Frontend Dogma

“security” Archive

  1. Open Source Security (OpenSSF) and OpenJS Foundations Issue Alert for Social Engineering Takeovers of Open Source Projects · ·
  2. Wednesday, April 10, 2024 Security Releases · · ,
  3. The V8 Sandbox · ·
  4. Wednesday, April 3, 2024 Security Releases · · ,
  5. Using JSON Web Tokens With Node.js · · , ,
  6. Building a Digital Fortress: How to Strengthen DNS Against DDoS Attacks? · ·
  7. In-App Browsers Are Still a Privacy, Security, and Choice Problem · · , ,
  8. How npm Install Scripts Can Be Weaponized: A Real-World Example of a Harmful npm Package · · , ,
  9. Preventing SQL Injection Attacks in Node.js · · , ,
  10. Wednesday, February 14, 2024 Security Releases · · ,
  11. How to Boost WordPress Security and Protect Your SEO Ranking · · , ,
  12. Malicious npm Package Masquerades as Noblox.js, Targeting Roblox Users for Data Theft · · ,
  13. Practice Safe DSD With “setHTMLUnsafe” (It’s Complicated) · · , , ,
  14. Tuesday, February 6, 2024 Security Releases · · ,
  15. JWT vs. Session Authentication · · , ,
  16. GitHub, npm Registry Abused to Host SSH Key-Stealing Malware · · , ,
  17. Deceptive Deprecation: The Truth About npm Deprecated Packages · · , ,
  18. Safely Accessing the DOM With Angular SSR · · , , ,
  19. Node.js Security Progress Report—Progress on Permission Model, Fuzzer, and Connections With Community · ·
  20. I Hate CORS · · ,
  21. Building Multiple Progressive Web Apps on the Same Domain · · , ,
  22. Session-Based vs. Token-Based Authentication: Which Is Better? · · , ,
  23. 10 Best Practices for Secure Code Review of Node.js Code · · , ,
  24. Security Headers Using “<meta>” · · ,
  25. Blind CSS Exfiltration: Exfiltrate Unknown Web Pages · ·
  26. Mastering Cryptography Fundamentals With Node’s “crypto” Module · · ,
  27. Secure Code Review Tips to Defend Against Vulnerable Node.js Code · · ,
  28. Understanding CORS · ·
  29. Secret Scanning Scans Public npm Packages · · , ,
  30. What the !#@% Is a Passkey? · ·
  31. Local HTTPS for Next.js 13.5 · · , ,
  32. A Comprehensive Guide to the Dangers of Regular Expressions in JavaScript · · , ,
  33. SSH Keys Stolen by Stream of Malicious PyPI and npm Packages · · , ,
  34. Best Practices for Securing Node.js Applications in Production · · ,
  35. npm Provenance General Availability · · , ,
  36. The WebP 0-Day · · , ,
  37. Open Source Trends to Look for in 2024 · · , , ,
  38. Securing Your Node.js Apps by Analyzing Real-World Command Injection Examples · · , ,
  39. How to Implement SSL/TLS Pinning in Node.js · · , , ,
  40. A More Intelligent and Secure Web · · , , , ,
  41. Demystifying CORS: Understanding How Cross-Origin Resource Sharing Works · · ,
  42. Towards HTTPS by Default · · , , , ,
  43. Sophisticated, Highly-Targeted Attacks Continue to Plague npm · ·
  44. An Update on Chrome Security Updates—Shipping Security Fixes to You Faster · · , ,
  45. Tuesday, August 8, 2023 Security Releases · · ,
  46. Publishing With npm Provenance from Private Source Repositories Is No Longer Supported · · , , ,
  47. Social Engineering Campaign Targeting Tech Employees Spreading Through npm Malware · ·
  48. Securing the Web Forward: Addressing Developer Concerns in Web Security · · ,
  49. Encoding: A Brief History and Its Role in Cybersecurity · · , ,
  50. Node.js Security Progress Report—17 Reports Closed · ·
  51. The Importance of Verifying Webhook Signatures · ·
  52. The Massive Bug at the Heart of the npm Ecosystem · · ,
  53. All You Need to Know About CORS and CORS Errors · · ,
  54. Understanding Authorization Before Authentication: Enhancing Web API Security · · , , ,
  55. An Introduction to Command Injection Vulnerabilities in Node.js and JavaScript · · , ,
  56. Tuesday, June 20, 2023 Security Releases · · ,
  57. security.txt Now Mandatory for Dutch Government Websites · ·
  58. File Upload Security and Malware Protection · · ,
  59. Security Implications of HTTP Response Headers · ·
  60. Introducing npm Package Provenance · · , , ,
  61. Generating Provenance Statements · · ,
  62. 8 Best Tools for Cryptography and Encryption · · , , , ,
  63. Dissecting npm Malware: Five Packages and Their Evil Install Scripts · ·
  64. Passkeys: What the Heck and Why? · ·
  65. Cryptographically Protecting Your SPA · · ,
  66. Without Accessibility, There Is No Privacy or Security · · ,
  67. How to Password-Protect a Static HTML Page With No JS · · , ,
  68. Quick Tip: How to Hash a Password in PHP · · , , ,
  69. Sandboxing JavaScript Code · ·
  70. Unlocking Security Updates for Transitive Dependencies With npm · · , ,
  71. Conditional API Responses for JavaScript vs. HTML Forms · · , , ,
  72. Why Do We Need Authorization and Authentication? · · ,
  73. The Top 10 Security Vulnerabilities for Web Applications · ·
  74. Leaked a Secret? Check Your GitHub Alerts… for Free · ·
  75. DOM Clobbering · ·
