[Next.js] Security Advisory: CVE-2025-66478 (seb )Dec 3, 2025 476 nextjs Critical Security Vulnerability in React Server Components (rea )Dec 3, 2025 475 react , components Decreasing [Let’s Encrypt] Certificate Lifetimes to 45 Days (mat /let )Dec 2, 2025 474 http , certificates , lets-encrypt The Shai-Hulud 2.0 npm Worm: Analysis, and What You Need to Know Nov 25, 2025 473 npm , dependencies GitLab Discovers Widespread npm Supply Chain Attack (git )Nov 24, 2025 472 npm , dependencies , gitlab , github , aws , gcp , azure Automated npm Secret Rotation in GitHub Actions (mhe )Nov 16, 2025 471 npm , automation , github-actions Introducing the OWASP Top 10:2025 (she +/owa )Nov 5, 2025 470 introductions , owasp , vulnerabilities Removing XSLT for a More Secure Browser (dro /dev )Oct 29, 2025 469 chromium , chrome , google , browsers , xsl , web-platform Will npm’s New Security Steps Stop Attacks? (rev )Oct 28, 2025 468 npm , github , maintenance , foss HTTPS by Default (jde +)Oct 28, 2025 467 http , chrome , google , browsers Agentic AI and Security (ksi /mfo )Oct 28, 2025 466 ai , architecture Octoverse: A New Developer Joins GitHub Every Second as AI Leads TypeScript to #1 (git )Oct 28, 2025 465 github , metrics , productivity , ai , foss , programming Glassworm: First Self-Propagating Worm Using Invisible Code Hits OpenVSX Marketplace Oct 18, 2025 464 code-editors , vs-code , microsoft Improving the Trustworthiness of JavaScript on the Web (clo )Oct 16, 2025 463 javascript , web-apps Past Time for Passkeys (nor )Oct 15, 2025 462 videos , passkeys , passwords , authentication Secure Coding in JavaScript Oct 15, 2025 461 javascript , frameworks My Conclusions After Using Signed Exchanges on My Website for 2 Years (paw )Oct 9, 2025 460 signed-exchanges , performance Lazy-Loading as a Security Measure Oct 6, 2025 459 lazy-loading , angular , react Backend Concepts Every Experienced Developers Must Know Oct 4, 2025 458 concepts , network , concurrency , apis , databases , caching , scalability , observability , architecture How Deno Protects Against npm Exploits (den )Sep 30, 2025 457 deno , npm Strengthening npm Security: Important Changes to Authentication and Token Management (git )Sep 29, 2025 456 npm How Hackers Use AI to Find Vulnerabilities Faster Sep 25, 2025 455 ai CAPTCHA, When Security Takes Precedence Over Accessibility Sep 22, 2025 454 captcha , accessibility Our Plan for a More Secure npm Supply Chain (xco /git )Sep 22, 2025 453 npm , dependencies , foss npm Security Best Practices Sep 21, 2025 452 npm , provenance , best-practices This May Be the Worst One (the )Sep 17, 2025 451 videos , npm , dependencies Ongoing Supply Chain Attack Targets CrowdStrike npm Packages (pvd +/soc )Sep 16, 2025 450 npm , dependencies ctrl/tinycolor and 40+ npm Packages Compromised Sep 15, 2025 449 npm , dependencies How Maintainer Burnout Is Causing a Kubernetes Security Disaster (the )Sep 11, 2025 448 kubernetes , maintenance , foss , economics Oh No, Not Again… a Meditation on npm Supply Chain Attacks (tan )Sep 9, 2025 447 npm , dependencies , microsoft Anatomy of a Billion-Download npm Supply-Chain Attack Sep 8, 2025 446 npm , dependencies npm Author Qix Compromised via Phishing Email in Major Supply Chain Attack (bur +/soc )Sep 8, 2025 445 npm , dependencies CORS Explained: Stop Struggling With Cross-Origin Errors Sep 3, 2025 444 cors , http-headers , http How OpenJS-Hosted Projects Benefit From Security Support (ope )Sep 2, 2025 443 openjs , hosting , foss Why You Absolutely Need to Have Automated Dependency Management in Place (j9t )Aug 28, 2025 442 dependencies , maintainability , maintenance , automation , tooling What Your Website’s Style Says About You—and How Hackers Can Use It Against You (err )Aug 1, 2025 441 css , javascript Hardening Node.js Apps in Production: 8 Layers of Practical Security Jul 29, 2025 440 nodejs , best-practices eslint-config-prettier Compromised: How npm Package With 30 Million Downloads Spread Malware Jul 21, 2025 439 prettier , eslint , npm , malware AI Agents Are Creating a New Security Nightmare for Enterprises and Startups (the )Jul 18, 2025 438 ai , apis npm Phishing Email Targets Developers With Typosquatted Domain (sar /soc )Jul 18, 2025 437 npm Tuesday, July 15, 2025 Security Releases (nod )Jul 15, 2025 436 release-notes , nodejs Contagious Interview Campaign Escalates With 67 Malicious npm Packages and New Malware Loader (soc )Jul 14, 2025 435 npm , dependencies MCP Security Vulnerabilities and Attack Vectors Jun 27, 2025 434 mcp , ai A New Era of Code Quality Jun 24, 2025 433 quality JWTs Are Not Session Tokens, Stop Using Them Like One Jun 21, 2025 432 json-web-tokens , authentication Design Patterns for Securing LLM Agents Against Prompt Injections (sim )Jun 13, 2025 431 studies , research , ai , prompting , software-design-patterns The Growing Risk of Malicious Browser Extensions (soc )Jun 13, 2025 430 browser-extensions Escaping “<” and “>” in Attributes—How It Helps Protect Against Mutation XSS (sec )Jun 12, 2025 429 html , attributes , xss , escaping , chrome , google , browsers HTML Spec Change: Escaping “<” and “>” in Attributes (sec /dev )Jun 12, 2025 428 html , attributes , escaping , xss Beware of End-of-Life Node.js Versions—Upgrade or Seek Post-EOL Support (mco /nod )Jun 6, 2025 427 nodejs , maintenance How to Access Local MCP Servers Through a Secure Tunnel (the )Jun 5, 2025 426 how-tos , mcp , ai , servers , network Docker Launches Hardened Images, Intensifying Secure Container Market (the )May 19, 2025 425 docker Modernizing Security May 17, 2025 424 modernization , processes Securing Your Node.js App From Command Injection May 14, 2025 423 nodejs Passkeys for Normal People (tro )May 5, 2025 422 authentication , passkeys , examples , concepts npm Targeted by Malware Campaign Mimicking Familiar Library Names (soc )May 2, 2025 421 npm , malware , dependencies , link-lists What Is an Encryption Backdoor? (int )May 2, 2025 420 encryption , vulnerabilities , concepts Cybersecurity Leaders Are Staying in the Shadows (ste )Apr 26, 2025 419 community , culture Threat Actors Misuse Node.js to Deliver Malware and Other Malicious Payloads (mic )Apr 15, 2025 418 nodejs , malware Principles for Coding Securely With LLMs (sea )Apr 15, 2025 417 ai , principles TLS Certificate Lifetimes Will Officially Reduce to 47 Days Apr 14, 2025 416 tls , certificates LLMs Can’t Stop Making Up Software Dependencies and Sabotaging Everything (tho /the )Apr 12, 2025 415 ai , dependencies Secure a Vue App With OpenID Connect and the BFF Pattern (due )Apr 9, 2025 414 vuejs , authentication , backend-for-frontend Teaching Code in the AI Era: Why Fundamentals Still Matter (ali )Apr 4, 2025 413 training , ai , programming , vibe-coding , scalability , performance , quality , testing , documentation Stop Using Jenkins in 2025 (oso )Apr 1, 2025 412 jenkins , github-actions , ci-cd Node.js Test CI Security Incident (nod )Mar 31, 2025 411 nodejs , retrospectives Website Hijack Campaign Now Impacting 150,000 Sites (gad )Mar 27, 2025 410 Malware Found on npm Infecting Local Package With Reverse Shell (rev )Mar 26, 2025 409 npm , dependencies Five Things Vibe Coders Should Know (From a Software Engineer) (uxd )Mar 20, 2025 408 vibe-coding , sanitization GitHub Suffers a Cascading Supply Chain Attack Compromising CI/CD Secrets (inf )Mar 19, 2025 407 github , ci-cd How to Prevent WordPress SQL Injection Attacks (sma )Mar 13, 2025 406 how-tos , wordpress , sql , databases Lazarus Strikes npm Again With New Wave of Malicious Packages (soc )Mar 10, 2025 405 npm , dependencies Updates on CVE for End-of-Life Versions (raf /nod )Mar 7, 2025 404 nodejs What Is the OWASP Top 10 and How Can Your Team Benchmark Security? (jet )Mar 7, 2025 403 owasp , vulnerabilities , qodana , jetbrains How to Protect Your Web Applications From XSS (tor /w3c )Mar 6, 2025 402 how-tos , web-apps , xss In Tech, What Matters and What Is Dangerous (ham )Mar 6, 2025 401 community , foss , open-web Secure UX: Building Cybersecurity and Privacy Into the UX Lifecycle (uxm )Mar 3, 2025 400 user-experience , processes The Fallacy of Balance: Challenging the Notion of Security and Accessibility as Opposing Objectives (deq )Feb 26, 2025 399 videos , accessibility It Is No Longer Safe to Move Our Governments and Societies to U.S. Clouds (ber )Feb 23, 2025 398 cloud-computing , privacy , legal How OWASP Helps You Secure Your Full-Stack Web Applications (eri /sma )Feb 18, 2025 397 owasp , monitoring , authentication , vulnerabilities , configuration , csrf , cryptography , authorization 10 Common Web Development Mistakes to Avoid Right Now Feb 17, 2025 396 mistakes , mobile , performance , accessibility , seo , navigation , analytics , testing Tightening Every Bolt (bag )Feb 8, 2025 395 videos , processes , code-reviews , testing On Generative AI Security (sch )Feb 5, 2025 394 ai , lessons , microsoft Understanding CORS Errors in Signed Exchanges (paw )Jan 31, 2025 393 cors , errors , signed-exchanges Keep Your Node.js Apps Secure With “npx is-my-node-vulnerable” (tre )Jan 29, 2025 392 packages , npm , nodejs How I Open-Sourced My Secret Access Tokens From GitHub, Slack, and npm—and Who Actually Cares Jan 24, 2025 391 github , slack , npm Node.js EOL Versions CVE Dubbed the “Worst CVE of the Year” by Security Experts (sar /soc )Jan 24, 2025 390 nodejs , documentation Tuesday, January 21, 2025 Security Releases (raf /nod )Jan 21, 2025 389 release-notes , nodejs APIs Are Quickly Becoming the Latest Security Battleground (and Nightmare) (the )Jan 14, 2025 388 apis CDN-First Is No Longer a Performance Feature (osv )Jan 12, 2025 387 content-delivery , performance , caching , embed-code , privacy The Cyber-Cleanse: Take Back Your Digital Footprint (cyb )Jan 1, 2025 386 privacy 15 Principles for Secure Programming (rak )Dec 23, 2024 385 principles , validation , testing Important Topics for Frontend Developers to Master in 2025 Dec 21, 2024 384 learning , javascript , typescript , css , frameworks , git , apis , testing , performance , ci-cd , websockets Developer Guide: How to Implement Passkeys Dec 16, 2024 383 guides , how-tos , authentication , passkeys How to Automate OWASP Security Reviews in Your Pull Requests? (cod )Dec 16, 2024 382 how-tos , owasp , automation , code-reviews , coderabbit 5 Technical Trends to Help Web Developers Stand Out in 2025 (the )Dec 10, 2024 381 trends , career , javascript , ai , low-and-no-code Avoid Hotlinking Images With “Cross-Origin-Resource-Policy” Nov 27, 2024 380 images Content Security Policy Level 3 (mik /w3c )Nov 22, 2024 379 standards , csp Security (htt )Nov 11, 2024 378 web-almanac , studies , research , metrics JavaScript Import Attributes (ES2025) (tre )Nov 10, 2024 377 javascript Exploring Internet Traffic Shifts and Cyber Attacks During the 2024 U.S. Election (clo )Nov 6, 2024 376 traffic Securing Your Express REST API With Passport.js Nov 3, 2024 375 nodejs , express , json-web-tokens , apis , rest , tooling SecretLint—a Linter for Preventing Committing Credentials (tre )Oct 22, 2024 374 tooling , linting The Importance of UX in Cybersecurity (uxm )Oct 21, 2024 373 user-experience , usability Understanding “npm audit” and Fixing Vulnerabilities Oct 21, 2024 372 npm , vulnerabilities , nodejs Top 4 Web Vulnerabilities With Example and Mitigation Oct 21, 2024 371 vulnerabilities , sql , databases , xss , csrf How to Implement Content Security Policy (CSP) Headers for Astro (tre )Oct 16, 2024 370 how-tos , http , http-headers , csp , astro , vercel , cloudflare Why Code Security Matters—Even in Hardened Environments Oct 8, 2024 369 vulnerabilities , file-handling , nodejs Database 101: SSL/TLS for Beginners Oct 4, 2024 368 introductions , databases , ssl , tls , authentication Cloudflare Study: 39% of Companies Losing Control of Their IT and Security Environment (tre )Oct 3, 2024 367 studies , research , engineering-management NIST Recommends Some Common-Sense Password Rules (sch )Sep 27, 2024 366 passwords , guidelines I Finally Understand OAuth Sep 24, 2024 365 authorization , oauth , processes Fake GitHub Site Targeting Developers (jul /san )Sep 19, 2024 364 github Hacking Cars in JavaScript (Running Replay Attacks in the Browser With the HackRF) (dev )Sep 16, 2024 363 javascript Gaining Access to Anyone’s Browser Without Them Even Visiting a Website Sep 7, 2024 362 arc , the-browser-company , browsers , vulnerabilities 10 AI Dangers and Risks and How to Manage Them (rin )Sep 3, 2024 361 ai , privacy , sustainability , legal Web Security: Shaping the Secure Web (set /w3c )Aug 21, 2024 360 web , w3c 5 Wasm Use Cases for Frontend Development (des )Aug 21, 2024 359 guest-posts , webassembly , performance What Is Incident Response? Aug 20, 2024 358 incident-response , overviews Migrating From Netlify to Cloudflare for AI Bot Protection (sia )Aug 6, 2024 357 migrating , netlify , cloudflare , ai The Great npm Garbage Patch Aug 6, 2024 356 dependencies , npm , spam Frontend Security Checklist (tre )Jul 30, 2024 355 checklists , react Automated Ways to Security Audit Your Website Jul 28, 2024 354 auditing , automation , tooling Secure Node.js Applications From Supply Chain Attacks Jul 25, 2024 353 nodejs , best-practices , dependencies The Cloud Run Security Gap You Didn’t Know You Had (and How to Fix It) Jul 18, 2024 352 google , gcp The Pitfalls of In-App Browsers (fro )Jul 18, 2024 351 browsers , mobile , privacy , user-experience Supply Chain Security in npm—We Can Be Optimistic About the Future Jul 9, 2024 350 npm , dependencies , provenance Script Integrity (chr /fro )Jul 5, 2024 349 embed-code , javascript Introducing the MDN HTTP Observatory (mdn )Jul 2, 2024 348 introductions , mdn , mozilla , http Tuesday, July 2, 2024 Security Releases (nod )Jul 2, 2024 347 release-notes , nodejs WebAuthn: Enhancing Security With Minimal Effort (tbe )Jul 2, 2024 346 authentication , webauthn RegreSSHion: Remote Unauthenticated Code Execution Vulnerability in OpenSSH Server Jul 1, 2024 345 ssh , vulnerabilities Polyfill Supply Chain Attack Embeds Malware in JavaScript CDN Assets Jun 26, 2024 344 malware , vulnerabilities Catching Compromised Cookies Jun 25, 2024 343 cookies , testing Backdoor Slipped Into Multiple WordPress Plugins in Ongoing Supply-Chain Attack (dan /ars )Jun 24, 2024 342 wordpress , plugins The Hacking of Culture and the Creation of Socio-Technical Debt (sch )Jun 19, 2024 341 culture OAuth Authentication (rya )Jun 15, 2024 340 authentication , authorization , oauth Researchers Uncover npm Registry Vulnerability to Cache Poisoning and DoS Attacks (sar /soc )Jun 15, 2024 339 npm , dependencies , vulnerabilities , caching What Is Mixed Content? (fre )Jun 15, 2024 338 http The Ultimate Guide to Iframes (log )Jun 6, 2024 337 guides , iframes , html , javascript How a Single Vulnerability Can Bring Down the JavaScript Ecosystem Jun 3, 2024 336 javascript , npm , dependencies , caching , vulnerabilities JavaScript Security: Simple Practices to Secure Your Frontend May 15, 2024 335 javascript , dependencies , csp Manifesto for a Humane Web (mic )May 10, 2024 334 websites , manifestos , web , principles , accessibility , dei , sustainability , user-experience Securing Client-Side JavaScript (ada )May 5, 2024 333 javascript , graceful-degradation Poor Express Authentication Patterns in Node.js and How to Avoid Them May 3, 2024 332 express , nodejs , authentication Passkeys: A Shattered Dream (fir )Apr 26, 2024 331 authentication , passkeys Using Legitimate GitHub URLs for Malware (sch )Apr 22, 2024 330 malware , github When Security and Accessibility Clash: Why Are Banking Applications So Inaccessible? (nic )Apr 17, 2024 329 accessibility Open Source Security (OpenSSF) and OpenJS Foundations Issue Alert for Social Engineering Takeovers of Open Source Projects (ope )Apr 15, 2024 328 foss , openjs Wednesday, April 10, 2024 Security Releases (raf /nod )Apr 10, 2024 327 release-notes , nodejs Node.js Secure Coding: Mitigate and Weaponize Code Injection Vulnerabilities Apr 8, 2024 326 books , nodejs , vulnerabilities The Free Software Commons (jen )Apr 5, 2024 325 foss , community The V8 Sandbox Apr 4, 2024 324 v8 Building a Digital Fortress: How to Strengthen DNS Against DDoS Attacks? Apr 3, 2024 323 dns Using JSON Web Tokens With Node.js Apr 3, 2024 322 json-web-tokens , nodejs , authentication Wednesday, April 3, 2024 Security Releases (nod )Apr 3, 2024 321 release-notes , nodejs In-App Browsers Are Still a Privacy, Security, and Choice Problem (tho /the )Mar 27, 2024 320 browsers , mobile , privacy CORS Finally Explained—Simply Mar 24, 2024 319 csrf , cors , concepts How Does Single Sign-On (SSO) Work? (mil )Mar 24, 2024 318 authentication How npm Install Scripts Can Be Weaponized: A Real-World Example of a Harmful