Tech does not just watch: Take action against Russia’s war on Ukraine 🇺🇦, and take action against Israel’s genocide on the Palestinian people and the destruction of Palestine 🇵🇸 Protest, boycott, ostracize. Hide

Frontend Dogma

“security” News Archive

Supertopics: · subtopics: , , , , , , , , , , , , , , , , , ,  (non-exhaustive) · glossary look-up: “security”

Entry (Sources) and Other Related TopicsDate#
How Maintainer Burnout Is Causing a Kubernetes Security Disaster (the)413
, , ,
npm Author Qix Compromised via Phishing Email in Major Supply Chain Attack (bur+/soc)412
,
Anatomy of a Billion-Download npm Supply-Chain Attack411
,
Why You Absolutely Need to Have Automated Dependency Management in Place (j9t)410
, , , ,
What Your Website’s Style Says About You—and How Hackers Can Use It Against You (err)409
,
Hardening Node.js Apps in Production: 8 Layers of Practical Security408
,
eslint-config-prettier Compromised: How npm Package With 30 Million Downloads Spread Malware407
, , ,
npm Phishing Email Targets Developers With Typosquatted Domain (sar/soc)406
AI Agents Are Creating a New Security Nightmare for Enterprises and Startups (the)405
,
Tuesday, July 15, 2025 Security Releases (nod)404
,
Contagious Interview Campaign Escalates With 67 Malicious npm Packages and New Malware Loader (soc)403
,
MCP Security Vulnerabilities and Attack Vectors402
,
A New Era of Code Quality401
JWTs Are Not Session Tokens, Stop Using Them Like One400
,
The Growing Risk of Malicious Browser Extensions (soc)399
Design Patterns for Securing LLM Agents Against Prompt Injections (sim)398
, , , ,
HTML Spec Change: Escaping “<” and “>” in Attributes (sec/dev)397
, , ,
Escaping “<” and “>” in Attributes—How It Helps Protect Against Mutation XSS (sec)396
, , , , , ,
Beware of End-of-Life Node.js Versions—Upgrade or Seek Post-EOL Support (mco/nod)395
,
How to Access Local MCP Servers Through a Secure Tunnel (the)394
, , , ,
Docker Launches Hardened Images, Intensifying Secure Container Market (the)393
Modernizing Security392
,
Securing Your Node.js App From Command Injection391
Passkeys for Normal People (tro)390
, , ,
npm Targeted by Malware Campaign Mimicking Familiar Library Names (soc)389
, , ,
Threat Actors Misuse Node.js to Deliver Malware and Other Malicious Payloads (mic)388
,
Principles for Coding Securely With LLMs387
,
TLS Certificate Lifetimes Will Officially Reduce to 47 Days386
,
LLMs Can’t Stop Making Up Software Dependencies and Sabotaging Everything (tho/the)385
,
Secure a Vue App With OpenID Connect and the BFF Pattern (due)384
, ,
Teaching Code in the AI Era: Why Fundamentals Still Matter (ali)383
, , , , , , , ,
Stop Using Jenkins in 2025 (oso)382
, ,
Node.js Test CI Security Incident (nod)381
,
Website Hijack Campaign Now Impacting 150,000 Sites (gad)380
Malware Found on npm Infecting Local Package With Reverse Shell (rev)379
,
Five Things Vibe Coders Should Know (From a Software Engineer) (uxd)378
,
GitHub Suffers a Cascading Supply Chain Attack Compromising CI/CD Secrets (inf)377
,
How to Prevent WordPress SQL Injection Attacks (sma)376
, , ,
Lazarus Strikes npm Again With New Wave of Malicious Packages (soc)375
,
What Is the OWASP Top 10 and How Can Your Team Benchmark Security? (jet)374
, , ,
Updates on CVE for End-of-Life Versions (raf/nod)373
How to Protect Your Web Applications From XSS (tor/w3c)372
, ,
Secure UX: Building Cybersecurity and Privacy Into the UX Lifecycle (uxm)371
,
The Fallacy of Balance: Challenging the Notion of Security and Accessibility as Opposing Objectives (deq)370
,
It Is No Longer Safe to Move Our Governments and Societies to U.S. Clouds (ber)369
, ,
How OWASP Helps You Secure Your Full-Stack Web Applications (eri/sma)368
, , , , , , ,
10 Common Web Development Mistakes to Avoid Right Now367
, , , , , , ,
Tightening Every Bolt (bag)366
, , ,
On Generative AI Security (sch)365
, ,
Understanding CORS Errors in Signed Exchanges (paw)364
, ,
