Frontend Dogma

“security” Archive

Subtopics: , , , , ,  (non-exhaustive) · glossary look-up: “security”

Featured on Frontend Dogma? Confirm and whitelist your domain.

  1. Developer Guide: How to Implement Passkeys (via) · · , , ,
  2. Avoid Hotlinking Images With “Cross-Origin-Resource-Policy” · ·
  3. Content Security Policy Level 3 (by/via) · · ,
  4. Security (by+/via) · · , , ,
  5. JavaScript Import Attributes (ES2025) (by) · ·
  6. Exploring Internet Traffic Shifts and Cyber Attacks During the 2024 US Election (by+/via) · ·
  7. Securing Your Express REST API With Passport.js (by/via) · · , , , ,
  8. SecretLint—a Linter for Preventing Committing Credentials (by) · · ,
  9. The Importance of UX in Cybersecurity (by/via) · · ,
  10. Top 4 Web Vulnerabilities With Example and Mitigation (by/via) · · , ,
  11. Understanding “npm audit” and Fixing Vulnerabilities (by) · · , ,
  12. How to Implement Content Security Policy (CSP) Headers for Astro (by) · · , , , , , ,
  13. Why Code Security Matters—Even in Hardened Environments (via) · · , ,
  14. Database 101: SSL/TLS for Beginners (by/via) · · , , , ,
  15. Cloudflare Study: 39% of Companies Losing Control of Their IT and Security Environment (by) · · , ,
  16. NIST Recommends Some Common-Sense Password Rules (by) · · ,
  17. I Finally Understand OAuth · · , ,
  18. Fake GitHub Site Targeting Developers (by/via) · ·
  19. Hacking Cars in JavaScript (Running Replay Attacks in the Browser With the HackRF) (by) · ·
  20. Gaining Access to Anyone’s Browser Without Them Even Visiting a Website (by) · · , ,
  21. 5 Wasm Use Cases for Frontend Development (by/via) · · , ,
  22. Migrating From Netlify to Cloudflare for AI Bot Protection (by) · · , , ,
  23. The Great npm Garbage Patch (via) · · , ,
  24. Frontend Security Checklist (by) · · ,
  25. Automated Ways to Security Audit Your Website · · , ,
  26. Secure Node.js Applications From Supply Chain Attacks (by/via) · · , ,
  27. The Pitfalls of In-App Browsers (via) · · , , ,
  28. The Cloud Run Security Gap You Didn’t Know You Had (and How to Fix It) (by) · · ,
  29. Supply Chain Security in npm—We Can Be Optimistic About the Future (by/via) · · , ,
  30. Script Integrity (by/via) · · ,
  31. Introducing the MDN HTTP Observatory (by/via) · · , ,
  32. WebAuthn: Enhancing Security With Minimal Effort (by/via) · ·
  33. Tuesday, July 2, 2024 Security Releases (via) · · ,
  34. RegreSSHion: Remote Unauthenticated Code Execution Vulnerability in OpenSSH Server (by/via) · · ,
  35. Polyfill Supply Chain Attack Embeds Malware in JavaScript CDN Assets (by/via) · ·
  36. Catching Compromised Cookies (by/via) · · ,
  37. Backdoor Slipped Into Multiple WordPress Plugins in Ongoing Supply-Chain Attack (by/via) · · ,
  38. The Hacking of Culture and the Creation of Socio-Technical Debt (by) · ·
  39. OAuth Authentication (by/via) · · , ,
  40. What Is Mixed Content? (by) · ·
  41. Researchers Uncover npm Registry Vulnerability to Cache Poisoning and DoS Attacks (by/via) · · , , ,
  42. How a Single Vulnerability Can Bring Down the JavaScript Ecosystem (by) · · , , , ,
  43. JavaScript Security: Simple Practices to Secure Your Frontend (by/via) · · , ,
  44. Manifesto for a Humane Web (by) · · , , , , , , ,
  45. Securing Client-Side JavaScript (by) · · ,
