Encryption is converting readable data or plaintext into unreadable data or ciphertext, ensuring that even if encrypted data is intercepted, it remains inaccessible to unauthorized individuals.
Handling security vulnerabilities in Spring Boot
Keeping your dependencies in check is crucial to ensure that your Spring Boot projects run smoothly and remain resilient in the face of ever-evolving threats.
Using JLink to create smaller Docker images for your Spring Boot Java application
An in-depth exploration of utilizing JLink to optimize Docker image sizes, enhancing application security and performance.
SnakeYaml 2.0: Solving the unsafe deserialization vulnerability
In December of last year, we reported CVE-2022-1471 to you. This unsafe deserialization problem could easily lead to arbitrary code execution.
Preventing Cross-Site Scripting (XSS) in Java applications with Snyk Code
By taking a proactive approach to XSS prevention and using the right resources and tools, developers can help ensure the security and integrity of their Java web applications.
Using Bots to Keep Dependencies Updated
Did you know bots can automatically create pull requests to keep dependencies secure and up to date?
Mitigating Path Traversal Vulnerabilities in Java
Path traversal vulnerabilities are a serious threat to Java web applications, amongst the top security issues Snyk finds in Java code.
How to Create SBOMs in Java with Maven and Gradle
Java is a compiled language, so you should create an SBOM whenever you build a release version of your application. Find out more here!
Best Practices for Managing Java Dependencies
Knowing how to select, update, and remove Java dependencies from our application is essential for security.
Building Secure CI/CD Pipelines with GitHub Actions for Your Java Application
Learn how to integrate Snyk into your GitHub CI/CD to automate security scanning as part of your build cycle prior to production.
How Social Trends Help Me Fix Essential Vulnerabilities
Our research team found a strong correlation between socially trending vulnerabilities and the existence of exploits that can actually harm your application.