Frontend Dogma

“security” Archive

(Need an explanation? Look for “security” at WebGlossary.info.)

  1. Security (by+/via) · · , , ,
  2. SecretLint—a Linter for Preventing Committing Credentials (by) · · ,
  3. Top 4 Web Vulnerabilities With Example and Mitigation (by/via) · · , ,
  4. Understanding “npm audit” and Fixing Vulnerabilities (by) · · , ,
  5. The Importance of UX in Cybersecurity (by/via) · · ,
  6. How to Implement Content Security Policy (CSP) Headers for Astro (by) · · , , , ,
  7. Why Code Security Matters—Even in Hardened Environments (via) · · , ,
  8. Database 101: SSL/TLS for Beginners (by/via) · · , , , ,
  9. Cloudflare Study: 39% of Companies Losing Control of Their IT and Security Environment (by) · · , ,
  10. NIST Recommends Some Common-Sense Password Rules (by) · · ,
  11. I Finally Understand OAuth · · , ,
  12. Fake GitHub Site Targeting Developers (by/via) · ·
  13. Hacking Cars in JavaScript (Running Replay Attacks in the Browser With the HackRF) (by) · ·
  14. Gaining Access to Anyone’s Browser Without Them Even Visiting a Website (by) · · , ,
  15. 5 Wasm Use Cases for Frontend Development (by/via) · · , ,
  16. The Great npm Garbage Patch (via) · · , ,
  17. Frontend Security Checklist (by) · · ,
  18. Automated Ways to Security Audit Your Website · · , ,
  19. Secure Node.js Applications From Supply Chain Attacks (by/via) · · , ,
  20. The Pitfalls of In-App Browsers (via) · · , , ,
  21. The Cloud Run Security Gap You Didn’t Know You Had (and How to Fix It) (by) · · ,
  22. Supply Chain Security in npm—We Can Be Optimistic About the Future (by/via) · · , ,
  23. Script Integrity (by/via) · · ,
  24. Introducing the MDN HTTP Observatory (by/via) · · , ,
  25. WebAuthn: Enhancing Security With Minimal Effort (by/via) · ·
  26. Tuesday, July 2, 2024 Security Releases (via) · · ,
  27. RegreSSHion: Remote Unauthenticated Code Execution Vulnerability in OpenSSH Server (by/via) · · ,
  28. Polyfill Supply Chain Attack Embeds Malware in JavaScript CDN Assets (by/via) · ·
  29. Catching Compromised Cookies (by/via) · · ,
  30. Backdoor Slipped Into Multiple WordPress Plugins in Ongoing Supply-Chain Attack (by/via) · · ,
  31. The Hacking of Culture and the Creation of Socio-Technical Debt (by) · ·
  32. OAuth Authentication (by/via) · · , ,
  33. What Is Mixed Content? (by) · ·
  34. Researchers Uncover npm Registry Vulnerability to Cache Poisoning and DoS Attacks (by/via) · · , , ,
  35. How a Single Vulnerability Can Bring Down the JavaScript Ecosystem (by) · · , , , ,
  36. JavaScript Security: Simple Practices to Secure Your Frontend (by/via) · · , ,
  37. Manifesto for a Humane Web (by) · · , , , , ,
  38. Securing Client-Side JavaScript (by) · · ,
  39. Poor Express Authentication Patterns in Node.js and How to Avoid Them (by) · · , ,
  40. Passkeys: A Shattered Dream (by) · · ,
  41. Using Legitimate GitHub URLs for Malware (by) · ·
  42. When Security and Accessibility Clash: Why Are Banking Applications So Inaccessible? (by) · ·
  43. Open Source Security (OpenSSF) and OpenJS Foundations Issue Alert for Social Engineering Takeovers of Open Source Projects (by+/via) · ·
  44. Wednesday, April 10, 2024 Security Releases (by/via) · · ,
  45. Node.js Secure Coding: Mitigate and Weaponize Code Injection Vulnerabilities (by) · · , ,
  46. The Free Software Commons (by) · · ,
  47. The V8 Sandbox (by/via) · ·
  48. Wednesday, April 3, 2024 Security Releases (via) · · ,
  49. Using JSON Web Tokens With Node.js (by/via) · · , ,
  50. Building a Digital Fortress: How to Strengthen DNS Against DDoS Attacks? (via) · ·
  51. In-App Browsers Are Still a Privacy, Security, and Choice Problem (by/via) · · , ,
  52. How npm Install Scripts Can Be Weaponized: A Real-World Example of a Harmful npm Package (by/via) · · , ,
  53. Preventing SQL Injection Attacks in Node.js (via) · · , ,
  54. Wednesday, February 14, 2024 Security Releases (by+/via) · · ,