  46. Poor Express Authentication Patterns in Node.js and How to Avoid Them (by) · · , ,
  47. Passkeys: A Shattered Dream (by) · · ,
  48. Using Legitimate GitHub URLs for Malware (by) · ·
  49. When Security and Accessibility Clash: Why Are Banking Applications So Inaccessible? (by) · ·
  50. Open Source Security (OpenSSF) and OpenJS Foundations Issue Alert for Social Engineering Takeovers of Open Source Projects (by+/via) · ·
  51. Wednesday, April 10, 2024 Security Releases (by/via) · · ,
  52. Node.js Secure Coding: Mitigate and Weaponize Code Injection Vulnerabilities (by) · · , ,
  53. The Free Software Commons (by) · · ,
  54. The V8 Sandbox (by/via) · ·
  55. Wednesday, April 3, 2024 Security Releases (via) · · ,
  56. Using JSON Web Tokens With Node.js (by/via) · · , ,
  57. Building a Digital Fortress: How to Strengthen DNS Against DDoS Attacks? (via) · ·
  58. In-App Browsers Are Still a Privacy, Security, and Choice Problem (by/via) · · , ,
  59. How npm Install Scripts Can Be Weaponized: A Real-World Example of a Harmful npm Package (by/via) · · , ,
  60. Preventing SQL Injection Attacks in Node.js (via) · · , ,
  61. Wednesday, February 14, 2024 Security Releases (by+/via) · · ,
  62. How to Boost WordPress Security and Protect Your SEO Ranking (via) · · , ,
  63. Malicious npm Package Masquerades as Noblox.js, Targeting Roblox Users for Data Theft (by/via) · · ,
  64. Practice Safe DSD With “setHTMLUnsafe” (It’s Complicated) (by/via) · · , , ,
  65. Tuesday, February 6, 2024 Security Releases (by/via) · · ,
  66. JWT vs. Session Authentication (by/via) · · , ,
  67. GitHub, npm Registry Abused to Host SSH Key-Stealing Malware (via) · · , ,
  68. Deceptive Deprecation: The Truth About npm Deprecated Packages (by+/via) · · , ,
  69. Safely Accessing the DOM With Angular SSR (by/via) · · , , ,
  70. Node.js Security Progress Report—Progress on Permission Model, Fuzzer, and Connections With Community (via) · ·
  71. I Hate CORS (by) · · ,
  72. Building Multiple Progressive Web Apps on the Same Domain (by/via) · · , , ,
  73. Session-Based vs. Token-Based Authentication: Which Is Better? (by) · · , ,
  74. 10 Best Practices for Secure Code Review of Node.js Code (by) · · , ,
  75. Security Headers Using “<meta>” (by/via) · · ,
  76. Blind CSS Exfiltration: Exfiltrate Unknown Web Pages (by/via) · ·
  77. Mastering Cryptography Fundamentals With Node’s “crypto” Module (by) · · ,
  78. Secure Code Review Tips to Defend Against Vulnerable Node.js Code (by) · · ,
  79. Understanding CORS (by) · ·
  80. Secret Scanning Scans Public npm Packages (via) · · , ,
  81. What the !#@% Is a Passkey? (by/via) · ·
  82. Local HTTPS for Next.js 13.5 (by) · · , ,
  83. Understanding XSS Attacks (by/via) ·
  84. A Comprehensive Guide to the Dangers of Regular Expressions in JavaScript (by/via) · · , ,
  85. SSH Keys Stolen by Stream of Malicious PyPI and npm Packages (by/via) · · , ,
  86. Best Practices for Securing Node.js Applications in Production (by+/via) · · ,
  87. npm Provenance General Availability (via) · · , ,
  88. The WebP 0-Day (by) · · , ,
  89. Open Source Trends to Look for in 2024 (via) · · , , ,
  90. Securing Your Node.js Apps by Analyzing Real-World Command Injection Examples (by) · · , ,
  91. How to Implement SSL/TLS Pinning in Node.js (via) · · , , ,
