Frontend Dogma

“security” Archive

Supertopics: · subtopics: , , , , , , , , , , , , , , , ,  (non-exhaustive) · glossary look-up: “security”

Entry (Sources) and Other Related TopicsDate#
LLMs Can’t Stop Making Up Software Dependencies and Sabotaging Everything (tho/the)368
,
Secure a Vue App With OpenID Connect and the BFF Pattern (due)367
,
Website Hijack Campaign Now Impacting 150,000 Sites (gad)366
Malware Found on npm Infecting Local Package With Reverse Shell (rev)365
,
Five Things Vibe Coders Should Know (From a Software Engineer) (uxd)364
,
GitHub Suffers a Cascading Supply Chain Attack Compromising CI/CD Secrets (inf)363
,
How to Prevent WordPress SQL Injection Attacks (sma)362
, , ,
Lazarus Strikes npm Again With New Wave of Malicious Packages (soc)361
,
What Is the OWASP Top 10 and How Can Your Team Benchmark Security? (jet)360
, , ,
Updates on CVE for End-of-Life Versions (raf/nod)359
How to Protect Your Web Applications From XSS (tor/w3c)358
, ,
Secure UX: Building Cybersecurity and Privacy Into the UX Lifecycle (uxm)357
,
The Fallacy of Balance: Challenging the Notion of Security and Accessibility as Opposing Objectives (deq)356
,
It Is No Longer Safe to Move Our Governments and Societies to U.S. Clouds (ber)355
, ,
How OWASP Helps You Secure Your Full-Stack Web Applications (eri/sma)354
, , , , , , ,
10 Common Web Development Mistakes to Avoid Right Now353
, , , , , , ,
Tightening Every Bolt (bag)352
, , ,
On Generative AI Security (sch)351
, ,
Understanding CORS Errors in Signed Exchanges (paw)350
, ,
Keep Your Node.js Apps Secure With “npx is-my-node-vulnerable” (tre)349
, ,
How I Open-Sourced My Secret Access Tokens From GitHub, Slack, and npm—and Who Actually Cares348
, ,
Node.js EOL Versions CVE Dubbed the “Worst CVE of the Year” by Security Experts (sar/soc)347
,
Tuesday, January 21, 2025 Security Releases (raf/nod)346
,
APIs Are Quickly Becoming the Latest Security Battleground (and Nightmare) (the)345
CDN-First Is No Longer a Performance Feature (osv)344
, , , ,
The Cyber-Cleanse: Take Back Your Digital Footprint (cyb)343
15 Principles for Secure Programming342
, ,
Important Topics for Frontend Developers to Master in 2025341
, , , , , , , , , ,
Developer Guide: How to Implement Passkeys340
, , ,
How to Automate OWASP Security Reviews in Your Pull Requests? (cod)339
, , , ,
5 Technical Trends to Help Web Developers Stand Out in 2025 (the)338
, , , ,
Avoid Hotlinking Images With “Cross-Origin-Resource-Policy”337
Content Security Policy Level 3 (mik/w3c)336
,
Security (htt)335
, , ,
JavaScript Import Attributes (ES2025) (tre)334
Exploring Internet Traffic Shifts and Cyber Attacks During the 2024 U.S. Election (clo)333
Securing Your Express REST API With Passport.js332
, , , , ,
SecretLint—a Linter for Preventing Committing Credentials (tre)331
,
Top 4 Web Vulnerabilities With Example and Mitigation330
, , , ,
The Importance of UX in Cybersecurity (uxm)329
,
Understanding “npm audit” and Fixing Vulnerabilities328
, ,
How to Implement Content Security Policy (CSP) Headers for Astro (tre)327
, , , , , ,
Why Code Security Matters—Even in Hardened Environments326
, ,
Database 101: SSL/TLS for Beginners325
, , , ,
Cloudflare Study: 39% of Companies Losing Control of Their IT and Security Environment (tre)324
, ,
NIST Recommends Some Common-Sense Password Rules (sch)323
,
I Finally Understand OAuth322
, ,
Fake GitHub Site Targeting Developers (jul/san)321
Hacking Cars in JavaScript (Running Replay Attacks in the Browser With the HackRF) (dev)320
Gaining Access to Anyone’s Browser Without Them Even Visiting a Website319
, ,
5 Wasm Use Cases for Frontend Development (des)318
, ,
Web Security: Shaping the Secure Web (set/w3c)317
,
What Is Incident Response?316
,
The Great npm Garbage Patch315
, ,
Migrating From Netlify to Cloudflare for AI Bot Protection (sia)314