  76. New npm Features for Secure Publishing and Safe Consumption · · ,
  77. Using SRI to Protect from Malicious JavaScript · ·
  78. WordPress Versions 3.7–4.0 No Longer Get Security Updates · ·
  79. “Not Secure” Warning for IE Mode · · , , ,
  80. Node.js Security Best Practices · · ,
  81. npm Security: Preventing Supply Chain Attacks · · ,
  82. Secure JavaScript URL Validation · · , ,
  83. Create a Passkey for Passwordless Logins · · ,
  84. Designing a Secure API · · ,
  85. Phylum Detects Active Typosquatting Campaign Targeting npm Developers · · ,
  86. Security · · ,
  87. Continue Using .env Files as Usual · ·
  88. Quick Reminder: HTML5 “required” and “pattern” Are Not a Security Feature · · ,
  89. Stop Using .env Files Now · ·
  90. Debunking Myths About HTTPS · ·
  91. Secure Your Node.js App With JSON Web Tokens · · ,
  92. Dependabot Unlocks Transitive Dependencies for npm Projects · · ,
  93. JavaScript Bugs Aplenty in Node.js Ecosystem—Found Automatically · · , , , , ,
  94. Introducing Even More Security Enhancements to npm · ·
  95. What Is Passwordless Authentication and How to Implement It · · ,
  96. GA4 Is Being Blocked by Content Security Policy · · , ,
  97. Please Remove That .git Folder · ·
  98. Should I Have Separate GitHub Accounts for Personal and Professional Projects? · · , ,
  99. Understanding CSRF Attacks ·
  100. npm Security Update: Attack Campaign Using Stolen OAuth Tokens · · , ,
  101. Snyk Finds 200+ Malicious npm Packages, Including Cobalt Strike Dependency Confusion Attacks · · , ,
  102. Unexpectedly HTTPS? · ·
  103. How to Respond to Growing Supply Chain Security Risks? · · , , ,
  104. The Web Is for Everyone: Our Vision for the Evolution of the Web · · , , , , ,
  105. Using HTTPS in Your Development Environment · · ,
  106. How to Prevent SQL Injection Attacks in Node.js · · , , ,
  107. How to Fix Your Security Vulnerabilities With npm Override · · , ,
  108. Can You Get Pwned With CSS? · ·
  109. Accessibly Insecure · ·
  110. Lessons Learned from Publishing a Content Security Policy · · ,
  111. CSS Fingerprinting · · , ,
  112. Ain’t No Party Like a Third Party · · ,
  113. Security · · ,
  114. GitHub’s Commitment to npm Ecosystem Security · · ,
  115. Understanding and Implementing OAuth2 in Node.js · ·
  116. How to Win at CORS · · , , ,
  117. The Options for Password-Revealing Inputs · · , , ,
  118. npm Security Best Practices · · ,
  119. Encoding Data for POST Requests · · ,
  120. NPM Global Audit · · , , ,
  121. Understanding and Preventing Common Security Vulnerabilities ·
  122. Open Source Insights · · , , ,
  123. Is Edge Computing Secure? Here Are 4 Security Risks to Be Aware Of · ·
  124. TLS and mTLS Demystified · · ,
  125. Best Practices for Inclusive Textual Websites · · , ,
  126. What Is mTLS and How Does It Work? ·
  127. Mutual TLS: Stuff You Should Know · · ,
  128. ASCII to Unicode Encoder and Decoder · , , , ,
  129. DNSSEC Checker · , ,
  130. Website Experience Analyzer · , , ,
  131. security.txt Generator · , ,
  132. WebRTC and IP Address Leak Checker · , , , ,
  133. User Identity Generator · , , ,
  134. Cross-Site WebSocket Hijacking Tester · ,
  135. Content Security Policy Validator (Google) · , , ,
  136. Content Security Policy Validator (CSP Validator) · , , ,
  137. Subresource Integrity Hash Generator · ,
  138. Website Headers Analyzer (Mozilla) · , ,
  139. MD5 Hash Generator · ,
  140. Email Blacklist Checker · , ,
  141. Website Headers Analyzer (Dries Buytaert) · , ,
  142. SSL Checker (SSL Shopper) · , ,
  143. SSL Checker (Qualys) · , ,
  144. Website Headers Analyzer (Security Headers) · , ,
  145. Password Security Checker · , ,
  146. “chmod” Calculator · , ,
  147. Website Security Checker (Google) · ,
  148. SPF Record Checker · ,
  149. Cookie Use Checker · , ,
  150. Password Generator (Frontend Dogma) · , ,
  151. SSL Client Checker · , ,
  152. Password Security Checker and Generator · , ,
  153. Password Generator (Gibson Research Corporation) · , ,
  154. Password Generator (Arantius.com) · , ,
  155. SPF Record Generator · , ,
  156. SHA-512 Hash Generator · ,
  157. Security Leak Victim Checker (Have I Been Pwned) · ,
  158. Security Leak Victim Checker (Hasso Plattner Institute) · ,
  159. HMAC Checker · ,
  160. Hash Generator · ,
  161. Executable File Analyzer · ,
  162. Device Vulnerability Checker · ,
  163. CSR Decoder · ,
  164. Browser Fingerprint Checker · , ,
  165. Blowfish Hash Generator · ,
  166. AES Encrypter and Decrypter · ,
  167. Domain or IP Spam Checker · , ,
  168. Server Port Scanner · , , ,
  169. Abuse Contact Lookup · , ,
  170. Website Security Checker (Norton) · ,
  171. Website Scam Checker · ,
  172. Website Privacy Checker · , ,
  173. Website Certificate Fingerprint Checker · ,
  174. Virus Scanner · ,
  175. Site and Origin Comparer · , ,
  176. Malware and Security Scanner · ,
  177. P3P Validator · , ,