Cryptography Usage in Web Standards (w3c )Jan 29, 2026 502 standards , cryptography OpenJS Foundation Security Program: Annual Report 2025 (ope )Jan 29, 2026 501 openjs A Security Checklist for Your React and Next.js Apps (the )Jan 26, 2026 500 react , nextjs Securing npm Is Table Stakes (nza +/cha )Jan 21, 2026 499 podcasts , interviews , npm , ai Security (vik +/htt )Jan 16, 2026 498 web-almanac , studies , research , metrics , tls , certificates , cookies , csp , http-headers , apis , sanitization , configuration Node.js January 2026 Security Release: What Changed and Why It Matters (nod )Jan 14, 2026 497 nodejs Tuesday, January 13, 2026 Security Releases (nod )Jan 13, 2026 496 release-notes , nodejs Mitigating Denial-of-Service Vulnerability From Unrecoverable Stack Space Exhaustion for React, Next.js, and APM Users (mco +/nod )Jan 13, 2026 495 nodejs , vulnerabilities , react , nextjs , tooling , monitoring , performance npm to Implement Staged Publishing After Turbulent Shift Off Classic Tokens (sar /soc )Jan 7, 2026 494 npm , dependencies , github Security Basics for Vibe-Coders (owe /pro )Jan 2, 2026 493 fundamentals , vibe-coding , ai Testing Methods: Accessible Authentication (Enhanced) (dec )Dec 29, 2025 492 accessibility , testing , wcag , authentication Testing Methods: Accessible Authentication (Minimum) (dec )Dec 28, 2025 491 accessibility , testing , wcag , authentication Denial of Service and Source Code Exposure in React Server Components (rea )Dec 11, 2025 490 react , components Thursday, December 18, 2025 Security Releases (nod )Dec 8, 2025 489 release-notes , nodejs How We’re Protecting Our Newsroom From npm Supply Chain Attacks (rya /pnp )Dec 5, 2025 488 npm , dependencies , case-studies No More Tokens—Locking Down npm Publish Workflows (zac )Dec 4, 2025 487 npm , dependencies , github , processes [Next.js] Security Advisory: CVE-2025-66478 (seb )Dec 3, 2025 486 nextjs Critical Security Vulnerability in React Server Components (rea )Dec 3, 2025 485 react , components Decreasing [Let’s Encrypt] Certificate Lifetimes to 45 Days (mat /let )Dec 2, 2025 484 http , certificates , lets-encrypt Taking Down Next.js Servers for 0.0001 Cents a Pop Nov 26, 2025 483 servers , nextjs , vulnerabilities The Shai-Hulud 2.0 npm Worm: Analysis, and What You Need to Know Nov 25, 2025 482 npm , dependencies GitLab Discovers Widespread npm Supply Chain Attack (git )Nov 24, 2025 481 npm , dependencies , gitlab , github , aws , gcp , azure Automated npm Secret Rotation in GitHub Actions (mhe )Nov 16, 2025 480 npm , automation , github-actions What Developers Really Mean by “Bad Code” (jet )Nov 12, 2025 479 maintainability , scalability , consistency , quality Introducing the OWASP Top 10:2025 (she +/owa )Nov 5, 2025 478 introductions , owasp , vulnerabilities Removing XSLT for a More Secure Browser (dro /dev )Oct 29, 2025 477 chromium , chrome , google , browsers , xsl , web-platform Will npm’s New Security Steps Stop Attacks? (rev )Oct 28, 2025 476 npm , github , maintenance , foss HTTPS by Default (jde +)Oct 28, 2025 475 http , chrome , google , browsers Agentic AI and Security (ksi /mfo )Oct 28, 2025 474 ai , architecture Octoverse: A New Developer Joins GitHub Every Second as AI Leads TypeScript to #1 (git )Oct 28, 2025 473 github , metrics , productivity , ai , foss , programming Glassworm: First Self-Propagating Worm Using Invisible Code Hits OpenVSX Marketplace Oct 18, 2025 472 code-editors , vs-code , microsoft Improving the Trustworthiness of JavaScript on the Web (clo )Oct 16, 2025 471 javascript , web-apps Past Time for Passkeys (nor )Oct 15, 2025 470 videos , passkeys , passwords , authentication Secure Coding in JavaScript Oct 15, 2025 469 javascript , frameworks My Conclusions After Using Signed Exchanges on My Website for 2 Years (paw )Oct 9, 2025 468 signed-exchanges , performance Lazy-Loading as a Security Measure Oct 6, 2025 467 lazy-loading , angular , react Backend Concepts Every Experienced Developers Must Know Oct 4, 2025 466 concepts , network , concurrency , apis , databases , caching , scalability , observability , architecture Fixing Safari Mixed Content Issues With Vite and mkcert Oct 3, 2025 465 safari , apple , browsers , vite , tooling How Deno Protects Against npm Exploits (den )Sep 30, 2025 464 deno , npm Strengthening npm Security: Important Changes to Authentication and Token Management (git )Sep 29, 2025 463 npm How Hackers Use AI to Find Vulnerabilities Faster Sep 25, 2025 462 ai CAPTCHA, When Security Takes Precedence Over Accessibility Sep 22, 2025 461 captcha , accessibility Our Plan for a More Secure npm Supply Chain (xco /git )Sep 22, 2025 460 npm , dependencies , foss npm Security Best Practices Sep 21, 2025 459 npm , provenance , best-practices This May Be the Worst One (the )Sep 17, 2025 458 videos , npm , dependencies Ongoing Supply Chain Attack Targets CrowdStrike npm Packages (pvd +/soc )Sep 16, 2025 457 npm , dependencies ctrl/tinycolor and 40+ npm Packages Compromised Sep 15, 2025 456 npm , dependencies How Maintainer Burnout Is Causing a Kubernetes Security Disaster (the )Sep 11, 2025 455 kubernetes , maintenance , foss , economics Oh No, Not Again… a Meditation on npm Supply Chain Attacks (tan )Sep 9, 2025 454 npm , dependencies , microsoft Anatomy of a Billion-Download npm Supply-Chain Attack Sep 8, 2025 453 npm , dependencies npm Author Qix Compromised via Phishing Email in Major Supply Chain Attack (bur +/soc )Sep 8, 2025 452 npm , dependencies CORS Explained: Stop Struggling With Cross-Origin Errors Sep 3, 2025 451 cors , http-headers , http How OpenJS-Hosted Projects Benefit From Security Support (ope )Sep 2, 2025 450 openjs , hosting , foss Why You Absolutely Need to Have Automated Dependency Management in Place (j9t )Aug 28, 2025 449 dependencies , maintainability , maintenance , automation , tooling What Your Website’s Style Says About You—and How Hackers Can Use It Against You (err )Aug 1, 2025 448 css , javascript Hardening Node.js Apps in Production: 