A Security Checklist for Your React and Next.js Apps (the )Jan 26, 2026 497 react , nextjs Security (vik +/htt )Jan 16, 2026 496 web-almanac , studies , research , metrics , tls , certificates , cookies , csp , http-headers , apis , sanitization , configuration Node.js January 2026 Security Release: What Changed and Why It Matters (nod )Jan 14, 2026 495 nodejs Tuesday, January 13, 2026 Security Releases (nod )Jan 13, 2026 494 release-notes , nodejs Mitigating Denial-of-Service Vulnerability From Unrecoverable Stack Space Exhaustion for React, Next.js, and APM Users (mco +/nod )Jan 13, 2026 493 nodejs , vulnerabilities , react , nextjs , tooling , monitoring , performance npm to Implement Staged Publishing After Turbulent Shift Off Classic Tokens (sar /soc )Jan 7, 2026 492 npm , dependencies , github Security Basics for Vibe-Coders (owe /pro )Jan 2, 2026 491 fundamentals , vibe-coding , ai Testing Methods: Accessible Authentication (Enhanced) (dec )Dec 29, 2025 490 accessibility , testing , wcag , authentication Testing Methods: Accessible Authentication (Minimum) (dec )Dec 28, 2025 489 accessibility , testing , wcag , authentication Denial of Service and Source Code Exposure in React Server Components (rea )Dec 11, 2025 488 react , components Thursday, December 18, 2025 Security Releases (nod )Dec 8, 2025 487 release-notes , nodejs How We’re Protecting Our Newsroom From npm Supply Chain Attacks (rya /pnp )Dec 5, 2025 486 npm , dependencies , case-studies No More Tokens—Locking Down npm Publish Workflows (zac )Dec 4, 2025 485 npm , dependencies , github , processes [Next.js] Security Advisory: CVE-2025-66478 (seb )Dec 3, 2025 484 nextjs Critical Security Vulnerability in React Server Components (rea )Dec 3, 2025 483 react , components Decreasing [Let’s Encrypt] Certificate Lifetimes to 45 Days (mat /let )Dec 2, 2025 482 http , certificates , lets-encrypt Taking Down Next.js Servers for 0.0001 Cents a Pop Nov 26, 2025 481 servers , nextjs , vulnerabilities The Shai-Hulud 2.0 npm Worm: Analysis, and What You Need to Know Nov 25, 2025 480 npm , dependencies GitLab Discovers Widespread npm Supply Chain Attack (git )Nov 24, 2025 479 npm , dependencies , gitlab , github , aws , gcp , azure Automated npm Secret Rotation in GitHub Actions (mhe )Nov 16, 2025 478 npm , automation , github-actions What Developers Really Mean by “Bad Code” (jet )Nov 12, 2025 477 maintainability , scalability , consistency , quality Introducing the OWASP Top 10:2025 (she +/owa )Nov 5, 2025 476 introductions , owasp , vulnerabilities Removing XSLT for a More Secure Browser (dro /dev )Oct 29, 2025 475 chromium , chrome , google , browsers , xsl , web-platform Will npm’s New Security Steps Stop Attacks? (rev )Oct 28, 2025 474 npm , github , maintenance , foss HTTPS by Default (jde +)Oct 28, 2025 473 http , chrome , google , browsers Agentic AI and Security (ksi /mfo )Oct 28, 2025 472 ai , architecture Octoverse: A New Developer Joins GitHub Every Second as AI Leads TypeScript to #1 (git )Oct 28, 2025 471 github , metrics , productivity , ai , foss , programming Glassworm: First Self-Propagating Worm Using Invisible Code Hits OpenVSX Marketplace Oct 18, 2025 470 code-editors , vs-code , microsoft Improving the Trustworthiness of JavaScript on the Web (clo )Oct 16, 2025 469 javascript , web-apps Past Time for Passkeys (nor )Oct 15, 2025 468 videos , passkeys , passwords , authentication Secure Coding in JavaScript Oct 15, 2025 467 javascript , frameworks My Conclusions After Using Signed Exchanges on My Website for 