  92. A More Intelligent and Secure Web (by/via) · · , , , ,
  93. Demystifying CORS: Understanding How Cross-Origin Resource Sharing Works · · ,
  94. Towards HTTPS by Default (by/via) · · , , , ,
  95. Sophisticated, Highly-Targeted Attacks Continue to Plague npm (via) · ·
  96. An Update on Chrome Security Updates—Shipping Security Fixes to You Faster (via) · · , ,
  97. Tuesday, August 8, 2023 Security Releases (by/via) · · ,
  98. Publishing With npm Provenance From Private Source Repositories Is No Longer Supported (via) · · , , ,
  99. Social Engineering Campaign Targeting Tech Employees Spreading Through npm Malware (via) · ·
  100. Securing the Web Forward: Addressing Developer Concerns in Web Security (by/via) · · ,
  101. User Input Sanitization and Validation: Securing Your App (by) · · , ,
  102. Encoding: A Brief History and Its Role in Cybersecurity (by/via) · · , ,
  103. Node.js Security Progress Report—17 Reports Closed (via) · ·
  104. The Importance of Verifying Webhook Signatures (via) · ·
  105. The Massive Bug at the Heart of the npm Ecosystem (by/via) · · ,
  106. Understanding Authorization Before Authentication: Enhancing Web API Security (by/via) · · , , ,
  107. An Introduction to Command Injection Vulnerabilities in Node.js and JavaScript (by) · · , , ,
  108. All You Need to Know About CORS and CORS Errors (by/via) · · ,
  109. Django: A Security Improvement Coming to “format_html()” (by) · · ,
  110. Tuesday, June 20, 2023 Security Releases (by/via) · · ,
  111. security.txt Now Mandatory for Dutch Government Websites · ·
  112. File Upload Security and Malware Protection (by) · · ,
  113. Security Implications of HTTP Response Headers (via) · · ,
  114. Introducing npm Package Provenance (by+/via) · · , , , ,
  115. Generating Provenance Statements (by/via) · · ,
  116. 8 Best Tools for Cryptography and Encryption (via) · · , , , ,
  117. Dissecting npm Malware: Five Packages and Their Evil Install Scripts (by/via) · ·
  118. Passkeys: What the Heck and Why? (by/via) · ·
  119. Cryptographically Protecting Your SPA (by) · · ,
  120. Without Accessibility, There Is No Privacy or Security (via) · · ,
  121. How to Password-Protect a Static HTML Page With No JS (by) · · , ,
  122. Quick Tip: How to Hash a Password in PHP (by/via) · · , , ,
  123. Sandboxing JavaScript Code (by) · ·
  124. Unlocking Security Updates for Transitive Dependencies With npm (by/via) · · , ,
  125. Conditional API Responses for JavaScript vs. HTML Forms (by) · · , , ,
  126. Why Do We Need Authorization and Authentication? · · ,
  127. The Top 10 Security Vulnerabilities for Web Applications (by/via) · · ,
  128. Leaked a Secret? Check Your GitHub Alerts… for Free (via) · ·
  129. DOM Clobbering (by/via) · ·
  130. New npm Features for Secure Publishing and Safe Consumption (by/via) · · ,
  131. Using SRI to Protect From Malicious JavaScript (by/via) · ·
  132. WordPress Versions 3.7–4.0 No Longer Get Security Updates (by/via) · ·
  133. “Not Secure” Warning for IE Mode (by) · · , , ,
  134. Node.js Security Best Practices (via) · · ,
  135. npm Security: Preventing Supply Chain Attacks (by/via) · · ,
  136. Secure JavaScript URL Validation (by/via) · · , ,
  137. Create a Passkey for Passwordless Logins (by/via) · · ,