  55. How to Boost WordPress Security and Protect Your SEO Ranking (via) · · , ,
  56. Malicious npm Package Masquerades as Noblox.js, Targeting Roblox Users for Data Theft (by/via) · · ,
  57. Practice Safe DSD With “setHTMLUnsafe” (It’s Complicated) (by/via) · · , , ,
  58. Tuesday, February 6, 2024 Security Releases (by/via) · · ,
  59. JWT vs. Session Authentication (by/via) · · , ,
  60. GitHub, npm Registry Abused to Host SSH Key-Stealing Malware (via) · · , ,
  61. Deceptive Deprecation: The Truth About npm Deprecated Packages (by+/via) · · , ,
  62. Safely Accessing the DOM With Angular SSR (by/via) · · , , ,
  63. Node.js Security Progress Report—Progress on Permission Model, Fuzzer, and Connections With Community (via) · ·
  64. I Hate CORS (by) · · ,
  65. Building Multiple Progressive Web Apps on the Same Domain (by/via) · · , ,
  66. Session-Based vs. Token-Based Authentication: Which Is Better? (by) · · , ,
  67. 10 Best Practices for Secure Code Review of Node.js Code (by) · · , ,
  68. Security Headers Using “<meta>” (by/via) · · ,
  69. Blind CSS Exfiltration: Exfiltrate Unknown Web Pages (by/via) · ·
  70. Mastering Cryptography Fundamentals With Node’s “crypto” Module (by) · · ,
  71. Secure Code Review Tips to Defend Against Vulnerable Node.js Code (by) · · ,
  72. Understanding CORS (by) · ·
  73. What the !#@% Is a Passkey? (by/via) · ·
  74. Secret Scanning Scans Public npm Packages (via) · · , ,
  75. Local HTTPS for Next.js 13.5 (by) · · , ,
  76. Understanding XSS Attacks (by/via) ·
  77. A Comprehensive Guide to the Dangers of Regular Expressions in JavaScript (by/via) · · , ,
  78. SSH Keys Stolen by Stream of Malicious PyPI and npm Packages (by/via) · · , ,
  79. Best Practices for Securing Node.js Applications in Production (by+/via) · · ,
  80. npm Provenance General Availability (via) · · , ,
  81. The WebP 0-Day (by) · · , ,
  82. Open Source Trends to Look for in 2024 (via) · · , , ,
  83. Securing Your Node.js Apps by Analyzing Real-World Command Injection Examples (by) · · , ,
  84. How to Implement SSL/TLS Pinning in Node.js (via) · · , , ,
  85. A More Intelligent and Secure Web (by/via) · · , , , ,
  86. Demystifying CORS: Understanding How Cross-Origin Resource Sharing Works · · ,
  87. Towards HTTPS by Default (by/via) · · , , , ,
  88. Sophisticated, Highly-Targeted Attacks Continue to Plague npm (via) · ·
  89. An Update on Chrome Security Updates—Shipping Security Fixes to You Faster (via) · · , ,
  90. Tuesday, August 8, 2023 Security Releases (by/via) · · ,
  91. Publishing With npm Provenance From Private Source Repositories Is No Longer Supported (via) · · , , ,
  92. Social Engineering Campaign Targeting Tech Employees Spreading Through npm Malware (via) · ·
  93. Securing the Web Forward: Addressing Developer Concerns in Web Security (by/via) · · ,
  94. User Input Sanitization and Validation: Securing Your App (by) · · , ,
  95. Encoding: A Brief History and Its Role in Cybersecurity (by/via) · · , ,
  96. Node.js Security Progress Report—17 Reports Closed (via) · ·
  97. The Importance of Verifying Webhook Signatures (via) · ·
  98. The Massive Bug at the Heart of the npm Ecosystem (by/via) · · ,
  99. Understanding Authorization Before Authentication: Enhancing Web API Security (by/via) · · , , ,
  100. An Introduction to Command Injection Vulnerabilities in Node.js and JavaScript (by) · · , , ,
  101. All You Need to Know About CORS and CORS Errors (by/via) · · ,
  102. Django: A Security Improvement Coming to “format_html()” (by) · · ,
  103. Tuesday, June 20, 2023 Security Releases (by/via) · · ,
  104. security.txt Now Mandatory for Dutch Government Websites · ·
  105. File Upload Security and Malware Protection (by) · · ,
  106. Security Implications of HTTP Response Headers (via) · ·
  107. Introducing npm Package Provenance (by+/via) · · , , , ,
  108. Generating Provenance Statements (by/via) · · ,
  109. 8 Best Tools for Cryptography and Encryption (via) · · , , , ,