8 Layers of Practical Security Jul 29, 2025 447 nodejs , best-practices eslint-config-prettier Compromised: How npm Package With 30 Million Downloads Spread Malware Jul 21, 2025 446 prettier , eslint , npm , malware AI Agents Are Creating a New Security Nightmare for Enterprises and Startups (the )Jul 18, 2025 445 ai , apis npm Phishing Email Targets Developers With Typosquatted Domain (sar /soc )Jul 18, 2025 444 npm Tuesday, July 15, 2025 Security Releases (nod )Jul 15, 2025 443 release-notes , nodejs Contagious Interview Campaign Escalates With 67 Malicious npm Packages and New Malware Loader (soc )Jul 14, 2025 442 npm , dependencies MCP Security Vulnerabilities and Attack Vectors Jun 27, 2025 441 mcp , ai A New Era of Code Quality Jun 24, 2025 440 quality JWTs Are Not Session Tokens, Stop Using Them Like One Jun 21, 2025 439 json-web-tokens , authentication Design Patterns for Securing LLM Agents Against Prompt Injections (sim )Jun 13, 2025 438 studies , research , ai , prompting , software-design-patterns The Growing Risk of Malicious Browser Extensions (soc )Jun 13, 2025 437 browser-extensions Escaping “<” and “>” in Attributes—How It Helps Protect Against Mutation XSS (sec )Jun 12, 2025 436 html , attributes , xss , escaping , chrome , google , browsers HTML Spec Change: Escaping “<” and “>” in Attributes (sec /dev )Jun 12, 2025 435 html , attributes , escaping , xss Beware of End-of-Life Node.js Versions—Upgrade or Seek Post-EOL Support (mco /nod )Jun 6, 2025 434 nodejs , maintenance How to Access Local MCP Servers Through a Secure Tunnel (the )Jun 5, 2025 433 how-tos , mcp , ai , servers , network Docker Launches Hardened Images, Intensifying Secure Container Market (the )May 19, 2025 432 docker Modernizing Security May 17, 2025 431 modernization , processes Securing Your Node.js App From Command Injection May 14, 2025 430 nodejs Passkeys for Normal People (tro )May 5, 2025 429 authentication , passkeys , examples , concepts npm Targeted by Malware Campaign Mimicking Familiar Library Names (soc )May 2, 2025 428 npm , malware , dependencies , link-lists What Is an Encryption Backdoor? (int )May 2, 2025 427 encryption , vulnerabilities , concepts Cybersecurity Leaders Are Staying in the Shadows (ste )Apr 26, 2025 426 community , culture Threat Actors Misuse Node.js to Deliver Malware and Other Malicious Payloads (mic )Apr 15, 2025 425 nodejs , malware Principles for Coding Securely With LLMs (sea )Apr 15, 2025 424 ai , principles TLS Certificate Lifetimes Will Officially Reduce to 47 Days Apr 14, 2025 423 tls , certificates LLMs Can’t Stop Making Up Software Dependencies and Sabotaging Everything (tho /the )Apr 12, 2025 422 ai , dependencies , slop Secure a Vue App With OpenID Connect and the BFF Pattern (due )Apr 9, 2025 421 vuejs , authentication , backend-for-frontend Teaching Code in the AI Era: Why Fundamentals Still Matter (ali )Apr 4, 2025 420 training , ai , programming , vibe-coding , scalability , performance , quality , testing , documentation Stop Using Jenkins in 2025 (oso )Apr 1, 2025 419 jenkins , github-actions , ci-cd Node.js Test CI Security Incident (nod )Mar 31, 2025 418 nodejs , retrospectives Website Hijack Campaign Now Impacting 150,000 Sites (gad )Mar 27, 2025 417 Malware Found on npm Infecting Local Package With Reverse Shell (rev )Mar 26, 2025 416 npm , dependencies Five Things Vibe Coders Should Know (From a Software Engineer) (uxd )Mar 20, 2025 415 vibe-coding , sanitization GitHub Suffers a Cascading Supply Chain Attack Compromising CI/CD Secrets (inf )Mar 19, 2025 414 github , ci-cd How to Prevent WordPress SQL Injection Attacks (sma )Mar 13, 2025 413 how-tos , wordpress , sql , databases Lazarus Strikes npm Again With New Wave of Malicious Packages (soc )Mar 10, 2025 412 npm , dependencies Updates on CVE for End-of-Life Versions (raf /nod )Mar 7, 2025 411 nodejs What Is the OWASP Top 10 and How Can Your Team Benchmark Security? (jet )Mar 7, 2025 410 owasp , vulnerabilities , qodana , jetbrains How to Protect Your Web Applications From XSS (tor /w3c )Mar 6, 2025 409 how-tos , web-apps , xss In Tech, What Matters and What Is Dangerous (ham )Mar 6, 2025 408 community , foss , open-web Secure UX: Building Cybersecurity and Privacy Into the UX Lifecycle (uxm )Mar 3, 2025 407 user-experience , processes The Fallacy of Balance: Challenging the Notion of Security and Accessibility as Opposing Objectives (deq )Feb 26, 2025 406 videos , accessibility It Is No Longer Safe to Move Our Governments and Societies to U.S. Clouds (ber )Feb 23, 2025 405 cloud-computing , privacy , legal How OWASP Helps You Secure Your Full-Stack Web Applications (eri /sma )Feb 18, 2025 404 owasp , monitoring , authentication , vulnerabilities , configuration , csrf , cryptography , authorization 10 Common Web Development Mistakes to Avoid Right Now Feb 17, 2025 403 mistakes , mobile , performance , accessibility , seo , navigation , analytics , testing Tightening Every Bolt (bag )Feb 8, 2025 402 videos , processes , code-reviews , testing On Generative AI Security (sch )Feb 5, 2025 401 ai , lessons , microsoft Understanding CORS Errors in Signed Exchanges (paw )Jan 31, 2025 400 cors , errors , signed-exchanges Keep Your Node.js Apps Secure With “npx is-my-node-vulnerable” (tre )Jan 29, 2025 399 packages , npm , nodejs How I Open-Sourced My Secret Access Tokens From GitHub, Slack, and npm—and Who Actually Cares Jan 24, 2025 398 github , slack , npm Node.js EOL Versions CVE Dubbed the “Worst CVE of the Year” by Security Experts (sar /soc )Jan 24, 2025 397 nodejs , documentation Tuesday, January 21, 2025 Security Releases (raf /nod )Jan 21, 2025 396 release-notes , nodejs APIs Are Quickly Becoming the Latest Security Battleground (and Nightmare) (the )Jan 14, 2025 395 apis CDN-First Is No Longer a Performance Feature (osv )Jan 12, 2025 394 content-delivery , performance , caching , embed-code , privacy The Cyber-Cleanse: Take Back Your Digital Footprint (cyb )Jan 1, 2025 393 privacy 15 Principles for Secure