2 Years (paw )Oct 9, 2025 466 signed-exchanges , performance Lazy-Loading as a Security Measure Oct 6, 2025 465 lazy-loading , angular , react Backend Concepts Every Experienced Developers Must Know Oct 4, 2025 464 concepts , network , concurrency , apis , databases , caching , scalability , observability , architecture Fixing Safari Mixed Content Issues With Vite and mkcert Oct 3, 2025 463 safari , apple , browsers , vite , tooling How Deno Protects Against npm Exploits (den )Sep 30, 2025 462 deno , npm Strengthening npm Security: Important Changes to Authentication and Token Management (git )Sep 29, 2025 461 npm How Hackers Use AI to Find Vulnerabilities Faster Sep 25, 2025 460 ai CAPTCHA, When Security Takes Precedence Over Accessibility Sep 22, 2025 459 captcha , accessibility Our Plan for a More Secure npm Supply Chain (xco /git )Sep 22, 2025 458 npm , dependencies , foss npm Security Best Practices Sep 21, 2025 457 npm , provenance , best-practices This May Be the Worst One (the )Sep 17, 2025 456 videos , npm , dependencies Ongoing Supply Chain Attack Targets CrowdStrike npm Packages (pvd +/soc )Sep 16, 2025 455 npm , dependencies ctrl/tinycolor and 40+ npm Packages Compromised Sep 15, 2025 454 npm , dependencies How Maintainer Burnout Is Causing a Kubernetes Security Disaster (the )Sep 11, 2025 453 kubernetes , maintenance , foss , economics Oh No, Not Again… a Meditation on npm Supply Chain Attacks (tan )Sep 9, 2025 452 npm , dependencies , microsoft Anatomy of a Billion-Download npm Supply-Chain Attack Sep 8, 2025 451 npm , dependencies npm Author Qix Compromised via Phishing Email in Major Supply Chain Attack (bur +/soc )Sep 8, 2025 450 npm , dependencies CORS Explained: Stop Struggling With Cross-Origin Errors Sep 3, 2025 449 cors , http-headers , http How OpenJS-Hosted Projects Benefit From Security Support (ope )Sep 2, 2025 448 openjs , hosting , foss Why You Absolutely Need to Have Automated Dependency Management in Place (j9t )Aug 28, 2025 447 dependencies , maintainability , maintenance , automation , tooling What Your Website’s Style Says About You—and How Hackers Can Use It Against You (err )Aug 1, 2025 446 css , javascript Hardening Node.js Apps in Production: 8 Layers of Practical Security Jul 29, 2025 445 nodejs , best-practices eslint-config-prettier Compromised: How npm Package With 30 Million Downloads Spread Malware Jul 21, 2025 444 prettier , eslint , npm , malware AI Agents Are Creating a New Security Nightmare for Enterprises and Startups (the )Jul 18, 2025 443 ai , apis npm Phishing Email Targets Developers With Typosquatted Domain (sar /soc )Jul 18, 2025 442 npm Tuesday, July 15, 2025 Security Releases (nod )Jul 15, 2025 441 release-notes , nodejs Contagious Interview Campaign Escalates With 67 Malicious npm Packages and New Malware Loader (soc )Jul 14, 2025 440 npm , dependencies MCP Security Vulnerabilities and Attack Vectors Jun 27, 2025 439 mcp , ai A New Era of Code Quality Jun 24, 2025 438 quality JWTs Are Not Session Tokens, Stop Using Them Like One Jun 21, 2025 437 json-web-tokens , authentication Design Patterns for Securing LLM Agents Against Prompt Injections (sim )Jun 13, 2025 436 studies , research , ai , prompting , software-design-patterns The Growing Risk of Malicious Browser Extensions (soc )Jun 13, 2025 435 browser-extensions Escaping “<” and “>” in Attributes—How It Helps Protect Against Mutation XSS (sec )Jun 12, 2025 434 html , attributes , xss , escaping , chrome , google , browsers HTML Spec Change: Escaping “<” and “>” in Attributes (sec /dev )Jun 12, 2025 433 html , attributes , escaping , xss Beware of End-of-Life Node.js Versions—Upgrade or Seek Post-EOL Support (mco /nod )Jun 6, 2025 432 nodejs , maintenance How to Access Local MCP Servers Through a Secure Tunnel (the )Jun 5, 2025 431 how-tos , mcp , ai , servers , network Docker Launches Hardened Images, Intensifying Secure Container Market (the )May 19, 2025 430 docker Modernizing Security May 17, 2025 429 modernization , processes Securing Your Node.js App From Command Injection May 14, 2025 428 nodejs Passkeys for Normal People (tro )May 5, 2025 427 authentication , passkeys , examples , concepts npm Targeted by Malware Campaign Mimicking Familiar Library Names (soc )May 2, 2025 426 npm , malware , dependencies , link-lists What Is an Encryption Backdoor? (int )May 2, 2025 425 encryption , vulnerabilities , concepts Cybersecurity Leaders Are Staying in the Shadows (ste )Apr 26, 2025 424 community , culture Threat Actors Misuse Node.js to Deliver Malware and Other Malicious Payloads (mic )Apr 15, 2025 423 nodejs , malware Principles for Coding Securely With LLMs (sea )Apr 15, 2025 422 ai , principles TLS Certificate Lifetimes Will Officially Reduce to 47 Days Apr 14, 2025 421 tls , certificates LLMs Can’t Stop Making Up Software Dependencies and Sabotaging Everything (tho /the )Apr 12, 2025 420 ai , dependencies Secure a Vue App With OpenID Connect and the BFF Pattern (due )Apr 9, 2025 419 vuejs , authentication , backend-for-frontend Teaching Code in the AI Era: Why Fundamentals Still Matter (ali )Apr 4, 2025 418 training , ai , programming , vibe-coding , scalability , performance , quality , testing , documentation Stop Using Jenkins in 2025 (oso )Apr 1, 2025 417 jenkins , github-actions , ci-cd Node.js Test CI Security Incident (nod )Mar 31, 2025 416 nodejs , retrospectives Website Hijack Campaign Now Impacting 150,000 Sites (gad )Mar 27, 2025 415 Malware Found on npm Infecting Local Package With Reverse Shell (rev )Mar 26, 2025 414 npm , dependencies Five Things Vibe Coders Should Know (From a Software Engineer) (uxd )Mar 20, 2025 413 vibe-coding , sanitization GitHub Suffers a Cascading Supply Chain Attack Compromising CI/CD Secrets (inf )Mar 19, 2025 412 github , ci-cd How to Prevent WordPress SQL Injection Attacks (sma )Mar 13, 2025 411 how-tos , wordpress , sql , databases Lazarus Strikes npm Again With New Wave of Malicious Packages (soc )Mar 10, 2025 410 npm , dependencies Updates on CVE for End-of-Life Versions (raf /nod )Mar 7, 2025 409 nodejs What Is the OWASP Top 10 and How Can Your Team Benchmark Security? (jet )Mar 7, 2025 408 owasp , vulnerabilities , qodana , jetbrains How to Protect Your Web Applications From XSS (tor /w3c )Mar 6, 2025 407 how-tos , web-apps , xss In Tech, What Matters and What Is Dangerous (ham )Mar 6, 2025 406 community , foss , open-web Secure UX: Building Cybersecurity and Privacy Into the UX Lifecycle (uxm )Mar 3, 2025 405 user-experience , processes The Fallacy of Balance: Challenging the Notion of Security and Accessibility as Opposing Objectives (deq )Feb 26, 2025 404 videos , accessibility It Is No Longer Safe to Move Our Governments and Societies to U.S. Clouds (ber )Feb 23, 2025 403 cloud-computing , privacy , legal How OWASP Helps You Secure Your Full-Stack Web Applications (eri /sma )Feb 18, 2025 402 owasp , monitoring , authentication , vulnerabilities , configuration , csrf , cryptography , authorization 10 Common Web Development Mistakes to Avoid Right Now Feb 17, 2025 401 mistakes , mobile , performance , accessibility , seo , navigation , analytics , testing Tightening Every Bolt (bag )Feb 8, 2025 400 videos , processes , code-reviews , testing On Generative AI Security (sch )Feb 5, 2025 399 ai , lessons , microsoft Understanding CORS Errors in Signed Exchanges (paw )Jan 31, 2025 398 cors , errors , signed-exchanges Keep Your Node.js Apps Secure With “npx is-my-node-vulnerable” (tre )Jan 29, 2025 397 packages , npm , nodejs How I Open-Sourced My Secret Access Tokens From GitHub, Slack, and npm—and Who Actually Cares Jan 24, 2025 396 github , slack , npm Node.js EOL Versions CVE Dubbed the “Worst CVE of the Year” by Security Experts (sar /soc )Jan 24, 2025 395 nodejs , documentation Tuesday, January 21, 2025 Security Releases (raf /nod )Jan 21, 2025 394 release-notes , nodejs APIs Are Quickly Becoming the Latest Security Battleground (and Nightmare) (the )Jan 14, 2025 393 apis CDN-First Is No Longer a Performance Feature (osv )Jan 12, 2025 392 content-delivery , performance , caching , embed-code , privacy The Cyber-Cleanse: Take Back Your Digital Footprint (cyb )Jan 1, 2025 391 privacy 15 Principles for Secure Programming (rak )Dec 23, 2024 390 principles , validation , testing Important Topics for Frontend Developers to Master in 2025 Dec 21, 2024 389 learning , javascript , typescript , css , frameworks , git , apis , testing , performance , ci-cd , websockets Developer Guide: How to Implement Passkeys Dec 16, 2024 388 guides , how-tos , authentication , passkeys How to Automate OWASP Security Reviews in Your Pull Requests? (cod )Dec 16, 2024 387 how-tos , owasp , automation , code-reviews , coderabbit 5 Technical Trends to Help Web Developers Stand Out in 2025 (the )Dec 10, 2024 386 trends , career , javascript , ai , low-and-no-code Avoid Hotlinking Images With “Cross-Origin-Resource-Policy” Nov 27, 2024 385 images Content Security Policy Level 3 (mik /w3c )Nov 22, 2024 384 standards , csp Security (htt )Nov 11, 2024 383 web-almanac , studies , research , metrics JavaScript Import Attributes (ES2025) (tre )Nov 10, 2024 382 javascript Exploring Internet Traffic Shifts and Cyber Attacks During the 2024 U.S. Election (clo )Nov 6, 2024 381 traffic Securing Your Express REST API With Passport.js Nov 3, 2024 380 nodejs , express , json-web-tokens , apis , rest , tooling SecretLint—a Linter for Preventing Committing Credentials (tre )Oct 22, 2024 379 tooling , linting The Importance of UX in Cybersecurity (uxm )Oct 21, 2024 378 user-experience , usability Understanding “npm audit” and Fixing Vulnerabilities Oct 21, 2024 377 npm , vulnerabilities , nodejs Top 4 Web Vulnerabilities With Example and Mitigation Oct 21, 2024 376 vulnerabilities , sql , databases , xss , csrf How to Implement Content Security Policy (CSP) Headers for Astro (tre )Oct 16, 2024 375 how-tos , http , http-headers , csp , astro , vercel , cloudflare Why Code Security Matters—Even in Hardened Environments Oct 8, 2024 374 vulnerabilities , file-handling , nodejs Database 101: SSL/TLS for Beginners Oct 4, 2024 373 introductions , databases , ssl , tls , authentication Cloudflare Study: 39% of Companies Losing Control of Their IT and Security Environment (tre )Oct 3, 2024 372 studies , research , engineering-management NIST Recommends Some Common-Sense Password Rules (sch )Sep 27, 2024 371 passwords , guidelines I Finally Understand OAuth Sep 24, 2024 370 authorization , oauth , processes Fake GitHub Site Targeting Developers (jul /san )Sep 19, 2024 369 github Hacking Cars in JavaScript (Running Replay