Keep Your Node.js Apps Secure With “npx is-my-node-vulnerable” (tre)363
, ,
Node.js EOL Versions CVE Dubbed the “Worst CVE of the Year” by Security Experts (sar/soc)362
,
How I Open-Sourced My Secret Access Tokens From GitHub, Slack, and npm—and Who Actually Cares361
, ,
Tuesday, January 21, 2025 Security Releases (raf/nod)360
,
APIs Are Quickly Becoming the Latest Security Battleground (and Nightmare) (the)359
CDN-First Is No Longer a Performance Feature (osv)358
, , , ,
The Cyber-Cleanse: Take Back Your Digital Footprint (cyb)357
15 Principles for Secure Programming (rak)356
, ,
Important Topics for Frontend Developers to Master in 2025355
, , , , , , , , , ,
How to Automate OWASP Security Reviews in Your Pull Requests? (cod)354
, , , ,
Developer Guide: How to Implement Passkeys353
, , ,
5 Technical Trends to Help Web Developers Stand Out in 2025 (the)352
, , , ,
Avoid Hotlinking Images With “Cross-Origin-Resource-Policy”351
Content Security Policy Level 3 (mik/w3c)350
,
Security (htt)349
, , ,
JavaScript Import Attributes (ES2025) (tre)348
Exploring Internet Traffic Shifts and Cyber Attacks During the 2024 U.S. Election (clo)347
Securing Your Express REST API With Passport.js346
, , , , ,
SecretLint—a Linter for Preventing Committing Credentials (tre)345
,
Understanding “npm audit” and Fixing Vulnerabilities344
, ,
Top 4 Web Vulnerabilities With Example and Mitigation343
, , , ,
The Importance of UX in Cybersecurity (uxm)342
,
How to Implement Content Security Policy (CSP) Headers for Astro (tre)341
, , , , , ,
Why Code Security Matters—Even in Hardened Environments340
, ,
Database 101: SSL/TLS for Beginners339
, , , ,
Cloudflare Study: 39% of Companies Losing Control of Their IT and Security Environment (tre)338
, ,
NIST Recommends Some Common-Sense Password Rules (sch)337
,
I Finally Understand OAuth336
, ,
Fake GitHub Site Targeting Developers (jul/san)335
Hacking Cars in JavaScript (Running Replay Attacks in the Browser With the HackRF) (dev)334
Gaining Access to Anyone’s Browser Without Them Even Visiting a Website333
, , ,
Web Security: Shaping the Secure Web (set/w3c)332
,
5 Wasm Use Cases for Frontend Development (des)331
, ,
What Is Incident Response?330
,
The Great npm Garbage Patch329
, ,
Migrating From Netlify to Cloudflare for AI Bot Protection (sia)328
, , ,
Frontend Security Checklist (tre)327
,
Automated Ways to Security Audit Your Website326
, ,
Secure Node.js Applications From Supply Chain Attacks325
, ,
The Pitfalls of In-App Browsers (fro)324
, , ,
The Cloud Run Security Gap You Didn’t Know You Had (and How to Fix It)323
,
Supply Chain Security in npm—We Can Be Optimistic About the Future322
, ,
Script Integrity (chr/fro)321
,
WebAuthn: Enhancing Security With Minimal Effort (tbe)320
,
Tuesday, July 2, 2024 Security Releases (nod)319
,
Introducing the MDN HTTP Observatory (mdn)318
, , ,
RegreSSHion: Remote Unauthenticated Code Execution Vulnerability in OpenSSH Server317
,
Polyfill Supply Chain Attack Embeds Malware in JavaScript CDN Assets (sny)316
,
Catching Compromised Cookies315
,
Backdoor Slipped Into Multiple WordPress Plugins in Ongoing Supply-Chain Attack (dan/ars)314
,
The Hacking of Culture and the Creation of Socio-Technical Debt (sch)313
What Is Mixed Content? (fre)312
Researchers Uncover npm Registry Vulnerability to Cache Poisoning and DoS Attacks (sar/soc)311
, , ,
OAuth Authentication (rya)310
, ,
The Ultimate Guide to Iframes (log)309
, , ,
How a Single Vulnerability Can Bring Down the JavaScript Ecosystem308
, , , ,
JavaScript Security: Simple Practices to Secure Your Frontend307
, ,
Manifesto for a Humane Web (mic)306
, , , , , , ,
Securing Client-Side JavaScript (ada)305
,
Poor Express Authentication Patterns in Node.js and How to Avoid Them304
, ,
Passkeys: A Shattered Dream (fir)303
,
Using Legitimate GitHub URLs for Malware (sch)302
,
When Security and Accessibility Clash: Why Are Banking Applications So Inaccessible? (nic)301