  138. Designing a Secure API (by/via) · · ,
  139. Phylum Detects Active Typosquatting Campaign Targeting npm Developers (via) · · ,
  140. Security (by+/via) · · , , ,
  141. Continue Using .env Files as Usual (by) · ·
  142. Quick Reminder: HTML5 “required” and “pattern” Are Not a Security Feature (by) · · ,
  143. Stop Using .env Files Now (by) · ·
  144. Debunking Myths About HTTPS · · ,
  145. Secure Your Node.js App With JSON Web Tokens (by/via) · · ,
  146. Dependabot Unlocks Transitive Dependencies for npm Projects (via) · · ,
  147. JavaScript Bugs Aplenty in Node.js Ecosystem—Found Automatically (by/via) · · , , , , ,
  148. Introducing Even More Security Enhancements to npm (by+/via) · · ,
  149. Top 5 npm Vulnerability Scanners (via) · · , ,
  150. What Is Passwordless Authentication and How to Implement It (by/via) · · ,
  151. GA4 Is Being Blocked by Content Security Policy (by) · · , ,
  152. Please Remove That .git Folder · ·
  153. Should I Have Separate GitHub Accounts for Personal and Professional Projects? (via) · · , ,
  154. Understanding CSRF Attacks (by) ·
  155. npm Security Update: Attack Campaign Using Stolen OAuth Tokens (by/via) · · , , ,
  156. Snyk Finds 200+ Malicious npm Packages, Including Cobalt Strike Dependency Confusion Attacks (by/via) · · , ,
  157. Unexpectedly HTTPS? (by) · ·
  158. How to Respond to Growing Supply Chain Security Risks? (by) · · , , ,
  159. The Web Is for Everyone: Our Vision for the Evolution of the Web (by+/via) · · , , , , ,
  160. Using HTTPS in Your Development Environment (by/via) · · ,
  161. How to Prevent SQL Injection Attacks in Node.js (by/via) · · , , ,
  162. How to Fix Your Security Vulnerabilities With npm Override (via) · · , , ,
  163. Can You Get Pwned With CSS? (by) · ·
  164. Never, Ever, Ever Use Pixelation for Redacting Text (by/via) · · , ,
  165. Accessibly Insecure (by/via) · ·
  166. Lessons Learned From Publishing a Content Security Policy (via) · · ,
  167. CSS Fingerprinting (by) · · , ,
  168. Ain’t No Party Like a Third Party (by/via) · · ,
  169. Security (by+/via) · · , , ,
  170. GitHub’s Commitment to npm Ecosystem Security (by/via) · · ,
  171. Understanding and Implementing OAuth2 in Node.js (by/via) · · , ,
  172. How to Win at CORS (by) · · , , ,
  173. The Options for Password-Revealing Inputs (by/via) · · , , ,
  174. npm Security Best Practices (by/via) · · ,
  175. Encoding Data for POST Requests (by) · · ,
  176. NPM Global Audit · · , , ,
  177. Understanding and Preventing Common Security Vulnerabilities (via) · ·
  178. Open Source Insights (via) · · , , ,
  179. TLS and mTLS Demystified · · ,
  180. Is Edge Computing Secure? Here Are 4 Security Risks to Be Aware Of (via) · ·
  181. Best Practices for Inclusive Textual Websites (by) · · , ,
  182. What Is mTLS and How Does It Work? (by) ·
  183. Mutual TLS: Stuff You Should Know (by/via) · · ,
  184. Don’t Try to Sanitize Input—Escape Output (by) · · ,
  185. How to Automatically Update Your JavaScript Dependencies (by/via) · · , , , ,
  186. Usability and Security; Better Together (via) · · ,
  187. Understanding Subresource Integrity (by/via) · ·
  188. Guide to Web Authentication (by) · · , ,
  189. It’s Beginning to Look a Lot Like XSSmas (by/via) · ·