Attacks in the Browser With the HackRF) (dev )Sep 16, 2024 368 javascript Gaining Access to Anyone’s Browser Without Them Even Visiting a Website Sep 7, 2024 367 arc , the-browser-company , browsers , vulnerabilities 10 AI Dangers and Risks and How to Manage Them (rin )Sep 3, 2024 366 ai , privacy , sustainability , legal Web Security: Shaping the Secure Web (set /w3c )Aug 21, 2024 365 web , w3c 5 Wasm Use Cases for Frontend Development (ele /des )Aug 21, 2024 364 guest-posts , webassembly , performance What Is Incident Response? Aug 20, 2024 363 incident-response , overviews Migrating From Netlify to Cloudflare for AI Bot Protection (sia )Aug 6, 2024 362 migrating , netlify , cloudflare , ai The Great npm Garbage Patch Aug 6, 2024 361 dependencies , npm , spam Frontend Security Checklist (tre )Jul 30, 2024 360 checklists , react Automated Ways to Security Audit Your Website Jul 28, 2024 359 auditing , automation , tooling Secure Node.js Applications From Supply Chain Attacks Jul 25, 2024 358 nodejs , best-practices , dependencies The Cloud Run Security Gap You Didn’t Know You Had (and How to Fix It) Jul 18, 2024 357 google , gcp The Pitfalls of In-App Browsers (fro )Jul 18, 2024 356 browsers , mobile , privacy , user-experience Supply Chain Security in npm—We Can Be Optimistic About the Future Jul 9, 2024 355 npm , dependencies , provenance Script Integrity (chr /fro )Jul 5, 2024 354 embed-code , javascript Introducing the MDN HTTP Observatory (mdn )Jul 2, 2024 353 introductions , mdn , mozilla , http Tuesday, July 2, 2024 Security Releases (nod )Jul 2, 2024 352 release-notes , nodejs WebAuthn: Enhancing Security With Minimal Effort (tbe )Jul 2, 2024 351 authentication , webauthn RegreSSHion: Remote Unauthenticated Code Execution Vulnerability in OpenSSH Server Jul 1, 2024 350 ssh , vulnerabilities Polyfill Supply Chain Attack Embeds Malware in JavaScript CDN Assets Jun 26, 2024 349 malware , vulnerabilities Catching Compromised Cookies Jun 25, 2024 348 cookies , testing Backdoor Slipped Into Multiple WordPress Plugins in Ongoing Supply-Chain Attack (dan /ars )Jun 24, 2024 347 wordpress , plugins The Hacking of Culture and the Creation of Socio-Technical Debt (sch )Jun 19, 2024 346 culture OAuth Authentication (rya )Jun 15, 2024 345 authentication , authorization , oauth Researchers Uncover npm Registry Vulnerability to Cache Poisoning and DoS Attacks (sar /soc )Jun 15, 2024 344 npm , dependencies , vulnerabilities , caching What Is Mixed Content? (fre )Jun 15, 2024 343 http The Ultimate Guide to Iframes (log )Jun 6, 2024 342 guides , iframes , html , javascript How a Single Vulnerability Can Bring Down the JavaScript Ecosystem Jun 3, 2024 341 javascript , npm , dependencies , caching , vulnerabilities JavaScript Security: Simple Practices to Secure Your Frontend May 15, 2024 340 javascript , dependencies , csp Manifesto for a Humane Web (mic )May 10, 2024 339 websites , manifestos , web , principles , accessibility , dei , sustainability , user-experience Securing Client-Side JavaScript (ada )May 5, 2024 338 javascript , graceful-degradation Poor Express Authentication Patterns in Node.js and How to Avoid Them May 3, 2024 337 express , nodejs , authentication Passkeys: A Shattered Dream (fir )Apr 26, 2024 336 authentication , passkeys Using Legitimate GitHub URLs for Malware (sch )Apr 22, 2024 335 malware , github When Security and Accessibility Clash: Why Are Banking Applications So Inaccessible? (nic )Apr 17, 2024 334 accessibility Open Source Security (OpenSSF) and OpenJS Foundations