Open Source Security (OpenSSF) and OpenJS Foundations Issue Alert for Social Engineering Takeovers of Open Source Projects (ope)300
Wednesday, April 10, 2024 Security Releases (raf/nod)299
,
Node.js Secure Coding: Mitigate and Weaponize Code Injection Vulnerabilities298
, ,
The Free Software Commons (jen)297
,
The V8 Sandbox296
Wednesday, April 3, 2024 Security Releases (nod)295
,
Using JSON Web Tokens With Node.js294
, ,
Building a Digital Fortress: How to Strengthen DNS Against DDoS Attacks?293
In-App Browsers Are Still a Privacy, Security, and Choice Problem (tho/the)292
, ,
How Does Single Sign-On (SSO) Work? (mil)291
CORS Finally Explained—Simply290
, ,
How npm Install Scripts Can Be Weaponized: A Real-World Example of a Harmful npm Package (eth)289
, ,
Preventing SQL Injection Attacks in Node.js (sny)288
, ,
Frontend Application Security: Tips and Tricks287
, , , , , , ,
Wednesday, February 14, 2024 Security Releases (raf+/nod)286
,
How to Boost WordPress Security and Protect Your SEO Ranking285
, ,
Malicious npm Package Masquerades as Noblox.js, Targeting Roblox Users for Data Theft (sar/soc)284
,
Practice Safe DSD With “setHTMLUnsafe” (It’s Complicated) (jar/van)283
, , ,
Tuesday, February 6, 2024 Security Releases (raf/nod)282
,
JWT vs. Session Authentication281
, ,
GitHub, npm Registry Abused to Host SSH Key-Stealing Malware280
, , ,
Deceptive Deprecation: The Truth About npm Deprecated Packages279
, ,
Safely Accessing the DOM With Angular SSR (dev)278
, , ,
Node.js Security Progress Report—Progress on Permission Model, Fuzzer, and Connections With Community (ope)277
I Hate CORS276
,
Building Multiple Progressive Web Apps on the Same Domain (dev)275
, , ,
Session-Based vs. Token-Based Authentication: Which Is Better?274
, ,
10 Best Practices for Secure Code Review of Node.js Code273
, ,
Security Headers Using “<meta>” (sap/mat)272
,
Blind CSS Exfiltration: Exfiltrate Unknown Web Pages271
Mastering Cryptography Fundamentals With Node’s “crypto” Module270
,
Secure Code Review Tips to Defend Against Vulnerable Node.js Code269
,
Understanding CORS268
What the !#@% Is a Passkey? (eff)267
Secret Scanning Scans Public npm Packages (git)266
, ,
Local HTTPS for Next.js 13.5 (ami)265
, ,
Understanding XSS Attacks (ver)264
A Comprehensive Guide to the Dangers of Regular Expressions in JavaScript (phi)263
, ,
SSH Keys Stolen by Stream of Malicious PyPI and npm Packages (ble)262
, ,
Best Practices for Securing Node.js Applications in Production261
,
npm Provenance General Availability (git)260
, ,
The WebP 0-Day259
, ,
Open Source Trends to Look for in 2024258
, , ,
Securing Your Node.js Apps by Analyzing Real-World Command Injection Examples257
, ,
How to Implement SSL/TLS Pinning in Node.js (sny)256
, , ,
A More Intelligent and Secure Web (ple/w3c)255
, , , ,
Demystifying CORS: Understanding How Cross-Origin Resource Sharing Works254
,
Towards HTTPS by Default (jde/dev)253
, , , ,
Sophisticated, Highly-Targeted Attacks Continue to Plague npm252
An Update on Chrome Security Updates—Shipping Security Fixes to You Faster251
, ,
Tuesday, August 8, 2023 Security Releases (raf/nod)250
,
Publishing With npm Provenance From Private Source Repositories Is No Longer Supported (git)249
, , ,
Social Engineering Campaign Targeting Tech Employees Spreading Through npm Malware (soc)248
,
Securing the Web Forward: Addressing Developer Concerns in Web Security (tor/w3c)247
,
User Input Sanitization and Validation: Securing Your App246
, ,
Encoding: A Brief History and Its Role in Cybersecurity245
, ,
Node.js Security Progress Report—17 Reports Closed (ope)244
The Importance of Verifying Webhook Signatures (sny)243
The Massive Bug at the Heart of the npm Ecosystem242
,
Understanding Authorization Before Authentication: Enhancing Web API Security241
, , ,
An Introduction to Command Injection Vulnerabilities in Node.js and JavaScript240
, , ,
All You Need to Know About CORS and CORS Errors239
,
Django: A Security Improvement Coming to “format_html()” (ada)238
,