  190. Protecting Your Site With Feature Policy (by/via) · · ,
  191. AWS Security Guide: 7 Best Practices to Avoid Security Risks (via) · · , ,
  192. WordPress Security as a Process (by/via) · · ,
  193. Making Your Website Faster and Safer With Cloudflare (by/via) · · , ,
  194. Creating Secure Password Resets With JSON Web Tokens (by/via) · · , ,
  195. The Complete Guide to Switching From HTTP to HTTPS (via) · · ,
  196. How (Not) to Control Your CDN (by) · · , ,
  197. How to Secure WordPress With SSL (by/via) · · , ,
  198. How to Secure Your Web App With HTTP Headers (by/via) · · , , , ,
  199. Using SSH Securely (by) · ·
  200. Content Security Policy Level 2 (by+/via) · · ,
  201. Content Security Policy, Your Future Best Friend (by/via) · · ,
  202. A Refined Content Security Policy (via) · · , , , , ,
  203. Web Platform Security Boundaries (by) · ·
  204. Distribution Packages Considered Insecure · · ,
  205. Eliminating Known Vulnerabilities With Snyk (by/via) · · ,
  206. 10 Web Predictions for 2016 (by/via) · · , , , , , , , ,
  207. An in-Depth Look at CORS (by/via) · · , ,
  208. Why Passwordless Authentication Works (by/via) · · ,
  209. A Simple Developer Error Is Exposing Private Information on Thousands of Websites (by/via) · · , , ,
  210. More Tips to Further Secure WordPress (by/via) · · , ,
  211. Improving Web Security With the Content Security Policy (by/via) · · ,
  212. What Are the Security Risks of HTML5 Apps? (by/via) · · ,
  213. Same-Origin Policy (by) · · ,
  214. We Should All Have Something to Hide (by) · ·
  215. Mobile Website Security (by/via) · · , ,
  216. WordPress Security Tips (by/via) · · ,
  217. Bulletproof Your Drupal Website (via) · ·
  218. Top 10 PHP Security Vulnerabilities (via) · · ,
  219. A Front End Engineer’s Manifesto (by) · · , , , , , , , ,
  220. A JavaScript Security Flaw (by) · ·
  221. The Secure Programmer’s Pledge · ·
  222. An Introduction to Content Security Policy (by/via) · · ,
  223. Cross-Site Scripting Attacks (XSS) (by/via) · ·
  224. How to Secure Your WordPress Website (by/via) · · , ,
  225. Using CORS (by/via) · ·
  226. Web Cryptography: Salted Hash and Other Tasty Dishes (by/via) · ·
  227. 10 Useful WordPress Security Tweaks (by/via) · ·
  228. Web Security: Are You Part of the Problem? (by/via) · · , ,
  229. JavaScript Security Experiments (by) · · ,
  230. DOM vs. Web (by) · · ,
  231. Top 7 PHP Security Blunders (via) · · , ,
  232. Validate Your Input! (via) · ·
  233. JavaScript Security · ·
  234. File Upload Security (by) · · ,
  235. Spot the Security Hole (by/via) · ·
  236. JavaScript and Security (by/via) · ·
  237. Handling Content From Strangers (by/via) · ·
  238. Getting Started With XML Security (by/via) · · ,
  239. Site and Origin Comparer (via) · , ,
  240. Malware and Security Scanner (via) · ,
  241. Email Blacklist Checker (via) · , ,
  242. Domain or IP Spam Checker (via) · , ,
  243. DNSSEC Checker (via) · , ,
  244. Cross-Site WebSocket Hijacking Tester (by) · ,
  245. Cookie Use Checker (via) · , ,
  246. Content Security Policy Validator (Google) (via) · , , ,
  247. Content Security Policy Validator (CSP Validator) (by) · , , ,
  248. Abuse Contact Lookup (via) · , ,
  249. Server Port Scanner (via) · , , ,
  250. Website Experience Analyzer · , , ,