Issue Alert for Social Engineering Takeovers of Open Source Projects (ope )Apr 15, 2024 333 foss , openjs Wednesday, April 10, 2024 Security Releases (raf /nod )Apr 10, 2024 332 release-notes , nodejs Node.js Secure Coding: Mitigate and Weaponize Code Injection Vulnerabilities Apr 8, 2024 331 books , nodejs , vulnerabilities The Free Software Commons (jen )Apr 5, 2024 330 foss , community The V8 Sandbox Apr 4, 2024 329 v8 Building a Digital Fortress: How to Strengthen DNS Against DDoS Attacks? Apr 3, 2024 328 dns Using JSON Web Tokens With Node.js Apr 3, 2024 327 json-web-tokens , nodejs , authentication Wednesday, April 3, 2024 Security Releases (nod )Apr 3, 2024 326 release-notes , nodejs In-App Browsers Are Still a Privacy, Security, and Choice Problem (tho /the )Mar 27, 2024 325 browsers , mobile , privacy CORS Finally Explained—Simply Mar 24, 2024 324 csrf , cors , concepts How Does Single Sign-On (SSO) Work? (mil )Mar 24, 2024 323 authentication How npm Install Scripts Can Be Weaponized: A Real-World Example of a Harmful npm Package (eth )Mar 3, 2024 322 npm , dependencies , examples Preventing SQL Injection Attacks in Node.js Feb 20, 2024 321 nodejs , databases , sql Frontend Application Security: Tips and Tricks Feb 16, 2024 320 web-apps , xss , csrf , authentication , dependencies , csp , validation , tips-and-tricks Wednesday, February 14, 2024 Security Releases (raf +/nod )Feb 14, 2024 319 release-notes , nodejs How to Boost WordPress Security and Protect Your SEO Ranking Feb 12, 2024 318 how-tos , wordpress , seo Malicious npm Package Masquerades as Noblox.js, Targeting Roblox Users for Data Theft (sar /soc )Feb 6, 2024 317 npm , dependencies Practice Safe DSD With “setHTMLUnsafe” (It’s Complicated) (jar /van )Jan 31, 2024 316 html , dom , shadow-dom , apis Tuesday, February 6, 2024 Security Releases (raf /nod )Jan 30, 2024 315 release-notes , nodejs JWT vs. Session Authentication Jan 25, 2024 314 authentication , json-web-tokens , comparisons GitHub, npm Registry Abused to Host SSH Key-Stealing Malware Jan 24, 2024 313 github , npm , malware , foss Navigating JavaScript Security: Recompiling Firefox to Bypass Anti-Debugger Techniques (gli )Jan 20, 2024 312 javascript , debugging , firefox , mozilla , browsers Deceptive Deprecation: The Truth About npm Deprecated Packages Jan 18, 2024 311 deprecation , npm , dependencies , research Safely Accessing the DOM With Angular SSR (dev )Jan 17, 2024 310 dom , javascript , angular , server-side-rendering Node.js Security Progress Report—Progress on Permission Model, Fuzzer, and Connections With Community (ope )Jan 16, 2024 309 nodejs I Hate CORS Jan 14, 2024 308 videos , cors Building Multiple Progressive Web Apps on the Same Domain (dev )Jan 4, 2024 307 videos , web-apps , progressive-web-apps , architecture Session-Based vs. Token-Based Authentication: Which Is Better? Dec 23, 2023 306 authentication , json-web-tokens , comparisons 10 Best Practices for Secure Code Review of Node.js Code Dec 20, 2023 305 best-practices , code-reviews , nodejs Security Headers Using “<meta>” (sap /mat )Dec 7, 2023 304 csp , html Blind CSS Exfiltration: Exfiltrate Unknown Web Pages Dec 5, 2023 303 css Mastering Cryptography Fundamentals With Node’s “crypto” Module Nov 11, 2023 302 cryptography , nodejs Secure Code Review Tips to Defend Against Vulnerable Node.js Code Nov 8, 2023 301 nodejs , code-reviews Understanding CORS Nov 4, 2023 300 cors Secret Scanning Scans Public npm Packages (git )Oct 26, 2023 299 github , npm , dependencies What the !