npm Package (eth )Mar 3, 2024 317 npm , dependencies , examples Preventing SQL Injection Attacks in Node.js Feb 20, 2024 316 nodejs , databases , sql Frontend Application Security: Tips and Tricks Feb 16, 2024 315 web-apps , xss , csrf , authentication , dependencies , csp , validation , tips-and-tricks Wednesday, February 14, 2024 Security Releases (raf +/nod )Feb 14, 2024 314 release-notes , nodejs How to Boost WordPress Security and Protect Your SEO Ranking Feb 12, 2024 313 how-tos , wordpress , seo Malicious npm Package Masquerades as Noblox.js, Targeting Roblox Users for Data Theft (sar /soc )Feb 6, 2024 312 npm , dependencies Practice Safe DSD With “setHTMLUnsafe” (It’s Complicated) (jar /van )Jan 31, 2024 311 html , dom , shadow-dom , apis Tuesday, February 6, 2024 Security Releases (raf /nod )Jan 30, 2024 310 release-notes , nodejs JWT vs. Session Authentication Jan 25, 2024 309 authentication , json-web-tokens , comparisons GitHub, npm Registry Abused to Host SSH Key-Stealing Malware Jan 24, 2024 308 github , npm , malware , foss Deceptive Deprecation: The Truth About npm Deprecated Packages Jan 18, 2024 307 deprecation , npm , dependencies , research Safely Accessing the DOM With Angular SSR (dev )Jan 17, 2024 306 dom , javascript , angular , server-side-rendering Node.js Security Progress Report—Progress on Permission Model, Fuzzer, and Connections With Community (ope )Jan 16, 2024 305 nodejs I Hate CORS Jan 14, 2024 304 videos , cors Building Multiple Progressive Web Apps on the Same Domain (dev )Jan 4, 2024 303 videos , web-apps , progressive-web-apps , architecture Session-Based vs. Token-Based Authentication: Which Is Better? Dec 23, 2023 302 authentication , json-web-tokens , comparisons 10 Best Practices for Secure Code Review of Node.js Code Dec 20, 2023 301 best-practices , code-reviews , nodejs Security Headers Using “<meta>” (sap /mat )Dec 7, 2023 300 csp , html Blind CSS Exfiltration: Exfiltrate Unknown Web Pages Dec 5, 2023 299 css Mastering Cryptography Fundamentals With Node’s “crypto” Module Nov 11, 2023 298 cryptography , nodejs Secure Code Review Tips to Defend Against Vulnerable Node.js Code Nov 8, 2023 297 nodejs , code-reviews Understanding CORS Nov 4, 2023 296 cors Secret Scanning Scans Public npm Packages (git )Oct 26, 2023 295 github , npm , dependencies What the !#@% Is a Passkey? (eff )Oct 26, 2023 294 passkeys Local HTTPS for Next.js 13.5 (ami )Oct 10, 2023 293 testing , http , nextjs Understanding XSS Attacks Oct 5, 2023 292 xss A Comprehensive Guide to the Dangers of Regular Expressions in JavaScript (phi )Sep 28, 2023 291 guides , javascript , regex Best Practices for Securing Node.js Applications in Production Sep 27, 2023 290 best-practices , nodejs SSH Keys Stolen by Stream of Malicious PyPI and npm Packages (ble )Sep 27, 2023 289 ssh , dependencies , npm npm Provenance General Availability (git )Sep 26, 2023 288 github , npm , provenance Open Source Trends to Look for in 2024 Sep 21, 2023 287 foss , trends , outlooks , ai The WebP 0-Day Sep 21, 2023 286 webp , google , apple Securing Your Node.js Apps by Analyzing Real-World Command Injection Examples Sep 15, 2023 285 nodejs , history , examples How to Implement SSL/TLS Pinning in Node.js Aug 29, 2023 284 how-tos , ssl , tls , nodejs A More Intelligent and Secure Web (ple /w3c )Aug 24, 2023 283 videos , w3c , standards , web , web-platform Demystifying CORS: Understanding How Cross-Origin Resource Sharing Works Aug 18, 2023 282 cors , javascript Towards HTTPS by Default (jde /dev )Aug 16, 2023 281 browsers , google , chrome , http , tls Sophisticated, Highly-Targeted Attacks Continue to Plague npm Aug 12, 2023 280 npm An Update on Chrome Security Updates—Shipping Security Fixes to You Faster Aug 8, 2023 279 browsers , google , chrome Tuesday, August 8, 2023 Security Releases (raf /nod )Jul 31, 2023 278 release-notes , nodejs Publishing With npm Provenance From Private Source Repositories Is No Longer Supported (git )Jul 26, 2023 277 github , npm , provenance , foss Social Engineering Campaign Targeting Tech Employees Spreading Through npm Malware (soc )Jul 25, 2023 276 malware , npm Securing the Web Forward: Addressing Developer Concerns in Web Security (tor /w3c )Jul 24, 2023 275 web , surveys Encoding: A Brief History and Its Role in Cybersecurity Jul 19, 2023 274 encoding , unicode , history User Input Sanitization and Validation: Securing Your App Jul 19, 2023 273 sanitization , validation , conformance Node.js Security Progress Report—17 Reports Closed (ope )Jul 17, 2023 272 nodejs The Importance of Verifying Webhook Signatures Jun 29, 2023 271 webhooks The Massive Bug at the Heart of the npm Ecosystem Jun 27, 2023 270 npm , dependencies All You Need to Know About CORS and CORS Errors Jun 23, 2023 269 cors , errors Understanding Authorization Before Authentication: Enhancing Web API Security Jun 23, 2023 268 authorization , authentication , apis , comparisons An Introduction to Command Injection Vulnerabilities in Node.js and JavaScript Jun 23, 2023 267 introductions , vulnerabilities , nodejs , javascript Django: A Security Improvement Coming to “format_html()” (ada )Jun 15, 2023 266 django , html Tuesday, June 20, 2023 Security Releases (raf /nod )Jun 13, 2023 265 release-notes , nodejs security.txt Now Mandatory for Dutch Government Websites May 31, 2023 264 legal File Upload Security and Malware Protection (aus )May 23, 2023 263 malware , file-handling , edge-computing Security Implications of HTTP Response Headers May 3, 2023 262 http , http-headers The Case Against Automatic Dependency Updates (ben )Apr 