Programming (rak )Dec 23, 2024 392 principles , validation , testing Important Topics for Frontend Developers to Master in 2025 Dec 21, 2024 391 learning , javascript , typescript , css , frameworks , git , apis , testing , performance , ci-cd , websockets Developer Guide: How to Implement Passkeys Dec 16, 2024 390 guides , how-tos , authentication , passkeys How to Automate OWASP Security Reviews in Your Pull Requests? (cod )Dec 16, 2024 389 how-tos , owasp , automation , code-reviews , coderabbit 5 Technical Trends to Help Web Developers Stand Out in 2025 (the )Dec 10, 2024 388 trends , career , javascript , ai , low-and-no-code Avoid Hotlinking Images With “Cross-Origin-Resource-Policy” Nov 27, 2024 387 images Content Security Policy Level 3 (mik /w3c )Nov 22, 2024 386 standards , csp Security (htt )Nov 11, 2024 385 web-almanac , studies , research , metrics JavaScript Import Attributes (ES2025) (tre )Nov 10, 2024 384 javascript Exploring Internet Traffic Shifts and Cyber Attacks During the 2024 U.S. Election (clo )Nov 6, 2024 383 traffic Securing Your Express REST API With Passport.js Nov 3, 2024 382 nodejs , express , json-web-tokens , apis , rest , tooling SecretLint—a Linter for Preventing Committing Credentials (tre )Oct 22, 2024 381 tooling , linting The Importance of UX in Cybersecurity (uxm )Oct 21, 2024 380 user-experience , usability Understanding “npm audit” and Fixing Vulnerabilities Oct 21, 2024 379 npm , vulnerabilities , nodejs Top 4 Web Vulnerabilities With Example and Mitigation Oct 21, 2024 378 vulnerabilities , sql , databases , xss , csrf How to Implement Content Security Policy (CSP) Headers for Astro (tre )Oct 16, 2024 377 how-tos , http , http-headers , csp , astro , vercel , cloudflare Why Code Security Matters—Even in Hardened Environments Oct 8, 2024 376 vulnerabilities , file-handling , nodejs Database 101: SSL/TLS for Beginners Oct 4, 2024 375 introductions , databases , ssl , tls , authentication Cloudflare Study: 39% of Companies Losing Control of Their IT and Security Environment (tre )Oct 3, 2024 374 studies , research , engineering-management NIST Recommends Some Common-Sense Password Rules (sch )Sep 27, 2024 373 passwords , guidelines I Finally Understand OAuth Sep 24, 2024 372 authorization , oauth , processes Fake GitHub Site Targeting Developers (jul /san )Sep 19, 2024 371 github Hacking Cars in JavaScript (Running Replay Attacks in the Browser With the HackRF) (dev )Sep 16, 2024 370 javascript Gaining Access to Anyone’s Browser Without Them Even Visiting a Website Sep 7, 2024 369 arc , the-browser-company , browsers , vulnerabilities 10 AI Dangers and Risks and How to Manage Them (rin )Sep 3, 2024 368 ai , privacy , sustainability , legal Web Security: Shaping the Secure Web (set /w3c )Aug 21, 2024 367 web , w3c 5 Wasm Use Cases for Frontend Development (ele /des )Aug 21, 2024 366 guest-posts , webassembly , performance What Is Incident Response? Aug 20, 2024 365 incident-response , overviews Migrating From Netlify to Cloudflare for AI Bot Protection (sia )Aug 6, 2024 364 migrating , netlify , cloudflare , ai The Great npm Garbage Patch Aug 6, 2024 363 dependencies , npm , spam Frontend Security Checklist (tre )Jul 30, 2024 362 checklists , react Automated Ways to Security Audit Your Website Jul 28, 2024 361 auditing , automation , tooling Secure Node.js Applications From Supply Chain Attacks Jul 25, 2024 360 nodejs , best-practices , dependencies The Cloud Run Security Gap You Didn’t Know You Had (and How to Fix It) Jul 18, 2024 359 google , gcp The Pitfalls of In-App Browsers (fro )Jul 18, 2024 358 browsers , mobile , privacy , user-experience Supply Chain Security in npm—We Can Be Optimistic About the Future Jul 9, 2024 357 npm , dependencies , provenance Script Integrity (chr /fro )Jul 5, 2024 356 embed-code , javascript Introducing the MDN HTTP Observatory (mdn )Jul 2, 2024 355 introductions , mdn , mozilla , http Tuesday, July 2, 2024 Security Releases (nod )Jul 2, 2024 354 release-notes , nodejs WebAuthn: Enhancing Security With Minimal Effort (tbe )Jul 2, 2024 353 authentication , webauthn RegreSSHion: Remote Unauthenticated Code Execution Vulnerability in OpenSSH Server Jul 1, 2024 352 ssh , vulnerabilities Polyfill Supply Chain Attack Embeds Malware in JavaScript CDN Assets Jun 26, 2024 351 malware , vulnerabilities Catching Compromised Cookies Jun 25, 2024 350 cookies , testing Backdoor Slipped Into Multiple WordPress Plugins in Ongoing Supply-Chain Attack (dan /ars )Jun 24, 2024 349 wordpress , plugins The Hacking of Culture and the Creation of Socio-Technical Debt (sch )Jun 19, 2024 348 culture OAuth Authentication (rya )Jun 15, 2024 347 authentication , authorization , oauth Researchers Uncover npm Registry Vulnerability to Cache Poisoning and DoS Attacks (sar /soc )Jun 15, 2024 346 npm , dependencies , vulnerabilities , caching What Is Mixed Content? (fre )Jun 15, 2024 345 http The Ultimate Guide to Iframes (log )Jun 6, 2024 344 guides , iframes , html , javascript How a Single Vulnerability Can Bring Down the JavaScript Ecosystem Jun 3, 2024 343 javascript , npm , dependencies , caching , vulnerabilities JavaScript Security: Simple Practices to Secure Your Frontend May 15, 2024 342 javascript , dependencies , csp Manifesto for a Humane Web (mic )May 10, 2024 341 websites , manifestos , web , principles , accessibility , dei , sustainability , user-experience Securing Client-Side JavaScript (ada )May 5, 2024 340 javascript , graceful-degradation Poor Express Authentication Patterns in Node.js and How to Avoid Them May 3, 2024 339 express , nodejs , authentication Passkeys: A Shattered Dream (fir )Apr 26, 2024 338 authentication , passkeys Using Legitimate GitHub URLs for Malware (sch )Apr 22, 2024 337 malware , github When Security and Accessibility Clash: Why Are Banking Applications So Inaccessible? (nic )Apr 17, 2024 336 accessibility Open Source Security (OpenSSF) and OpenJS Foundations Issue Alert for Social Engineering Takeovers of Open Source