  110. Dissecting npm Malware: Five Packages and Their Evil Install Scripts (by/via) · ·
  111. Passkeys: What the Heck and Why? (by/via) · ·
  112. Cryptographically Protecting Your SPA (by) · · ,
  113. Without Accessibility, There Is No Privacy or Security (via) · · ,
  114. How to Password-Protect a Static HTML Page With No JS (by) · · , ,
  115. Quick Tip: How to Hash a Password in PHP (by/via) · · , , ,
  116. Sandboxing JavaScript Code (by) · ·
  117. Unlocking Security Updates for Transitive Dependencies With npm (by/via) · · , ,
  118. Conditional API Responses for JavaScript vs. HTML Forms (by) · · , , ,
  119. Why Do We Need Authorization and Authentication? · · ,
  120. The Top 10 Security Vulnerabilities for Web Applications (by/via) · · ,
  121. Leaked a Secret? Check Your GitHub Alerts… for Free (via) · ·
  122. DOM Clobbering (by/via) · ·
  123. New npm Features for Secure Publishing and Safe Consumption (by/via) · · ,
  124. Using SRI to Protect From Malicious JavaScript (by/via) · ·
  125. WordPress Versions 3.7–4.0 No Longer Get Security Updates (by/via) · ·
  126. “Not Secure” Warning for IE Mode (by) · · , , ,
  127. Node.js Security Best Practices (via) · · ,
  128. npm Security: Preventing Supply Chain Attacks (by/via) · · ,
  129. Secure JavaScript URL Validation (by/via) · · , ,
  130. Create a Passkey for Passwordless Logins (by/via) · · ,
  131. Designing a Secure API (by/via) · · ,
  132. Phylum Detects Active Typosquatting Campaign Targeting npm Developers (via) · · ,
  133. Security (by+/via) · · , , ,
  134. Continue Using .env Files as Usual (by) · ·
  135. Quick Reminder: HTML5 “required” and “pattern” Are Not a Security Feature (by) · · ,
  136. Stop Using .env Files Now (by) · ·
  137. Debunking Myths About HTTPS · · ,
  138. Secure Your Node.js App With JSON Web Tokens (by/via) · · ,
  139. Dependabot Unlocks Transitive Dependencies for npm Projects (via) · · ,
  140. JavaScript Bugs Aplenty in Node.js Ecosystem—Found Automatically (by/via) · · , , , , ,
  141. Introducing Even More Security Enhancements to npm (by+/via) · · ,
  142. Top 5 npm Vulnerability Scanners (via) · · , ,
  143. What Is Passwordless Authentication and How to Implement It (by/via) · · ,
  144. GA4 Is Being Blocked by Content Security Policy (by) · · , ,
  145. Please Remove That .git Folder · ·
  146. Should I Have Separate GitHub Accounts for Personal and Professional Projects? (via) · · , ,
  147. Understanding CSRF Attacks (by) ·
  148. npm Security Update: Attack Campaign Using Stolen OAuth Tokens (by/via) · · , , ,
  149. Snyk Finds 200+ Malicious npm Packages, Including Cobalt Strike Dependency Confusion Attacks (by/via) · · , ,
  150. Unexpectedly HTTPS? (by) · ·
  151. How to Respond to Growing Supply Chain Security Risks? (by) · · , , ,
  152. The Web Is for Everyone: Our Vision for the Evolution of the Web (by+/via) · · , , , , ,
  153. Using HTTPS in Your Development Environment (by/via) · · ,
  154. How to Prevent SQL Injection Attacks in Node.js (by/via) · · , , ,
  155. How to Fix Your Security Vulnerabilities With npm Override (via) · · , , ,
  156. Can You Get Pwned With CSS? (by) · ·
  157. Never, Ever, Ever Use Pixelation for Redacting Text (by/via) · · , ,
  158. Accessibly Insecure (by/via) · ·
  159. Lessons Learned From Publishing a Content Security Policy (via) · · ,
  160. CSS Fingerprinting (by) · · , ,
  161. Ain’t No Party Like a Third Party (by/via) · · ,
  162. Security (by+/via) · · , , ,
  163. GitHub’s Commitment to npm Ecosystem Security (by/via) · · ,
  164. Understanding and Implementing OAuth2 in Node.js (by/via) · · , ,
  165. How to Win at CORS (by) · · , , ,
  166. The Options for Password-Revealing Inputs (by/via) · · , , ,
  167. npm Security Best Practices (by/via) · · ,
  168. Encoding Data for POST Requests (by) · · ,
  169. NPM Global Audit · · , , ,
  170. Understanding and Preventing Common Security Vulnerabilities (via) · ·
  171. Open Source Insights (via) · · , , ,