21, 2023 261 dependencies , automation , ci-cd , maintenance Automating Dependency Updates: The Big Debate Apr 21, 2023 260 dependencies , automation , ci-cd Generating Provenance Statements Apr 19, 2023 259 npm , provenance Introducing npm Package Provenance (git )Apr 19, 2023 258 introductions , github , npm , provenance , foss 8 Best Tools for Cryptography and Encryption (sta )Apr 18, 2023 257 link-lists , tooling , comparisons , cryptography , encryption , privacy Dissecting npm Malware: Five Packages and Their Evil Install Scripts Apr 15, 2023 256 npm , malware Passkeys: What the Heck and Why? (css )Apr 12, 2023 255 passkeys Senior Engineering Strategies for Advanced React and TypeScript (tec )Mar 25, 2023 254 strategies , react , typescript , architecture , testing , performance , accessibility , maintenance Cryptographically Protecting Your SPA Mar 17, 2023 253 single-page-apps , cryptography Without Accessibility, There Is No Privacy or Security Feb 28, 2023 252 accessibility , privacy Tips for Handling Dependabot, CodeQL, and Secret Scanning Alerts Feb 28, 2023 251 alerting , dependabot , tips-and-tricks How to Password-Protect a Static HTML Page With No JS (ede )Feb 20, 2023 250 how-tos , css , fonts SSL Certificates Explained Feb 20, 2023 249 videos , certificates , ssl , protocols Quick Tip: How to Hash a Password in PHP Feb 14, 2023 248 how-tos , php , passwords , tips-and-tricks Sandboxing JavaScript Code Feb 12, 2023 247 javascript Unlocking Security Updates for Transitive Dependencies With npm (git )Jan 19, 2023 246 npm , dependencies , maintenance 7 Required Steps to Secure Your Iframes Security Jan 4, 2023 245 iframes , xss , html , http-headers , csp Conditional API Responses for JavaScript vs. HTML Forms (aus )Jan 3, 2023 244 javascript , html , forms , comparisons Why Do We Need Authorization and Authentication? Dec 30, 2022 243 authorization , authentication The Top 10 Security Vulnerabilities for Web Applications Dec 20, 2022 242 vulnerabilities , web-apps Leaked a Secret? Check Your GitHub Alerts… for Free (git )Dec 15, 2022 241 github DOM Clobbering (fre /mat )Dec 12, 2022 240 dom New npm Features for Secure Publishing and Safe Consumption (git )Dec 6, 2022 239 npm , dependencies Using SRI to Protect From Malicious JavaScript (mat )Dec 3, 2022 238 javascript WordPress Versions 3.7–4.0 No Longer Get Security Updates (sar )Nov 30, 2022 237 wordpress “Not Secure” Warning for IE Mode Nov 16, 2022 236 browsers , microsoft , edge , internet-explorer Node.js Security Best Practices (nod )Nov 10, 2022 235 nodejs , best-practices npm Security: Preventing Supply Chain Attacks Nov 7, 2022 234 npm , dependencies Secure JavaScript URL Validation Oct 17, 2022 233 javascript , validation , urls Create a Passkey for Passwordless Logins (age /dev )Oct 12, 2022 232 authentication , passkeys Designing a Secure API Oct 4, 2022 231 software-design , apis Phylum Detects Active Typosquatting Campaign Targeting npm Developers Oct 2, 2022 230 npm , dependencies Security (htt )Sep 26, 2022 229 web-almanac , studies , research , metrics Continue Using .env Files as Usual Sep 24, 2022 228 environments Quick Reminder: HTML5 “required” and “pattern” Are Not a Security Feature (cod )Sep 22, 2022 227 html , forms Stop Using .env Files Now Sep 19, 2022 226 environments Debunking Myths About HTTPS Sep 18, 2022 225 http , myths Secure Your Node.js App With JSON Web Tokens (app )Sep 14, 2022 224 nodejs , json-web-tokens Dependabot Unlocks Transitive Dependencies for npm Projects (git )Sep 7, 2022 223 dependencies , npm , dependabot JavaScript Bugs Aplenty in Node.js Ecosystem—Found Automatically Aug 30, 2022 222 studies , research , nodejs , javascript , dependencies , quality Introducing Even More Security Enhancements to npm (git )Jul 26, 2022 221 introductions , npm Top 5 npm Vulnerability Scanners Jul 20, 2022 220 npm , vulnerabilities , tooling What Is Passwordless Authentication and How to Implement It Jul 18, 2022 219 authentication , passwords GA4 Is Being Blocked by Content Security Policy Jun 25, 2022 218 csp , metrics , google Please Remove That .git Folder Jun 22, 2022 217 git Should I Have Separate GitHub Accounts for Personal and Professional Projects? Jun 14, 2022 216 discussions , github , career Understanding CSRF Attacks (zel )May 29, 2022 215 csrf npm Security Update: Attack Campaign Using Stolen OAuth Tokens (git )May 26, 2022 214 oauth , version-control , npm , github Snyk Finds 200+ Malicious npm Packages, Including Cobalt Strike Dependency Confusion Attacks May 24, 2022 213 javascript , npm , dependencies Unexpectedly HTTPS? May 16, 2022 212 http How to Respond to Growing Supply Chain Security Risks? Apr 3, 2022 211 how-tos , dependencies , nodejs , npm The Web Is for Everyone: Our Vision for the Evolution of the Web (moz )Mar 23, 2022 210 web , outlooks , privacy , accessibility , performance , user-experience Using HTTPS in Your Development Environment Mar 7, 2022 209 http , environments How to Prevent SQL Injection Attacks in Node.js Mar 3, 2022 208 how-tos , nodejs , databases , sql Can You Get Pwned With CSS? Feb 23, 2022 207 css How to Fix Your Security Vulnerabilities With npm Override Feb 23, 2022 206 how-tos , vulnerabilities , npm , dependencies Never, Ever, Ever Use Pixelation for Redacting Text Feb 15, 2022 205 content , images , obfuscation Accessibly Insecure Jan 31, 2022 204 accessibility Lessons Learned From Publishing a Content Security Policy Dec 14, 2021 203 lessons , csp Ain’t No Party Like a Third Party (ada /css )Dec 3, 2021 202 dependencies , embed-code Security (htt )Dec 1, 