#@% Is a Passkey? (eff )Oct 26, 2023 298 passkeys Local HTTPS for Next.js 13.5 (ami )Oct 10, 2023 297 testing , http , nextjs Understanding XSS Attacks Oct 5, 2023 296 xss A Comprehensive Guide to the Dangers of Regular Expressions in JavaScript (phi )Sep 28, 2023 295 guides , javascript , regex Best Practices for Securing Node.js Applications in Production Sep 27, 2023 294 best-practices , nodejs SSH Keys Stolen by Stream of Malicious PyPI and npm Packages (ble )Sep 27, 2023 293 ssh , dependencies , npm npm Provenance General Availability (git )Sep 26, 2023 292 github , npm , provenance Open Source Trends to Look for in 2024 Sep 21, 2023 291 foss , trends , outlooks , ai The WebP 0-Day Sep 21, 2023 290 webp , google , apple Securing Your Node.js Apps by Analyzing Real-World Command Injection Examples Sep 15, 2023 289 nodejs , history , examples How to Implement SSL/TLS Pinning in Node.js Aug 29, 2023 288 how-tos , ssl , tls , nodejs A More Intelligent and Secure Web (ple /w3c )Aug 24, 2023 287 videos , w3c , standards , web , web-platform Demystifying CORS: Understanding How Cross-Origin Resource Sharing Works Aug 18, 2023 286 cors , javascript Towards HTTPS by Default (jde /dev )Aug 16, 2023 285 browsers , google , chrome , http , tls Sophisticated, Highly-Targeted Attacks Continue to Plague npm Aug 12, 2023 284 npm An Update on Chrome Security Updates—Shipping Security Fixes to You Faster Aug 8, 2023 283 browsers , google , chrome Tuesday, August 8, 2023 Security Releases (raf /nod )Jul 31, 2023 282 release-notes , nodejs SECURITY.md: Should I Have It? (mry /ecl )Jul 31, 2023 281 documentation Publishing With npm Provenance From Private Source Repositories Is No Longer Supported (git )Jul 26, 2023 280 github , npm , provenance , foss Social Engineering Campaign Targeting Tech Employees Spreading Through npm Malware (soc )Jul 25, 2023 279 malware , npm Securing the Web Forward: Addressing Developer Concerns in Web Security (tor /w3c )Jul 24, 2023 278 web , surveys Encoding: A Brief History and Its Role in Cybersecurity Jul 19, 2023 277 encoding , unicode , history User Input Sanitization and Validation: Securing Your App Jul 19, 2023 276 sanitization , validation , conformance Node.js Security Progress Report—17 Reports Closed (ope )Jul 17, 2023 275 nodejs The Importance of Verifying Webhook Signatures Jun 29, 2023 274 webhooks The Massive Bug at the Heart of the npm Ecosystem Jun 27, 2023 273 npm , dependencies All You Need to Know About CORS and CORS Errors Jun 23, 2023 272 cors , errors Understanding Authorization Before Authentication: Enhancing Web API Security Jun 23, 2023 271 authorization , authentication , apis , comparisons An Introduction to Command Injection Vulnerabilities in Node.js and JavaScript Jun 23, 2023 270 introductions , vulnerabilities , nodejs , javascript Django: A Security Improvement Coming to “format_html()” (ada )Jun 15, 2023 269 django , html Tuesday, June 20, 2023 Security Releases (raf /nod )Jun 13, 2023 268 release-notes , nodejs security.txt Now Mandatory for Dutch Government Websites May 31, 2023 267 legal File Upload Security and Malware Protection (aus )May 23, 2023 266 malware , file-handling , edge-computing Security Implications of HTTP Response Headers May 3, 2023 265 http , http-headers The Case Against Automatic Dependency Updates (ben )Apr 21, 2023 264 dependencies , automation , ci-cd , maintenance Automating Dependency Updates: The Big Debate Apr 21, 2023 263 dependencies , automation , ci-cd Generating Provenance Statements Apr 