, , ,
Frontend Security Checklist (tre)313
,
Automated Ways to Security Audit Your Website312
, ,
Secure Node.js Applications From Supply Chain Attacks311
, ,
The Cloud Run Security Gap You Didn’t Know You Had (and How to Fix It)310
,
The Pitfalls of In-App Browsers (fro)309
, , ,
Supply Chain Security in npm—We Can Be Optimistic About the Future308
, ,
Script Integrity (chr/fro)307
,
WebAuthn: Enhancing Security With Minimal Effort (tbe)306
,
Introducing the MDN HTTP Observatory (mdn)305
, , ,
Tuesday, July 2, 2024 Security Releases (nod)304
,
RegreSSHion: Remote Unauthenticated Code Execution Vulnerability in OpenSSH Server303
,
Polyfill Supply Chain Attack Embeds Malware in JavaScript CDN Assets (lir/sny)302
Catching Compromised Cookies301
,
Backdoor Slipped Into Multiple WordPress Plugins in Ongoing Supply-Chain Attack (dan/ars)300
,
The Hacking of Culture and the Creation of Socio-Technical Debt (sch)299
OAuth Authentication (rya)298
, ,
What Is Mixed Content? (fre)297
Researchers Uncover npm Registry Vulnerability to Cache Poisoning and DoS Attacks (sar/soc)296
, , ,
The Ultimate Guide to Iframes (log)295
, , ,
How a Single Vulnerability Can Bring Down the JavaScript Ecosystem294
, , , ,
JavaScript Security: Simple Practices to Secure Your Frontend293
, ,
Manifesto for a Humane Web (mic)292
, , , , , , ,
Securing Client-Side JavaScript (ada)291
,
Poor Express Authentication Patterns in Node.js and How to Avoid Them (lir)290
, ,
Passkeys: A Shattered Dream (fir)289
,
Using Legitimate GitHub URLs for Malware (sch)288
When Security and Accessibility Clash: Why Are Banking Applications So Inaccessible?287
Open Source Security (OpenSSF) and OpenJS Foundations Issue Alert for Social Engineering Takeovers of Open Source Projects (ope)286
Wednesday, April 10, 2024 Security Releases (raf/nod)285
,
Node.js Secure Coding: Mitigate and Weaponize Code Injection Vulnerabilities (lir)284
, ,
The Free Software Commons (jen)283
,
The V8 Sandbox282
Building a Digital Fortress: How to Strengthen DNS Against DDoS Attacks?281
Using JSON Web Tokens With Node.js280
, ,
Wednesday, April 3, 2024 Security Releases (nod)279
,
In-App Browsers Are Still a Privacy, Security, and Choice Problem (tho/the)278
, ,
CORS Finally Explained—Simply277
, ,
How Does Single Sign-On (SSO) Work? (mil)276
How npm Install Scripts Can Be Weaponized: A Real-World Example of a Harmful npm Package275
, ,
Preventing SQL Injection Attacks in Node.js (sny)274
, ,
Frontend Application Security: Tips and Tricks273
, , , , , , ,
Wednesday, February 14, 2024 Security Releases (raf+/nod)272
,
How to Boost WordPress Security and Protect Your SEO Ranking271
, ,
Malicious npm Package Masquerades as Noblox.js, Targeting Roblox Users for Data Theft (sar/soc)270
,
Practice Safe DSD With “setHTMLUnsafe” (It’s Complicated) (jar/van)269
, , ,
Tuesday, February 6, 2024 Security Releases (raf/nod)268
,
JWT vs. Session Authentication267
, ,
GitHub, npm Registry Abused to Host SSH Key-Stealing Malware266
, ,
Deceptive Deprecation: The Truth About npm Deprecated Packages265
, ,
Safely Accessing the DOM With Angular SSR (dev)264
, , ,
Node.js Security Progress Report—Progress on Permission Model, Fuzzer, and Connections With Community (ope)263
I Hate CORS262
,
Building Multiple Progressive Web Apps on the Same Domain (dev)261
, , ,
Session-Based vs. Token-Based Authentication: Which Is Better?260
, ,
10 Best Practices for Secure Code Review of Node.js Code (lir)259
, ,
Security Headers Using “<meta>” (sap/mat)258
,
Blind CSS Exfiltration: Exfiltrate Unknown Web Pages257
Mastering Cryptography Fundamentals With Node’s “crypto” Module256
,
Secure Code Review Tips to Defend Against Vulnerable Node.js Code (lir)255
,
Understanding CORS254
What the !#@% Is a Passkey? (eff)253