2021 201 web-almanac , studies , research , metrics GitHub’s Commitment to npm Ecosystem Security (git )Nov 15, 2021 200 github , npm Understanding and Implementing OAuth2 in Node.js (hon )Oct 18, 2021 199 nodejs , authorization , oauth How to Win at CORS (jaf )Oct 12, 2021 198 how-tos , cors , html , http The Options for Password-Revealing Inputs (chr /css )Oct 6, 2021 197 html , css , passwords , usability npm Security Best Practices (owa )Aug 3, 2021 196 npm , best-practices Encoding Data for POST Requests (jaf )Jun 30, 2021 195 javascript , encoding NPM Global Audit Jun 16, 2021 194 packages , npm , quality , auditing Understanding and Preventing Common Security Vulnerabilities Jun 15, 2021 193 vulnerabilities Open Source Insights Jun 3, 2021 192 websites , foss , dependencies , licensing I Learned to Love the Same-Origin Policy (eee /css )Dec 17, 2020 191 cors Is Edge Computing Secure? Here Are 4 Security Risks to Be Aware Of Dec 9, 2020 190 edge-computing TLS and mTLS Demystified Dec 9, 2020 189 tls , protocols Best Practices for Inclusive Textual Websites Nov 23, 2020 188 performance , accessibility , best-practices Clickjacking Attacks and How to Prevent Them Oct 30, 2020 187 how-tos What Is mTLS and How Does It Work? Apr 30, 2020 186 Mutual TLS: Stuff You Should Know Mar 19, 2020 185 tls , protocols Don’t Try to Sanitize Input—Escape Output Feb 27, 2020 184 sanitization , escaping Encrypting DNS Query Bad for Performance? (erw )Feb 20, 2020 183 performance , dns , http , encryption Apple Joins FIDO Alliance, Commits to Getting Rid of Passwords (zdn )Feb 12, 2020 182 apple , fido , passwords , authentication How to Automatically Update Your JavaScript Dependencies (spa /clo )Jan 30, 2020 181 how-tos , javascript , dependencies , automation , processes What SSL Is, and Which Certificate Type Is Right for You Jan 29, 2020 180 ssl , certificates , privacy , concepts Usability and Security; Better Together (24w )Dec 22, 2019 179 usability , user-experience Server-Side Includes (SSI) Injection (owa )Dec 4, 2019 178 ssi How Internet Security Works: TLS, SSL, and CA (osd )Nov 18, 2019 177 tls , ssl , protocols , certificates Security and Privacy for Our Times (luk /w3c )Sep 11, 2019 176 privacy , web-platform Web Feature Developers Told to Dial Up Attention on Privacy and Security (rip /tec )Sep 11, 2019 175 w3c , privacy , web-platform CSS Security Vulnerabilities (chr /css )Sep 9, 2019 174 css , privacy , vulnerabilities Understanding Subresource Integrity (dre /sma )Apr 9, 2019 173 hashing , embed-code W3C Strategic Highlights: Web for All (Security, Privacy, Identity) (w3c )Mar 18, 2019 172 w3c , privacy , authentication Guide to Web Authentication Jan 24, 2019 171 websites , authentication , webauthn , javascript It’s Beginning to Look a Lot Like XSSmas (24w )Dec 17, 2018 170 vulnerabilities , csrf , xss Protecting Your Site With Feature Policy (rac /sma )Dec 12, 2018 169 http-headers , http AWS Security Guide: 7 Best Practices to Avoid Security Risks (wom )Oct 31, 2018 168 guides , aws , best-practices WebAuthn, FIDO2 Infuse Browsers, Platforms With Strong Authentication (dar )Sep 19, 2018 167 w3c , fido , authentication , webauthn , browsers In Your Face, Passwords: Big Three Browsers All Adopt Authentication API Aug 1, 2018 166 authentication , webauthn , apis , edge , microsoft , chrome , google , firefox , mozilla , browsers HTTPS Is Easy (tro )Jun 27, 2018 165 websites , http WordPress Security as a Process (sma )Jun 21, 2018 164 wordpress , processes Making Your Website Faster and Safer With Cloudflare Jun 12, 2018 163 performance , caching , cloudflare Validating Dependencies in the Project With npm-check and depcheck Jun 1, 2018 162 dependencies , maintenance , auditing , tooling , npm Third Party CSS Is Not Safe (jaf )Feb 27, 2018 161 html , css , embed-code Attackers Can Steal Sensitive Data by Abusing CSS—CSS Exfil Vulnerability Feb 7, 2018 160 css , csp Building Secure JavaScript Applications Jan 18, 2018 159 javascript , xss , csrf , json-web-tokens , passwords Creating Secure Password Resets With JSON Web Tokens (sma )Nov 9, 2017 158 passwords , json-web-tokens , nodejs The Complete Guide to Switching From HTTP to HTTPS (sma )Jun 12, 2017 157 guides , http How (Not) to Control Your CDN (mno )Jun 7, 2017 156 content-delivery , caching , http How to Secure WordPress With SSL May 10, 2017 155 how-tos , wordpress , ssl Encrypting IP Addresses (ber )May 7, 2017 154 ip , network , privacy , encryption How to Secure Your Web App With HTTP Headers (sma )Apr 3, 2017 153 how-tos , web-apps , http , http-headers , csp Just Another HTTPS Nudge (chr /css )Mar 3, 2017 152 http On EME in HTML5 (tim /w3c )Feb 28, 2017 151 eme , drm , html , legal , standards , w3c Using SSH Securely (ann )Jan 24, 2017 150 ssh More Than 300 Federal Gov Websites Fail to Meet Domain Encryption Deadline Jan 4, 2017 149 http , tls , protocols , encryption Content Security Policy Level 2 (mik +/w3c )Dec 15, 2016 148 standards , csp A Checklist for Website Reviews (hcr )Dec 5, 2016 147 checklists , performance , browsers , seo , accessibility Content Security Policy, Your Future Best Friend (sma )Sep 12, 2016 146 csp , link-lists A Refined Content Security Policy (web )Aug 5, 2016 145 html , csp , webkit , safari , apple , browsers The Performance Benefits of “rel=noopener” (jaf )Jul 21, 2016 144 html , links , performance Web Platform Security Boundaries (ann )Jun 24, 2016 143 web-platform Subresource Integrity (dev +/w3c )Jun 23, 2016 142 hashing , html , standards W3C Looks to Secure the Web (sdt )Feb 17, 2016 141 w3c , authentication Distribution Packages Considered Insecure Feb 13, 2016 140 dependencies , unix-like The Current State of Web Security (An Interview With Anselm Hannemann) (hel +/css )Jan 18, 2016 139 interviews , http , ssl , tls , encryption , cloudflare , lets-encrypt Eliminating Known Vulnerabilities With Snyk (sma )Jan 13, 2016 138 vulnerabilities , tooling 10 Web Predictions for 2016 (cra )Jan 6, 2016 137 web , outlooks , site-generators , browsers , css , mobile , performance , webassembly , seo HSTS and “Let’s Encrypt” (tka )Jan 4, 2016 136 http , http-headers , ssl , lets-encrypt An in-Depth Look at CORS Dec 17, 2015 135 cors , javascript , php Indexing HTTPS Pages by Default Dec 17, 2015 134 google , search , http Why Passwordless Authentication Works (cra )Nov 10, 2015 133 authentication , passwords Introduction to TLS and SSL (ope )Aug 22, 2015 132 introductions , tls , ssl , protocols , certificates A Simple Developer Error Is Exposing Private Information on Thousands of Websites (owe )Jul 27, 2015 131 version-control , git , mistakes , vulnerabilities More Tips to Further Secure WordPress (eli )Jul 9, 2015 130 wordpress , tips-and-tricks , plugins Improving Web Security With the Content Security Policy Jun 24, 2015 129 csp , http Deprecating HTTP (yoa )May 11, 2015 128 http , protocols , deprecation Mozilla Wants to Deprecate Non-Secure HTTP, Will Make Proposals to W3C “Soon” (epr /ven )Apr 30, 2015 127 mozilla , http , deprecation Want Fancy Firefox Features? Secure Your Website (sts /cne )Apr 14, 2015 126 firefox , mozilla , browsers , http WordPress Front End Security: CSRF and Nonces (css )Mar 24, 2015 125 wordpress , csrf Introduction to WordPress Front End Security: Escaping the Things (css )Mar 23, 2015 124 introductions , wordpress , escaping What Are the Security Risks of HTML5 Apps? Mar 18, 2015 123 web-apps , sanitization Moving to HTTPS on WordPress (chr /css )Mar 6, 2015 122 wordpress , http Same-Origin Policy (ann )Feb 23, 2015 121 cors , web-platform Securing the Web (w3c )Jan 23, 2015 120 web-platform HTTPS as a Ranking Signal (met )Aug 7, 2014 119 google , search , http , seo mXSS (gaz )May 6, 2014 118 xss , html It’s Time to Encrypt the Entire Internet (kli /wir )Apr 17, 2014 117 web , http , ssl , encryption 3 Tips to Find Hacking on Your Site, and Ways to Prevent and Fix It Feb 28, 2014 116 search , google , tips-and-tricks Cross-Origin Resource Sharing (ann /w3c )Jan 16, 2014 115 cors , standards Despite Automatic Updates, Old Browsers Are Still a Problem (edb /zdn )Jan 6, 2014 114 browsers , web-platform , chrome , google , firefox , mozilla , internet-explorer , microsoft , safari , apple Cross-Origin Resource Sharing on Track to Become a W3C Recommendation (sdt )Jan 3, 2014 113 w3c , cors , standards Bid to Kill CAPTCHA Security Test Gains Momentum Aug 5, 2013 112 captcha , accessibility We Should All Have Something to Hide Jun 12, 2013 111 privacy Mobile Website Security May 14, 2013 110 mobile , hosting , policies WordPress Security Tips Apr 17, 2013 109 wordpress , tips-and-tricks Brad Hill: “HTML5 Security Realities” (chr /css )Feb 22, 2013 108 slides , xss , html Bulletproof Your Drupal Website Jan 21, 2013 107 drupal Top 10 PHP Security Vulnerabilities Oct 15, 2012 106 php , vulnerabilities A Front End Engineer’s Manifesto (zac )Aug 24, 2012 105 websites , manifestos , user-experience , progressive-enhancement , simplicity , foss , accessibility , community , learning A JavaScript Security Flaw Aug 9, 2012 104 javascript The Secure Programmer’s Pledge Jul 16, 2012 103 manifestos An Introduction to Content Security Policy (mik /dev )Jun 15, 2012 102 introductions , csp Cross-Site Scripting Attacks (XSS) Apr 30, 2012 101 xss , examples How to Secure Your WordPress Website (sma )Nov 10, 2011 100 how-tos , wordpress , link-lists Using CORS (dev )Oct 26, 2011 99 cors Some Notes on the Recent XML Encryption Attack (w3c )Oct 24, 2011 98 xml , encryption XML Encryption Flaw Leaves Web Services Vulnerable (eur )Oct 24, 2011 97 web-services , xml , encryption HTTPS Is More Secure, So Why Isn’t the Web Using It? (ars )Mar 20, 2011 96 http , protocols , web Web Cryptography: Salted Hash and Other Tasty Dishes (ali )Feb 22, 2011 95 cryptography What Are the JSON Security Concerns in Web Development? (sim )Jan 6, 2011 94 json What Is Cross Site Scripting or XSS? (chr /css )Nov 19, 2010 93 xss , javascript , concepts Web Developers Accountable for HTML 5 Security Oct 5, 2010 92 html HTML5 Raises New Security Issues Aug 20, 2010 91 html , browsers 10 Useful WordPress Security Tweaks (sma )Jul 1, 2010 90 wordpress Web Security: Are You Part of the Problem? (cod /sma )Jan 14, 2010 89 vulnerabilities , php , javascript Full Frontal ’09: Chris Heilmann on JavaScript Security (mic /aja )Nov 20, 2009 88 javascript Finally Something to Get a Few More Users Off of IE 6? (dal /aja )Dec 17, 2008 87 internet-explorer , microsoft , browsers The Internet Is Closing to Innovation (zit /new )Nov 28, 2008 86 web You Could Be Getting Clickjacked (tec )Nov 21, 2008 85 vulnerabilities , frames , w3c Video and Audio Tags and Cross Origin Access (dal /aja )Nov 10, 2008 84 html , multimedia Dumb Security Tips: Think Before You Follow Online Guides (tan )Oct 26, 2008 83 tips-and-tricks Simon Willison, @Media Ajax (mic /aja )Sep 16, 2008 82 ajax , xss , csrf , javascript , json Frame-Busting Gadgets (mic )Sep 16, 2008 81 frames , iframes Evil GIFs: Hiding Java in Your Image (dal /aja )Jul 4, 2008 80 gif , images , java What’s in a “window.name”? (cod /aja )May 13, 2008 79 javascript Internet Explorer 8 Promises