Projects (ope )Apr 15, 2024 335 foss , openjs Wednesday, April 10, 2024 Security Releases (raf /nod )Apr 10, 2024 334 release-notes , nodejs Node.js Secure Coding: Mitigate and Weaponize Code Injection Vulnerabilities Apr 8, 2024 333 books , nodejs , vulnerabilities The Free Software Commons (jen )Apr 5, 2024 332 foss , community The V8 Sandbox Apr 4, 2024 331 v8 Building a Digital Fortress: How to Strengthen DNS Against DDoS Attacks? Apr 3, 2024 330 dns Using JSON Web Tokens With Node.js Apr 3, 2024 329 json-web-tokens , nodejs , authentication Wednesday, April 3, 2024 Security Releases (nod )Apr 3, 2024 328 release-notes , nodejs In-App Browsers Are Still a Privacy, Security, and Choice Problem (tho /the )Mar 27, 2024 327 browsers , mobile , privacy CORS Finally Explained—Simply Mar 24, 2024 326 csrf , cors , concepts How Does Single Sign-On (SSO) Work? (mil )Mar 24, 2024 325 authentication How npm Install Scripts Can Be Weaponized: A Real-World Example of a Harmful npm Package (eth )Mar 3, 2024 324 npm , dependencies , examples Preventing SQL Injection Attacks in Node.js Feb 20, 2024 323 nodejs , databases , sql Frontend Application Security: Tips and Tricks Feb 16, 2024 322 web-apps , xss , csrf , authentication , dependencies , csp , validation , tips-and-tricks Wednesday, February 14, 2024 Security Releases (raf +/nod )Feb 14, 2024 321 release-notes , nodejs How to Boost WordPress Security and Protect Your SEO Ranking Feb 12, 2024 320 how-tos , wordpress , seo Malicious npm Package Masquerades as Noblox.js, Targeting Roblox Users for Data Theft (sar /soc )Feb 6, 2024 319 npm , dependencies Practice Safe DSD With “setHTMLUnsafe” (It’s Complicated) (jar /van )Jan 31, 2024 318 html , dom , shadow-dom , apis Tuesday, February 6, 2024 Security Releases (raf /nod )Jan 30, 2024 317 release-notes , nodejs JWT vs. Session Authentication Jan 25, 2024 316 authentication , json-web-tokens , comparisons GitHub, npm Registry Abused to Host SSH Key-Stealing Malware Jan 24, 2024 315 github , npm , malware , foss Navigating JavaScript Security: Recompiling Firefox to Bypass Anti-Debugger Techniques (gli )Jan 20, 2024 314 javascript , debugging , firefox , mozilla , browsers Deceptive Deprecation: The Truth About npm Deprecated Packages Jan 18, 2024 313 deprecation , npm , dependencies , research Safely Accessing the DOM With Angular SSR (dev )Jan 17, 2024 312 dom , javascript , angular , server-side-rendering Node.js Security Progress Report—Progress on Permission Model, Fuzzer, and Connections With Community (ope )Jan 16, 2024 311 nodejs I Hate CORS Jan 14, 2024 310 videos , cors Building Multiple Progressive Web Apps on the Same Domain (dev )Jan 4, 2024 309 videos , web-apps , progressive-web-apps , architecture Session-Based vs. Token-Based Authentication: Which Is Better? Dec 23, 2023 308 authentication , json-web-tokens , comparisons 10 Best Practices for Secure Code Review of Node.js Code Dec 20, 2023 307 best-practices , code-reviews , nodejs Security Headers Using “<meta>” (sap /mat )Dec 7, 2023 306 csp , html Blind CSS Exfiltration: Exfiltrate Unknown Web Pages Dec 5, 2023 305 css Mastering Cryptography Fundamentals With Node’s “crypto” Module Nov 11, 2023 304 cryptography , nodejs Secure Code Review Tips to Defend Against Vulnerable Node.js Code Nov 8, 2023 303 nodejs , code-reviews Understanding CORS Nov 4, 2023 302 cors Secret Scanning Scans Public npm Packages (git )Oct 26, 2023 301 github , npm , dependencies What the !#@% Is a Passkey? (eff )Oct 26, 2023 300 passkeys Local HTTPS for Next.js 13.5 (ami )Oct 10, 2023 299 testing , http , nextjs Understanding XSS Attacks Oct 5, 2023 298 xss A Comprehensive Guide to the Dangers of Regular Expressions in JavaScript (phi )Sep 28, 2023 297 guides , javascript , regex Best Practices for Securing Node.js Applications in Production Sep 27, 2023 296 best-practices , nodejs SSH Keys Stolen by Stream of Malicious PyPI and npm Packages (ble )Sep 27, 2023 295 ssh , dependencies , npm npm Provenance General Availability (git )Sep 26, 2023 294 github , npm , provenance Open Source Trends to Look for in 2024 Sep 21, 2023 293 foss , trends , outlooks , ai The WebP 0-Day Sep 21, 2023 292 webp , google , apple Securing Your Node.js Apps by Analyzing Real-World Command Injection Examples Sep 15, 2023 291 nodejs , history , examples How to Implement SSL/TLS Pinning in Node.js Aug 29, 2023 290 how-tos , ssl , tls , nodejs A More Intelligent and Secure Web (ple /w3c )Aug 24, 2023 289 videos , w3c , standards , web , web-platform Demystifying CORS: Understanding How Cross-Origin Resource Sharing Works Aug 18, 2023 288 cors , javascript Towards HTTPS by Default (jde /dev )Aug 16, 2023 287 browsers , google , chrome , http , tls Sophisticated, Highly-Targeted Attacks Continue to Plague npm Aug 12, 2023 286 npm An Update on Chrome Security Updates—Shipping Security Fixes to You Faster Aug 8, 2023 285 browsers , google , chrome Tuesday, August 8, 2023 Security Releases (raf /nod )Jul 31, 2023 284 release-notes , nodejs SECURITY.md: Should I Have It? (mry /ecl )Jul 31, 2023 283 documentation Publishing With npm Provenance From Private Source Repositories Is No Longer Supported (git )Jul 26, 2023 282 github , npm , provenance , foss Social Engineering Campaign Targeting Tech Employees Spreading Through npm Malware (soc )Jul 25, 2023 281 malware , npm Securing the Web Forward: Addressing Developer Concerns in Web Security (tor /w3c )Jul 24, 2023 280 web , surveys Encoding: A Brief History and Its Role in Cybersecurity Jul 19, 2023 279 encoding , unicode , history User Input Sanitization and Validation: Securing Your App Jul 19, 2023 278 sanitization , validation , conformance Node.js Security Progress Report—17 Reports Closed (ope )Jul 17, 2023 277 nodejs The Importance of Verifying Webhook Signatures Jun 29, 2023 276 webhooks The Massive Bug at the Heart of the npm Ecosystem Jun 27, 2023 275 npm , dependencies , bugs All You Need to Know About CORS and CORS Errors Jun 23, 2023 274 cors , errors Understanding Authorization Before Authentication: Enhancing Web API Security Jun 23, 2023 273 authorization , authentication , apis , comparisons An Introduction to Command Injection Vulnerabilities in Node.js and JavaScript Jun 23, 2023 272 introductions , vulnerabilities , nodejs , javascript Django: A Security Improvement Coming to “format_html()” (ada )Jun 15, 2023 271 django , html Tuesday, June 20, 2023 Security Releases (raf /nod )Jun 13, 2023 270 release-notes , nodejs security.txt Now Mandatory for Dutch Government Websites May 31, 2023 269 legal File Upload Security and Malware Protection (aus )May 23, 2023 268 malware , file-handling , edge-computing Security Implications of HTTP Response Headers May 3, 2023 267 http , http-headers The Case Against Automatic Dependency Updates (ben )Apr 21, 2023 266 dependencies , automation , ci-cd , maintenance Automating Dependency Updates: The Big Debate Apr 21, 2023 265 dependencies , automation , ci-cd Generating Provenance Statements Apr 19, 2023 264 npm , provenance Introducing npm Package Provenance (git )Apr 19, 2023 263 introductions , github , npm , provenance , foss 8 Best Tools for Cryptography and Encryption (sta )Apr 18, 2023 262 link-lists , tooling , comparisons , cryptography , encryption , privacy Dissecting npm Malware: Five Packages and Their Evil Install Scripts Apr 15, 2023 261 npm , malware Passkeys: What the Heck and Why? (css )Apr 12, 2023 260 passkeys Senior Engineering Strategies for Advanced React and TypeScript (tec )Mar 25, 2023 259 strategies , react , typescript , architecture , testing , performance , accessibility , maintenance Cryptographically Protecting Your SPA Mar 17, 2023 258 single-page-apps , cryptography Without Accessibility, There Is No Privacy or Security Feb 28, 2023 257 accessibility , privacy Tips for Handling Dependabot, CodeQL, and Secret Scanning Alerts Feb 28, 2023 256 alerting , dependabot , tips-and-tricks How to Password-Protect a Static HTML Page With No JS (ede )Feb 20, 2023 255 how-tos , css , fonts SSL Certificates Explained Feb 20, 2023 254 videos , certificates , ssl , protocols Quick Tip: How to Hash a Password in PHP Feb 14, 2023 253 how-tos , php , passwords , tips-and-tricks Sandboxing JavaScript Code Feb 12, 2023 252 javascript Unlocking Security Updates for Transitive Dependencies With npm (git )Jan 19, 2023 251 npm , dependencies , maintenance 7 Required Steps to Secure Your Iframes Security Jan 4, 2023 250 iframes , xss , html , http-headers , csp Conditional API Responses for JavaScript vs. HTML Forms (aus )Jan 3, 2023 249 javascript , html , forms , comparisons Why Do We Need Authorization and Authentication? Dec 30, 2022 248 authorization , authentication The Top 10 Security Vulnerabilities for Web Applications Dec 20, 2022 247 vulnerabilities , web-apps Leaked a Secret? Check Your GitHub Alerts… for Free (git )Dec 15, 2022 246 github DOM Clobbering (fre /mat )Dec 12, 2022 245 dom New npm Features for Secure Publishing and Safe Consumption (git )Dec 6, 2022 244 npm , dependencies Using SRI to Protect From Malicious JavaScript (mat )Dec 3, 2022 243 javascript WordPress Versions 3.7–4.0 No Longer Get Security Updates (sar )Nov 30, 2022 242 wordpress “Not Secure” Warning for IE Mode Nov 16, 2022 241 browsers , microsoft , edge , internet-explorer Node.js Security Best Practices (nod )Nov 10, 2022 240 nodejs , best-practices npm Security: Preventing Supply Chain Attacks Nov 7, 2022 239 npm , dependencies Secure JavaScript URL Validation Oct 17, 2022 238 javascript , validation , urls Create a Passkey for Passwordless Logins (age /dev )Oct 12, 2022 237 authentication , passkeys Designing a Secure API Oct 4, 2022 236 software-design , apis Phylum Detects Active Typosquatting Campaign Targeting npm Developers Oct 2, 2022 235 npm , dependencies Security (htt )Sep 26, 2022 234 web-almanac , studies , research , metrics Continue Using .env Files as Usual Sep 24, 2022 233 environments Quick Reminder: HTML5 “required” and “pattern” Are Not a Security Feature (cod )Sep 22, 2022 232 html , forms Stop Using .env Files Now Sep 19, 2022 231 environments Debunking Myths About HTTPS Sep 18, 2022 230 http , myths Secure Your Node.js App With JSON Web Tokens (app )Sep 14, 2022 229 nodejs , json-web-tokens Dependabot Unlocks Transitive Dependencies for npm Projects (git )Sep 7, 2022 228 dependencies , npm , dependabot JavaScript Bugs Aplenty in Node.js Ecosystem—Found Automatically Aug 30, 2022 227 studies , research , nodejs , javascript , dependencies , quality , bugs Introducing Even More Security Enhancements to npm (git )Jul 26, 2022 226 introductions , npm Top 5 npm Vulnerability Scanners Jul 20, 2022 225 npm , vulnerabilities , tooling What Is Passwordless Authentication and How to Implement It Jul 18, 2022 224 authentication , passwords GA4 Is Being Blocked by Content Security Policy Jun 25, 2022 223 csp , metrics , google Please Remove That .git Folder Jun 22, 2022 222 git Should I Have Separate GitHub Accounts for Personal and Professional Projects? Jun 14, 2022 221 discussions , github , career Understanding CSRF Attacks (zel )May 29, 2022 220 csrf npm Security Update: Attack Campaign Using Stolen OAuth Tokens (git )May 26, 2022 219 oauth , version-control , npm , github Snyk Finds 200+ Malicious npm Packages, Including Cobalt Strike Dependency Confusion Attacks May 24, 2022 218 javascript , npm , dependencies Unexpectedly HTTPS? May 16, 2022 217 http How to Respond to Growing Supply Chain Security Risks? Apr 3, 2022 216 how-tos , dependencies , nodejs , npm The Web Is for Everyone: Our Vision for the Evolution of the Web (moz )Mar 23, 2022 215 web , outlooks , privacy , accessibility , performance , user-experience Using HTTPS in Your Development Environment Mar 7, 2022 214 http , environments How to Prevent SQL Injection Attacks in Node.js Mar 3, 2022 213 how-tos , nodejs , databases , sql Can You Get Pwned With CSS? Feb 23, 2022 212 css How to Fix Your Security Vulnerabilities With npm