Secret Scanning Scans Public npm Packages (git)252
, ,
Local HTTPS for Next.js 13.5 (ami)251
, ,
Understanding XSS Attacks (ver)250
A Comprehensive Guide to the Dangers of Regular Expressions in JavaScript (phi)249
, ,
SSH Keys Stolen by Stream of Malicious PyPI and npm Packages (ble)248
, ,
Best Practices for Securing Node.js Applications in Production247
,
npm Provenance General Availability (git)246
, ,
Open Source Trends to Look for in 2024245
, , ,
The WebP 0-Day244
, ,
Securing Your Node.js Apps by Analyzing Real-World Command Injection Examples (lir)243
, ,
How to Implement SSL/TLS Pinning in Node.js (sny)242
, , ,
A More Intelligent and Secure Web (ple/w3c)241
, , , ,
Demystifying CORS: Understanding How Cross-Origin Resource Sharing Works240
,
Towards HTTPS by Default (jde/dev)239
, , , ,
Sophisticated, Highly-Targeted Attacks Continue to Plague npm238
An Update on Chrome Security Updates—Shipping Security Fixes to You Faster237
, ,
Tuesday, August 8, 2023 Security Releases (raf/nod)236
,
Publishing With npm Provenance From Private Source Repositories Is No Longer Supported (git)235
, , ,
Social Engineering Campaign Targeting Tech Employees Spreading Through npm Malware (soc)234
Securing the Web Forward: Addressing Developer Concerns in Web Security (tor/w3c)233
,
Encoding: A Brief History and Its Role in Cybersecurity232
, ,
User Input Sanitization and Validation: Securing Your App231
, ,
Node.js Security Progress Report—17 Reports Closed (ope)230
The Importance of Verifying Webhook Signatures (sny)229
The Massive Bug at the Heart of the npm Ecosystem228
,
Understanding Authorization Before Authentication: Enhancing Web API Security227
, , ,
All You Need to Know About CORS and CORS Errors226
,
An Introduction to Command Injection Vulnerabilities in Node.js and JavaScript (lir)225
, , ,
Django: A Security Improvement Coming to “format_html()” (ada)224
,
Tuesday, June 20, 2023 Security Releases (raf/nod)223
,
security.txt Now Mandatory for Dutch Government Websites222
File Upload Security and Malware Protection (aus)221
,
Security Implications of HTTP Response Headers (sny)220
,
Generating Provenance Statements219
,
Introducing npm Package Provenance (git)218
, , , ,
8 Best Tools for Cryptography and Encryption (sta)217
, , , , ,
Dissecting npm Malware: Five Packages and Their Evil Install Scripts216
Passkeys: What the Heck and Why? (css)215
Senior Engineering Strategies for Advanced React and TypeScript (tec)214
, , , , , , ,
Cryptographically Protecting Your SPA213
,
Without Accessibility, There Is No Privacy or Security212
,
How to Password-Protect a Static HTML Page With No JS (ede)211
, ,
Quick Tip: How to Hash a Password in PHP210
, , ,
Sandboxing JavaScript Code209
Unlocking Security Updates for Transitive Dependencies With npm (git)208
, ,
7 Required Steps to Secure Your Iframes Security207
, , , ,
Conditional API Responses for JavaScript vs. HTML Forms (aus)206
, , ,
Why Do We Need Authorization and Authentication?205
,
The Top 10 Security Vulnerabilities for Web Applications204
,
Leaked a Secret? Check Your GitHub Alerts… for Free (git)203
DOM Clobbering (fre/mat)202
New npm Features for Secure Publishing and Safe Consumption (git)201
,
Using SRI to Protect From Malicious JavaScript (mat)200
WordPress Versions 3.7–4.0 No Longer Get Security Updates (sar)199
“Not Secure” Warning for IE Mode198
, , ,
Node.js Security Best Practices (nod)197
,
npm Security: Preventing Supply Chain Attacks (lir/sny)196
,
Secure JavaScript URL Validation (sny)195
, ,
Create a Passkey for Passwordless Logins (age/dev)194
,
Designing a Secure API193
,
Phylum Detects Active Typosquatting Campaign Targeting npm Developers192
,
Security (lir+/htt)191
, , ,
Continue Using .env Files as Usual190
Quick Reminder: HTML5 “required” and “pattern” Are Not a Security Feature (cod)189