Better Standards Compliance… and a Whole Lot More (est /cio )Mar 6, 2008 78 internet-explorer , microsoft , browsers , standards Ajaxian Roundup for January 2008: JavaScript Turtles and IE 8 (dal /aja )Feb 2, 2008 77 javascript , prototypejs , dojo , extjs , jquery , gwt , yui , dwr , gears , flash , air , json , browsers , standards , css , design , comet , ajaxian , link-lists Book Recommendation: AJAX Security by Hoffman and Sullivan Jan 16, 2008 76 books , ajax , javascript Ajaxian Roundup for December 2007: It’s the End of the Year as We Know It (dal /aja )Jan 1, 2008 75 browsers , javascript , prototypejs , extjs , yui , jquery , microsoft , dwr , performance , gwt , comet , css , mobile , ajaxian , link-lists Cross Site Scripting Joy (tri )Dec 4, 2007 74 xss Making JavaScript Safe With No Script (dal /aja )Nov 8, 2007 73 javascript Automated Security Scanners Choke on AJAX (rey /aja )Oct 8, 2007 72 ajax , javascript Quick Security Checklist for Webmasters Sep 18, 2007 71 checklists How to Protect a JSON or JavaScript Service Apr 4, 2007 70 how-tos , json , javascript Securing Your JSON Mar 13, 2007 69 json , javascript , arrays CSRF Protection Idea (dal /aja )Feb 8, 2007 68 csrf JavaScript Security Experiments (mar )Feb 7, 2007 67 javascript , experiments Prepare for Attack—Making Your Web Applications More Secure Jan 16, 2007 66 web-apps , sql , xss , examples JSON vs. XML: Browser Security Model (car )Jan 2, 2007 65 browsers , json , xml , comparisons The Dangers of Cross-Domain AJAX With Flash (shi )Sep 24, 2006 64 ajax , javascript , flash DOM vs. Web (mno )Apr 20, 2006 63 http , dom AJAX: Is Your Application Secure Enough? Apr 5, 2006 62 ajax , javascript , web-apps AJAX, XHR, JavaScript, and Cross Domain Security Story Dec 30, 2005 61 ajax , javascript Top 7 PHP Security Blunders Dec 21, 2005 60 php , databases , sql How to Make “XMLHttpRequest” Calls to Another Server in Your Domain Nov 28, 2005 59 how-tos , javascript IE Frame Bug (dal /aja )Jun 21, 2005 58 internet-explorer , microsoft , browsers , frames Validate Your Input! May 9, 2005 57 validation JavaScript Security Oct 4, 2004 56 javascript File Upload Security (lac )Sep 8, 2004 55 html , file-handling Spot the Security Hole Jul 3, 2004 54 php JavaScript and Security (sim )Apr 19, 2004 53 javascript Handling Content From Strangers Mar 26, 2004 52 content Web Services Security Gets Serious Apr 23, 2003 51 web-services Getting Started With XML Security Nov 28, 2002 50 introductions , xml Sorting Out the Web Services Security Landscape (tec )Aug 28, 2002 49 web-services , ssl , w3c Website Experience Analyzer 48 tools , analysis , performance , user-experience Server Port Scanner 47 tools , analysis , network , servers Abuse Contact Lookup 46 tools , analysis , policies Content Security Policy Validator (CSP Validator) 45 tools , analysis , csp , conformance Content Security Policy Validator (Google) 44 tools , analysis , csp , conformance Cookie Use Checker 43 tools , analysis , cookies Cross-Site WebSocket Hijacking Tester 42 tools , analysis DNSSEC Checker 41 tools , analysis , dns Domain or IP Spam Checker 40 tools , analysis , domains , ip Email Blacklist Checker 39 tools , analysis , email Malware and Security Scanner 38 tools , analysis Site and Origin Comparer 37 tools , analysis , comparisons SPF Record Checker 36 tools , analysis , dns , domains SSL Checker (Qualys) 35 tools , analysis , ssl , certificates SSL Checker (SSL Shopper) 34 tools , analysis , ssl , certificates Virus Scanner 33 tools , analysis Website Certificate Fingerprint Checker 32 tools , analysis , certificates Website Headers Analyzer (Mozilla) (moz )31 tools , analysis , http , http-headers Website Headers Analyzer (Security Headers) 30 tools , analysis , http , http-headers Website Scam Checker 29 tools , analysis Website Security Checker (Google) 28 tools , analysis Website Security Checker (Norton) 27 tools , analysis AES Encrypter and Decrypter 26 tools , exploration , encryption Blowfish Hash Generator 25 tools , exploration , hashing Browser Fingerprint Checker 24 tools , exploration , browsers “chmod” Calculator 23 tools , exploration , permissions CSR Decoder 22 tools , exploration Device Vulnerability Checker 21 tools , exploration , vulnerabilities Executable File Analyzer 20 tools , exploration Hash Generator 19 tools , exploration , hashing HMAC Checker 18 tools , exploration MD5 Hash Generator 17 tools , exploration , hashing Password Generator (Arantius.com) 16 tools , exploration , passwords Password Generator (Frontend Dogma) (fro )15 tools , exploration , frontend-dogma , passwords Password Generator (Gibson Research Corporation) 14 tools , exploration , passwords Password Security Checker and Generator 13 tools , exploration , passwords Password Security Checker 12 tools , exploration , passwords Security Leak Victim Checker 11 tools , exploration SHA-512 Hash Generator 10 tools , exploration , hashing SPF Record Generator 9 tools , exploration , dns , domains SSL Client Checker 8 tools , exploration , ssl , tls Subresource Integrity Hash Generator (moz )7 tools , exploration , hashing User Identity Generator 6 tools , exploration , placeholders , randomness Website Headers Analyzer (Dries Buytaert) (dri )5 tools , analysis , http , http-headers WebRTC and IP Address Leak Checker 4 tools , exploration , network , webrtc , ip , protocols security.txt Generator 3 tools , exploration , content ASCII to Unicode Encoder and Decoder 2 tools , exploration , conversion , unicode , encoding SSL Checker (EXPERTE.com) 1 tools , analysis , ssl , certificates