST capabilities while meeting local data residency and compliance requirements.

#220 - AI & automation for security operations w/ Filip Stojkovski, Staff Security Engineer at Snyk

On this episode of the Cybersecurity Defenders Podcast we speak with Filip Stojkovski, Staff Security Engineer at Snyk. Filip is a cybersecurity professional with over 15 years of experience. He began his career as a SOC analyst and now leads SecOps engineering at Snyk. Filip also advises organizations on SOAR, AI for SOC, and threat intelligence strategies.

What Is Cyber Risk

Did you know that it is estimated that 45% of organizations worldwide will have suffered attacks on their software supply chains this year? Cyber risk is real, and its consequences can be devastating. As digital transformation continues to reshape how businesses operate globally, cyber threats are increasing at a rapid and alarming pace. The term cyber risk refers to the damage posed by these cyber threats.

Is your AI safe? Threat analysis of MCP (Model Context Protocol)

Unless you lived under a rock for the past several months or started a digital detox, you have probably encountered the MCP initials (Model Context Protocol). But what is MCP? Is this just a glorified API call, or is there really something there? This post thoroughly explains what MCP is and why it makes LLMs more powerful. It also provides a comprehensive threat model analysis and reviews the fundamental security vulnerabilities.

This message will self-decrypt in 5 years: why post-quantum prep starts now

This blog is the first part of a two-part series on post-quantum cryptography (PQC). In this piece, we explore why quantum threats are no longer theoretical. In Part 2, we’ll cover practical steps for building post-quantum readiness. Security leaders have become digital-first responders. They perform triage on multiple emergencies every day, except with fewer thanks and more acronyms.

Generative AI Is Moving Fast. Are Your Security Practices Keeping Up?

We are in the middle of an AI gold rush. Generative AI (Gen AI) has exploded from research labs into everyday business workflows at breakneck speed. Marketing, software development, customer support, HR, companies across industries deploy Gen AI tools to boost efficiency, automate tasks, and gain an edge. But security trails behind. In the rush to innovate, organizations chase speed and visibility, leaving risk management behind.

Brace Yourselves: The Game-Changing Impact of India's DPDP Act, 2023

India's Digital Personal Data Protection (DPDP) Act, 2023 is a turning point in how personal data is regulated, managed, and protected across the country. As every industry becomes more digital, this law makes it clear who owns data and who must protect it. The Act introduces a legal imperative and an operational opportunity for SOC managers, CISOs, DPOs, and IT security teams to revisit how data is collected, stored, shared, and protected.

Protect Yourself: Vishing Attacks Are Growing More Sophisticated

Researchers at Google’s Mandiant have published a report on voice phishing (vishing) attacks, noting that these attacks have served as initial access points for recent waves of ransomware incidents. Threat actors often perform reconnaissance before launching social engineering attacks, collecting publicly available information in order to craft tailored, realistic scenarios.

Google Report Outlines the Latest Scam Trends

Researchers at Google have published a report on the latest scam trends, noting an increase in travel-themed scams targeting people preparing for their summer vacations. “Ahead of the summer vacation season, our teams have observed a spike in travel scams,” the researchers write. “Fake travel websites lure users into booking travel with a promise of ‘too good to be true’ prices, experiences, or discounts.