  172. TLS and mTLS Demystified · · ,
  173. Is Edge Computing Secure? Here Are 4 Security Risks to Be Aware Of (via) · ·
  174. Best Practices for Inclusive Textual Websites (by) · · , ,
  175. What Is mTLS and How Does It Work? (by) ·
  176. Mutual TLS: Stuff You Should Know (by/via) · · ,
  177. Don’t Try to Sanitize Input—Escape Output (by) · · ,
  178. How to Automatically Update Your JavaScript Dependencies (by/via) · · , , , ,
  179. Usability and Security; Better Together (via) · · ,
  180. It’s Beginning to Look a Lot Like XSSmas (by/via) · ·
  181. AWS Security Guide: 7 Best Practices to Avoid Security Risks (via) · · , ,
  182. Making Your Website Faster and Safer With Cloudflare (by/via) · · , ,
  183. How (Not) to Control Your CDN (by) · · , ,
  184. How to Secure WordPress With SSL (by/via) · · , ,
  185. Web Platform Security Boundaries (by) · ·
  186. 10 Web Predictions for 2016 (by/via) · · , , , , , , , ,
  187. An in-Depth Look at CORS (by/via) · · , ,
  188. Why Passwordless Authentication Works (by/via) · · ,
  189. More Tips to Further Secure WordPress (by/via) · · , ,
  190. Improving Web Security With the Content Security Policy (by/via) · · ,
  191. What Are the Security Risks of HTML5 Apps? (by/via) · · ,
  192. Same-Origin Policy (by) · · ,
  193. We Should All Have Something to Hide (by) · ·
  194. Mobile Website Security (by/via) · · , ,
  195. WordPress Security Tips (by/via) · · ,
  196. Bulletproof Your Drupal Website (via) · ·
  197. Top 10 PHP Security Vulnerabilities (via) · · ,
  198. An Introduction to Content Security Policy (by/via) · · ,
  199. Cross-Site Scripting Attacks (XSS) (by/via) · ·
  200. How to Secure Your WordPress Website (by/via) · · , ,
  201. Using CORS (by/via) · ·
  202. Web Cryptography: Salted Hash and Other Tasty Dishes (by/via) · ·
  203. 10 Useful WordPress Security Tweaks (by/via) · ·
  204. Web Security: Are You Part of the Problem? (by/via) · · , ,
  205. JavaScript Security Experiments (by) · · ,
  206. DOM vs. Web (by) · · ,
  207. Top 7 PHP Security Blunders (via) · · , ,
  208. Validate Your Input! (via) · ·
  209. JavaScript Security · ·
  210. File Upload Security (by) · · ,
  211. Spot the Security Hole (by/via) · ·
  212. JavaScript and Security (by/via) · ·
  213. Handling Content From Strangers (by/via) · ·
  214. Getting Started With XML Security (by/via) · · ,
  215. Password Generator (Gibson Research Corporation) (via) · , ,
  216. Password Generator (Frontend Dogma) (via) · , , ,
  217. Password Generator (Arantius.com) · , ,
  218. MD5 Hash Generator (by) · ,
  219. HMAC Checker · ,
  220. Hash Generator (by) · ,
  221. Executable File Analyzer · ,
  222. Device Vulnerability Checker (via) · , ,
  223. CSR Decoder (via) · ,
  224. “chmod” Calculator · , ,
  225. Browser Fingerprint Checker · , ,
  226. Blowfish Hash Generator (via) · ,
  227. AES Encrypter and Decrypter (by) · ,
  228. Website Security Checker (Norton) (via) · ,
  229. Website Security Checker (Google) (via) · ,
  230. Website Scam Checker (via) · ,
  231. Website Privacy Checker (via) · , ,
  232. Website Headers Analyzer (Security Headers) (by/via) · , ,
  233. Website Headers Analyzer (Mozilla) (via) · , ,
  234. Website Certificate Fingerprint Checker (via) · ,
  235. Virus Scanner (via) · ,
  236. SSL Checker (SSL Shopper) (via) · , ,
  237. SSL Checker (Qualys) (via) · , ,
  238. SPF Record Checker · ,
  239. Site and Origin Comparer (via) · , ,
  240. Malware and Security Scanner (via) · ,
  241. Email Blacklist Checker (via) · , ,
  242. Domain or IP Spam Checker (via) · , ,
  243. DNSSEC Checker (via) · , ,
  244. Cross-Site WebSocket Hijacking Tester (by) · ,
  245. Cookie Use Checker (via) · , ,
  246. Content Security Policy Validator (Google) (via) · , , ,
  247. Content Security Policy Validator (CSP Validator) (by) · , , ,
  248. Abuse Contact Lookup (via) · , ,
  249. Server Port Scanner (via) · , , ,
  250. Website Experience Analyzer · , , ,