Override Feb 23, 2022 211 how-tos , vulnerabilities , npm , dependencies Never, Ever, Ever Use Pixelation for Redacting Text Feb 15, 2022 210 content , images , obfuscation Accessibly Insecure Jan 31, 2022 209 accessibility Lessons Learned From Publishing a Content Security Policy Dec 14, 2021 208 lessons , csp Ain’t No Party Like a Third Party (ada /css )Dec 3, 2021 207 dependencies , embed-code Security (htt )Dec 1, 2021 206 web-almanac , studies , research , metrics GitHub’s Commitment to npm Ecosystem Security (git )Nov 15, 2021 205 github , npm Understanding and Implementing OAuth2 in Node.js (hon )Oct 18, 2021 204 nodejs , authorization , oauth How to Win at CORS (jaf )Oct 12, 2021 203 how-tos , cors , html , http The Options for Password-Revealing Inputs (chr /css )Oct 6, 2021 202 html , css , passwords , usability npm Security Best Practices (owa )Aug 3, 2021 201 npm , best-practices Encoding Data for POST Requests (jaf )Jun 30, 2021 200 javascript , encoding NPM Global Audit Jun 16, 2021 199 packages , npm , quality , auditing Understanding and Preventing Common Security Vulnerabilities Jun 15, 2021 198 vulnerabilities Open Source Insights Jun 3, 2021 197 websites , foss , dependencies , licensing I Learned to Love the Same-Origin Policy (eee /css )Dec 17, 2020 196 cors Is Edge Computing Secure? Here Are 4 Security Risks to Be Aware Of Dec 9, 2020 195 edge-computing TLS and mTLS Demystified Dec 9, 2020 194 tls , protocols Best Practices for Inclusive Textual Websites Nov 23, 2020 193 performance , accessibility , best-practices Clickjacking Attacks and How to Prevent Them Oct 30, 2020 192 how-tos How to Safely Use GitHub Actions in Organizations (nza )Jul 21, 2020 191 how-tos , github-actions What Is mTLS and How Does It Work? Apr 30, 2020 190 Mutual TLS: Stuff You Should Know Mar 19, 2020 189 tls , protocols Don’t Try to Sanitize Input—Escape Output Feb 27, 2020 188 sanitization , escaping Encrypting DNS Query Bad for Performance? (erw )Feb 20, 2020 187 performance , dns , http , encryption Apple Joins FIDO Alliance, Commits to Getting Rid of Passwords (zdn )Feb 12, 2020 186 apple , fido , passwords , authentication How to Automatically Update Your JavaScript Dependencies (spa /clo )Jan 30, 2020 185 how-tos , javascript , dependencies , automation , processes What SSL Is, and Which Certificate Type Is Right for You Jan 29, 2020 184 ssl , certificates , privacy , concepts Usability and Security; Better Together (24w )Dec 22, 2019 183 usability , user-experience Server-Side Includes (SSI) Injection (owa )Dec 4, 2019 182 ssi How Internet Security Works: TLS, SSL, and CA (osd )Nov 18, 2019 181 tls , ssl , protocols , certificates Security and Privacy for Our Times (luk /w3c )Sep 11, 2019 180 privacy , web-platform Web Feature Developers Told to Dial Up Attention on Privacy and Security (rip /tec )Sep 11, 2019 179 w3c , privacy , web-platform CSS Security Vulnerabilities (chr /css )Sep 9, 2019 178 css , privacy , vulnerabilities Understanding Subresource Integrity (dre /sma )Apr 9, 2019 177 hashing , embed-code W3C Strategic Highlights: Web for All (Security, Privacy, Identity) (w3c )Mar 18, 2019 176 w3c , privacy , authentication Guide to Web Authentication Jan 24, 2019 175 websites , authentication , webauthn , javascript It’s Beginning to Look a Lot Like XSSmas (24w )Dec 17, 2018 174 vulnerabilities , csrf , xss Protecting Your Site With Feature Policy (rac /sma )Dec 12, 2018 173 http-headers , http AWS Security Guide: 7 Best Practices to Avoid Security Risks (wom )Oct 31, 2018 172 guides , aws , best-practices WebAuthn, FIDO2 Infuse Browsers, Platforms With Strong Authentication (dar )Sep 19, 2018 171 w3c , fido , authentication , webauthn , browsers In Your Face, Passwords: Big Three Browsers All Adopt Authentication API Aug 1, 2018 170 authentication , webauthn , apis , edge , microsoft , chrome , google , firefox , mozilla , browsers HTTPS Is Easy (tro )Jun 27, 2018 169 websites , http WordPress Security as a Process (sma )Jun 21, 2018 168 wordpress , processes Making Your Website Faster and Safer With Cloudflare Jun 12, 2018 167 performance , caching , cloudflare Validating Dependencies in the Project With npm-check and depcheck Jun 1, 2018 166 dependencies , maintenance , auditing , tooling , npm Third Party CSS Is Not Safe (jaf )Feb 27, 2018 165 html , css , embed-code Attackers Can Steal Sensitive Data by Abusing CSS—CSS Exfil Vulnerability Feb 7, 2018 164 css , csp Building Secure JavaScript Applications Jan 18, 2018 163 javascript , xss , csrf , json-web-tokens , passwords Creating Secure Password Resets With JSON Web Tokens (sma )Nov 9, 2017 162 passwords , json-web-tokens , nodejs The Complete Guide to Switching From HTTP to HTTPS (sma )Jun 12, 2017 161 guides , http How (Not) to Control Your CDN (mno )Jun 7, 2017 160 content-delivery , caching , http How to Secure WordPress With SSL May 10, 2017 159 how-tos , wordpress , ssl Encrypting IP Addresses (ber )May 7, 2017 158 ip , network , privacy , encryption How to Secure Your Web App With HTTP Headers (sma )Apr 3, 2017 157 how-tos , web-apps , http , http-headers , csp Just Another HTTPS Nudge (chr /css )Mar 3, 2017 156 http On EME in HTML5 (tim /w3c )Feb 28, 2017 155 eme , drm , html , legal , standards , w3c Using SSH Securely (ann )Jan 24, 2017 154 ssh More Than 300 Federal Gov Websites Fail to Meet Domain Encryption Deadline Jan 4, 2017 153 http , tls , protocols , encryption Content Security Policy Level 2 (mik +/w3c )Dec 15, 2016 152 standards , csp A Checklist for Website Reviews (hcr )Dec 5, 2016 151 checklists , performance , browsers , seo , accessibility Content Security Policy, Your Future Best Friend (sma )Sep 12, 2016 150 csp , link-lists A Refined Content Security Policy (web )Aug 5, 2016 149 html , csp , webkit , safari , apple , browsers The Performance Benefits of “rel=noopener” (jaf )Jul 21, 2016 148 html , links , performance Web Platform Security Boundaries (ann )Jun 24, 2016 147 web-platform Subresource Integrity (dev +/w3c )Jun 23, 2016 146 hashing , html , standards W3C Looks to Secure the Web (sdt )Feb 17, 2016 145 w3c , authentication Distribution Packages Considered Insecure Feb 13, 2016 144 dependencies , unix-like The Current State of Web Security (An Interview With Anselm Hannemann) (hel +/css )Jan 18, 2016 143 interviews , http , ssl , tls , encryption , cloudflare , lets-encrypt Eliminating Known Vulnerabilities With Snyk (sma )Jan 13, 2016 142 vulnerabilities , tooling 10 Web Predictions for 2016 (cra )Jan 6, 2016 141 web , outlooks , site-generators , browsers , css , mobile , performance , webassembly , seo HSTS and “Let’s Encrypt” (tka )Jan 4, 2016 140 http , http-headers , ssl , lets-encrypt An in-Depth Look at CORS Dec 17, 2015 139 cors , javascript , php Indexing HTTPS Pages by Default Dec 17, 2015 138 google , search , http Why Passwordless Authentication Works (cra )Nov 10, 2015 137 authentication , passwords Introduction to TLS and SSL (ope )Aug 22, 2015 136 introductions , tls , ssl , protocols , certificates A Simple Developer Error Is Exposing Private Information on Thousands of Websites (owe )Jul 27, 2015 135 version-control , git , mistakes , vulnerabilities More Tips to Further Secure WordPress (eli )Jul 9, 2015 134 wordpress , tips-and-tricks , plugins Improving Web Security With the Content Security Policy Jun 24, 2015 133 csp , http Deprecating HTTP May 11, 2015 132 http , protocols , deprecation Mozilla Wants to Deprecate Non-Secure HTTP, Will Make Proposals to W3C “Soon” (epr /ven )Apr 30, 2015 131 mozilla , http , deprecation Want Fancy Firefox Features? Secure Your Website (sts /cne )Apr 14, 2015 130 firefox , mozilla , browsers , http WordPress Front End Security: CSRF and Nonces (css )Mar 24, 2015 129 wordpress , csrf Introduction to WordPress Front End Security: Escaping the Things (css )Mar 23, 2015 128 introductions , wordpress , escaping What Are the Security Risks of HTML5 Apps? Mar 18, 2015 127 web-apps , sanitization Moving to HTTPS on WordPress (chr /css )Mar 6, 2015 126 wordpress , http Same-Origin Policy (ann )Feb 23, 2015 125 cors , web-platform Securing the Web (w3c )Jan 23, 2015 124 web-platform HTTPS as a Ranking Signal (met )Aug 7, 2014 123 google , search , http , seo mXSS (gaz )May 6, 2014 122 xss , html It’s Time to Encrypt the Entire Internet (kli /wir )Apr 17, 2014 121 web , http , ssl , encryption 3 Tips to Find Hacking on Your Site, and Ways to Prevent and Fix It Feb 28, 2014 120 search , google , tips-and-tricks Cross-Origin Resource Sharing (ann /w3c )Jan 16, 2014 119 cors , standards Despite Automatic Updates, Old Browsers Are Still a Problem (edb /zdn )Jan 6, 2014 118 browsers , web-platform , chrome , google , firefox , mozilla , internet-explorer , microsoft , safari , apple Cross-Origin Resource Sharing on Track to Become a W3C Recommendation (sdt )Jan 3, 2014 117 w3c , cors , standards Bid to Kill CAPTCHA Security Test Gains Momentum Aug 5, 2013 116 captcha , accessibility We Should All Have Something to Hide Jun 12, 2013 115 privacy Mobile Website Security May 14, 2013 114 mobile , hosting , policies WordPress Security Tips Apr 17, 2013 113 wordpress , tips-and-tricks Brad Hill: “HTML5 Security Realities” (chr /css )Feb 22, 2013 112 slides , xss , html Bulletproof Your Drupal Website Jan 21, 2013 111 drupal Top 10 PHP Security Vulnerabilities Oct 15, 2012 110 php , vulnerabilities A Front End Engineer’s Manifesto (zac )Aug 24, 2012 109 websites , manifestos , user-experience , progressive-enhancement , simplicity , foss , accessibility , community , learning A JavaScript Security Flaw Aug 9, 2012 108 javascript The Secure Programmer’s Pledge Jul 16, 2012 107 manifestos An Introduction to Content Security Policy (mik /dev )Jun 15, 2012 106 introductions , csp Cross-Site Scripting Attacks (XSS) Apr 30, 2012 105 xss , examples How to Secure Your WordPress Website (sma )Nov 10, 2011 104 how-tos , wordpress , link-lists Using CORS (dev )Oct 26, 2011 103 cors Some Notes on the Recent XML Encryption Attack (w3c )Oct 24, 2011 102 xml , encryption XML Encryption Flaw Leaves Web Services Vulnerable (eur )Oct 24, 2011 101 web-services , xml , encryption Notes From Writing HTML5 Media (bur )Jul 19, 2011 100 html , multimedia HTTPS Is More Secure, So Why Isn’t the Web Using It? (ars )Mar 20, 2011 99 http , protocols , web Web Cryptography: Salted Hash and Other Tasty Dishes (ali )Feb 22, 2011 98 cryptography What Are the JSON Security Concerns in Web Development? (sim )Jan 6, 2011 97 json What Is Cross Site Scripting or XSS? (chr /css )Nov 19, 2010 96 xss , javascript , concepts Web Developers Accountable for HTML 5 Security Oct 5, 2010 95 html HTML5 Raises New Security Issues Aug 20, 2010 94 html , browsers 10 Useful WordPress Security Tweaks (sma )Jul 1, 2010 93 wordpress Web Security: Are You Part of the Problem? (cod /sma )Jan 14, 2010 92 vulnerabilities , php , javascript Full Frontal ’09: Chris Heilmann on JavaScript Security (mic /aja )Nov 20, 2009 91 javascript Cookies and Security (nza )May 12, 2009 90 cookies , xss , csrf Finally Something to Get a Few More Users Off of IE 6? (dal /aja )Dec 17, 2008 89 internet-explorer , microsoft , browsers The Internet Is Closing to Innovation (zit /new )Nov 28, 2008 88 web You Could Be Getting Clickjacked (tec )Nov 21, 2008 87 vulnerabilities , frames , w3c Video and Audio Tags and Cross Origin Access (dal /aja )Nov 10, 2008 86 html , multimedia Dumb Security Tips: Think Before You Follow Online Guides (tan )Oct 26, 2008 85 tips-and-tricks Alerting Webmasters to Webserver Vulnerabilities Oct 16, 2008 84 google Simon Willison, @Media Ajax (mic /aja )Sep 16, 2008 83 ajax , xss , csrf , javascript , json Frame-Busting Gadgets (mic )Sep 16, 2008 82 frames , iframes Evil GIFs: Hiding Java in Your Image (dal /aja )Jul 4, 2008 81 gif , images , java What’s in a “window.name”? (cod /aja )May 13, 2008 80 javascript Internet Explorer 8 Promises Better Standards Compliance… and a Whole Lot More (est /cio )Mar 6, 2008 79 internet-explorer , microsoft , browsers , standards Ajaxian Roundup for January 2008: JavaScript Turtles and IE 8 (dal /aja )Feb 2, 2008 78 javascript , prototypejs , dojo , extjs , jquery , gwt , yui , dwr , gears , flash , air , json , browsers , standards , css , design , comet , ajaxian , link-lists Book Recommendation: AJAX Security by Hoffman and Sullivan Jan 16, 2008 77 books , ajax , javascript Ajaxian Roundup for December 2007: It’s the End of the Year as We Know It (dal /aja )Jan 1, 2008 76 browsers , javascript , prototypejs , extjs , yui , jquery , microsoft , dwr , performance , gwt , comet , css , mobile , ajaxian , link-lists Cross Site Scripting Joy (tri )Dec 4, 2007 75 xss Making JavaScript Safe With No Script (dal /aja )Nov 8, 2007 74 javascript Automated Security Scanners Choke on AJAX (rey /aja )Oct 8, 2007 73 ajax , javascript Quick Security Checklist for Webmasters Sep 18, 2007 72 checklists How to Protect a JSON or JavaScript Service Apr 4, 2007 71 how-tos , json , javascript Securing Your JSON Mar 13, 2007 70 json , javascript , arrays CSRF Protection Idea (dal /aja )Feb 8, 2007 69 csrf JavaScript Security Experiments (mar )Feb 7, 2007 68 javascript , experiments Security vs. Usability (nza )Jan 19, 2007 67 usability Prepare for Attack—Making Your Web Applications More Secure Jan 16, 2007 66 web-apps , sql , xss , examples JSON vs. XML: Browser Security Model (car )Jan 2, 2007 65 browsers , json , xml , comparisons The Dangers of Cross-Domain AJAX With Flash (shi )Sep 24, 2006 64 ajax , javascript , flash DOM vs. Web (mno )Apr 20, 2006 63 http , dom AJAX: Is Your Application Secure Enough? Apr 5, 2006 62 ajax , javascript , web-apps AJAX, XHR, JavaScript, and Cross Domain Security Story Dec 30, 2005 61 ajax , javascript Top 7 PHP Security Blunders Dec 21, 2005 60 php , databases , sql How to Make “XMLHttpRequest” Calls to Another Server in Your Domain Nov 28, 2005 59 how-tos , javascript IE Frame Bug (dal /aja )Jun 21, 2005 58 internet-explorer , microsoft , browsers , frames Validate Your Input! May 9, 2005 57 validation JavaScript Security Oct 4, 2004 56 javascript File Upload Security (lac )Sep 8, 2004 55 html , file-handling Spot the Security Hole Jul 3, 2004 54 php JavaScript and Security (sim )Apr 19, 2004 53 javascript Handling Content From Strangers Mar 26, 2004 52 content Web Services Security Gets Serious Apr 23, 2003 51 web-services Getting Started With XML Security Nov 28, 2002 50 introductions , xml Sorting Out the Web Services Security Landscape (tec )Aug 28, 2002 49 web-services , ssl , w3c Website Experience Analyzer Dec 11, 2022 48 tools , analysis , performance , user-experience Server Port Scanner Dec 11, 2022 47 tools , analysis , network , servers Abuse Contact Lookup Dec 11, 2022 46 tools , analysis , policies Content Security Policy Validator (CSP Validator) Dec 11, 2022 45 tools , analysis , csp , conformance Content Security Policy Validator (Google) Dec 11, 2022 44 tools , analysis , csp , conformance Cookie Use Checker Dec 11, 2022 43 tools , analysis , cookies Cross-Site WebSocket Hijacking Tester Dec 11, 2022 42 tools , analysis DNSSEC Checker Dec 11, 2022 41 tools , analysis , dns Domain or IP Spam Checker Dec 11, 2022 40 tools , analysis , domains , ip Email Blacklist Checker Dec 11, 2022 39 tools , analysis , email Malware and Security Scanner Dec 11, 2022 38 tools , analysis Site and Origin Comparer Dec 11, 2022 37 tools , analysis , comparisons SPF Record Checker Dec 11, 2022 36 tools , analysis , dns , domains SSL Checker (Qualys) Dec 11, 2022 35 tools , analysis , ssl , certificates SSL Checker (SSL Shopper) Dec 11, 2022 34 tools , analysis , ssl , certificates Virus Scanner Dec 11, 2022 33 tools , analysis Website Certificate Fingerprint Checker Dec 11, 2022 32 tools , analysis , certificates Website Headers Analyzer (Mozilla) (moz )Dec 11, 2022 31 tools , analysis , http , http-headers Website Headers Analyzer (Security Headers) Dec 11, 2022 30 tools , analysis , http , http-headers Website Scam Checker Dec 11, 2022 29 tools , analysis Website Security Checker (Google) Dec 11, 2022 28 tools , analysis Website Security Checker (Norton) Dec 11, 2022 27 tools , analysis AES Encrypter and Decrypter Dec 11, 2022 26 tools , exploration , encryption Blowfish Hash Generator Dec 11, 2022 25 tools , exploration , hashing Browser Fingerprint Checker Dec 11, 2022 24 tools , exploration , browsers “chmod” Calculator Dec 11, 2022 23 tools , exploration , permissions CSR Decoder Dec 11, 2022 22 tools , exploration Device Vulnerability Checker Dec 11, 2022 21 tools , exploration , vulnerabilities Executable File Analyzer Dec 11, 2022 20 tools , exploration Hash Generator Dec 11, 2022 19 tools , exploration , hashing HMAC Checker Dec 11, 2022 18 tools , exploration MD5 Hash Generator Dec 11, 2022 17 tools , exploration , hashing Password Generator (Arantius.com) Dec 11, 2022 16 tools , exploration , passwords Password Generator (Frontend Dogma) (fro )Dec 11, 2022 15 tools , exploration , frontend-dogma , passwords Password Generator (Gibson Research Corporation) Dec 11, 2022 14 tools , exploration , passwords Password Security Checker and Generator Dec 11, 2022 13 tools , exploration , passwords Password Security Checker Dec 11, 2022 12 tools , exploration , passwords Security Leak Victim Checker Dec 11, 2022 11 tools , exploration SHA-512 Hash Generator Dec 11, 2022 10 tools , exploration , hashing SPF Record Generator Dec 11, 2022 9 tools , exploration , dns , domains SSL Client Checker Dec 11, 2022 8 tools , exploration , ssl , tls Subresource Integrity Hash Generator (moz )Dec 11, 2022 7 tools , exploration , hashing User Identity Generator Dec 11, 2022 6 tools , exploration , placeholders , randomness Website Headers Analyzer (Dries Buytaert) (dri )Jan 4, 2023 5 tools , analysis , http , http-headers WebRTC and IP Address Leak Checker Aug 30, 2023 4 tools , exploration , network , webrtc , ip , protocols security.txt Generator Oct 25, 2023 3 tools , exploration , content