,
Stop Using .env Files Now188
Debunking Myths About HTTPS187
,
Secure Your Node.js App With JSON Web Tokens (app)186
,
Dependabot Unlocks Transitive Dependencies for npm Projects (git)185
,
JavaScript Bugs Aplenty in Node.js Ecosystem—Found Automatically184
, , , , ,
Introducing Even More Security Enhancements to npm (git)183
,
Top 5 npm Vulnerability Scanners182
, ,
What Is Passwordless Authentication and How to Implement It181
,
GA4 Is Being Blocked by Content Security Policy180
, ,
Please Remove That .git Folder179
Should I Have Separate GitHub Accounts for Personal and Professional Projects?178
, ,
Understanding CSRF Attacks (zel)177
npm Security Update: Attack Campaign Using Stolen OAuth Tokens (git)176
, , ,
Snyk Finds 200+ Malicious npm Packages, Including Cobalt Strike Dependency Confusion Attacks (sny)175
, ,
Unexpectedly HTTPS?174
How to Respond to Growing Supply Chain Security Risks?173
, , ,
The Web Is for Everyone: Our Vision for the Evolution of the Web (moz)172
, , , , ,
Using HTTPS in Your Development Environment171
,
How to Prevent SQL Injection Attacks in Node.js170
, , ,
How to Fix Your Security Vulnerabilities With npm Override169
, , ,
Can You Get Pwned With CSS?168
Never, Ever, Ever Use Pixelation for Redacting Text167
, ,
Accessibly Insecure166
Lessons Learned From Publishing a Content Security Policy165
,
Ain’t No Party Like a Third Party (ada/css)164
,
Security (htt)163
, , ,
GitHub’s Commitment to npm Ecosystem Security (git)162
,
Understanding and Implementing OAuth2 in Node.js161
, ,
How to Win at CORS (jaf)160
, , ,
The Options for Password-Revealing Inputs (chr/css)159
, , ,
npm Security Best Practices (lir/owa)158
,
Encoding Data for POST Requests (jaf)157
,
NPM Global Audit156
, , ,
Understanding and Preventing Common Security Vulnerabilities155
Open Source Insights154
, , ,
Is Edge Computing Secure? Here Are 4 Security Risks to Be Aware Of153
TLS and mTLS Demystified152
,
Best Practices for Inclusive Textual Websites151
, ,
What Is mTLS and How Does It Work?150
Mutual TLS: Stuff You Should Know149
,
Don’t Try to Sanitize Input—Escape Output148
,
Apple Joins FIDO Alliance, Commits to Getting Rid of Passwords (zdn)147
, , ,
How to Automatically Update Your JavaScript Dependencies (spa/clo)146
, , , ,
Usability and Security; Better Together (24w)145
,
Server-Side Includes (SSI) Injection (owa)144
Web Feature Developers Told to Dial Up Attention on Privacy and Security (rip/tec)143
, ,
Security and Privacy for Our Times (luk/w3c)142
,
Understanding Subresource Integrity (dre/sma)141
,
W3C Strategic Highlights: Web for All (Security, Privacy, Identity) (w3c)140
, ,
Guide to Web Authentication139
, , ,
It’s Beginning to Look a Lot Like XSSmas (24w)138
, ,
Protecting Your Site With Feature Policy (rac/sma)137
,
AWS Security Guide: 7 Best Practices to Avoid Security Risks136
, ,
WebAuthn, FIDO2 Infuse Browsers, Platforms With Strong Authentication (dar)135
, , , ,
In Your Face, Passwords: Big Three Browsers All Adopt Authentication API134
, , , , , , , , ,
WordPress Security as a Process (sma)133
,
Making Your Website Faster and Safer With Cloudflare132
, ,
Validating Dependencies in the Project With npm-check and depcheck131
, , , ,
Third Party CSS Is Not Safe (jaf)130
, ,
Creating Secure Password Resets With JSON Web Tokens (sma)129
, ,
The Complete Guide to Switching From HTTP to HTTPS (sma)128
,
How (Not) to Control Your CDN (mno)127
, ,
How to Secure WordPress With SSL126
, ,
Encrypting IP Addresses (ber)125
, , ,
How to Secure Your Web App With HTTP Headers (sma)124
, , , ,
Just Another HTTPS Nudge (chr/css)123
On EME in HTML5 (tim/w3c)122
, , , , ,
Using SSH Securely (ann)121
More Than 300 Federal Gov Websites Fail to Meet Domain Encryption Deadline120
, , ,
Content Security Policy Level 2 (mik+/w3c)119
,