Tuesday, June 20, 2023 Security Releases (raf/nod)237
,
security.txt Now Mandatory for Dutch Government Websites236
File Upload Security and Malware Protection (aus)235
, ,
Security Implications of HTTP Response Headers (sny)234
,
Introducing npm Package Provenance (git)233
, , , ,
Generating Provenance Statements232
,
8 Best Tools for Cryptography and Encryption (sta)231
, , , , ,
Dissecting npm Malware: Five Packages and Their Evil Install Scripts230
,
Passkeys: What the Heck and Why? (css)229
Senior Engineering Strategies for Advanced React and TypeScript (tec)228
, , , , , , ,
Cryptographically Protecting Your SPA227
,
Without Accessibility, There Is No Privacy or Security226
,
SSL Certificates Explained225
, , ,
How to Password-Protect a Static HTML Page With No JS (ede)224
, ,
Quick Tip: How to Hash a Password in PHP223
, , ,
Sandboxing JavaScript Code222
Unlocking Security Updates for Transitive Dependencies With npm (git)221
, ,
7 Required Steps to Secure Your Iframes Security220
, , , ,
Conditional API Responses for JavaScript vs. HTML Forms (aus)219
, , ,
Why Do We Need Authorization and Authentication?218
,
The Top 10 Security Vulnerabilities for Web Applications217
,
Leaked a Secret? Check Your GitHub Alerts… for Free (git)216
DOM Clobbering (fre/mat)215
New npm Features for Secure Publishing and Safe Consumption (git)214
,
Using SRI to Protect From Malicious JavaScript (mat)213
WordPress Versions 3.7–4.0 No Longer Get Security Updates (sar)212
“Not Secure” Warning for IE Mode211
, , ,
Node.js Security Best Practices (nod)210
,
npm Security: Preventing Supply Chain Attacks (sny)209
,
Secure JavaScript URL Validation (sny)208
, ,
Create a Passkey for Passwordless Logins (age/dev)207
,
Designing a Secure API206
,
Phylum Detects Active Typosquatting Campaign Targeting npm Developers205
,
Security (htt)204
, , ,
Continue Using .env Files as Usual203
Quick Reminder: HTML5 “required” and “pattern” Are Not a Security Feature (cod)202
,
Stop Using .env Files Now201
Debunking Myths About HTTPS200
,
Secure Your Node.js App With JSON Web Tokens (app)199
,
Dependabot Unlocks Transitive Dependencies for npm Projects (git)198
,
JavaScript Bugs Aplenty in Node.js Ecosystem—Found Automatically197
, , , , ,
Introducing Even More Security Enhancements to npm (git)196
,
Top 5 npm Vulnerability Scanners195
, ,
What Is Passwordless Authentication and How to Implement It194
,
GA4 Is Being Blocked by Content Security Policy193
, ,
Please Remove That .git Folder192
Should I Have Separate GitHub Accounts for Personal and Professional Projects?191
, ,
Understanding CSRF Attacks (zel)190
npm Security Update: Attack Campaign Using Stolen OAuth Tokens (git)189
, , ,
Snyk Finds 200+ Malicious npm Packages, Including Cobalt Strike Dependency Confusion Attacks (sny)188
, ,
Unexpectedly HTTPS?187
How to Respond to Growing Supply Chain Security Risks?186
, , ,
The Web Is for Everyone: Our Vision for the Evolution of the Web (moz)185
, , , , ,
Using HTTPS in Your Development Environment184
,
How to Prevent SQL Injection Attacks in Node.js183
, , ,
How to Fix Your Security Vulnerabilities With npm Override182
, , ,
Can You Get Pwned With CSS?181
Never, Ever, Ever Use Pixelation for Redacting Text180
, ,
Accessibly Insecure179
Lessons Learned From Publishing a Content Security Policy178
,
Ain’t No Party Like a Third Party (ada/css)177
,
Security (htt)176
, , ,
GitHub’s Commitment to npm Ecosystem Security (git)175
,
Understanding and Implementing OAuth2 in Node.js (hon)174
, ,
How to Win at CORS (jaf)173
, , ,
The Options for Password-Revealing Inputs (chr/css)172
, , ,
npm Security Best Practices (owa)171
,
Encoding Data for POST Requests (jaf)170
,
NPM Global Audit169
, , ,
Understanding and Preventing Common Security Vulnerabilities168
Open Source Insights167
, , ,
I Learned to Love the Same-Origin Policy (eee/css)166
TLS and mTLS Demystified165
,
Is Edge Computing Secure? Here Are 4 Security Risks to Be Aware Of164