19, 2023 262 npm , provenance Introducing npm Package Provenance (git )Apr 19, 2023 261 introductions , github , npm , provenance , foss 8 Best Tools for Cryptography and Encryption (sta )Apr 18, 2023 260 link-lists , tooling , comparisons , cryptography , encryption , privacy Dissecting npm Malware: Five Packages and Their Evil Install Scripts Apr 15, 2023 259 npm , malware Passkeys: What the Heck and Why? (css )Apr 12, 2023 258 passkeys Senior Engineering Strategies for Advanced React and TypeScript (tec )Mar 25, 2023 257 strategies , react , typescript , architecture , testing , performance , accessibility , maintenance Cryptographically Protecting Your SPA Mar 17, 2023 256 single-page-apps , cryptography Without Accessibility, There Is No Privacy or Security Feb 28, 2023 255 accessibility , privacy Tips for Handling Dependabot, CodeQL, and Secret Scanning Alerts Feb 28, 2023 254 alerting , dependabot , tips-and-tricks How to Password-Protect a Static HTML Page With No JS (ede )Feb 20, 2023 253 how-tos , css , fonts SSL Certificates Explained Feb 20, 2023 252 videos , certificates , ssl , protocols Quick Tip: How to Hash a Password in PHP Feb 14, 2023 251 how-tos , php , passwords , tips-and-tricks Sandboxing JavaScript Code Feb 12, 2023 250 javascript Unlocking Security Updates for Transitive Dependencies With npm (git )Jan 19, 2023 249 npm , dependencies , maintenance 7 Required Steps to Secure Your Iframes Security Jan 4, 2023 248 iframes , xss , html , http-headers , csp Conditional API Responses for JavaScript vs. HTML Forms (aus )Jan 3, 2023 247 javascript , html , forms , comparisons Why Do We Need Authorization and Authentication? Dec 30, 2022 246 authorization , authentication The Top 10 Security Vulnerabilities for Web Applications Dec 20, 2022 245 vulnerabilities , web-apps Leaked a Secret? Check Your GitHub Alerts… for Free (git )Dec 15, 2022 244 github DOM Clobbering (fre /mat )Dec 12, 2022 243 dom New npm Features for Secure Publishing and Safe Consumption (git )Dec 6, 2022 242 npm , dependencies Using SRI to Protect From Malicious JavaScript (mat )Dec 3, 2022 241 javascript WordPress Versions 3.7–4.0 No Longer Get Security Updates (sar )Nov 30, 2022 240 wordpress “Not Secure” Warning for IE Mode Nov 16, 2022 239 browsers , microsoft , edge , internet-explorer Node.js Security Best Practices (nod )Nov 10, 2022 238 nodejs , best-practices npm Security: Preventing Supply Chain Attacks Nov 7, 2022 237 npm , dependencies Secure JavaScript URL Validation Oct 17, 2022 236 javascript , validation , urls Create a Passkey for Passwordless Logins (age /dev )Oct 12, 2022 235 authentication , passkeys Designing a Secure API Oct 4, 2022 234 software-design , apis Phylum Detects Active Typosquatting Campaign Targeting npm Developers Oct 2, 2022 233 npm , dependencies Security (htt )Sep 26, 2022 232 web-almanac , studies , research , metrics Continue Using .env Files as Usual Sep 24, 2022 231 environments Quick Reminder: HTML5 “required” and “pattern” Are Not a Security Feature (cod )Sep 22, 2022 230 html , forms Stop Using .env Files Now Sep 19, 2022 229 environments Debunking Myths About HTTPS Sep 18, 2022 228 http , myths Secure Your Node.js App With JSON Web Tokens (app )Sep 14, 2022 227 nodejs , json-web-tokens Dependabot Unlocks Transitive Dependencies for npm Projects (git )Sep 7, 2022 226 dependencies , npm , dependabot JavaScript Bugs Aplenty in Node.js Ecosystem—Found Automatically Aug 30, 2022 225 studies , research , nodejs , javascript , dependencies , quality Introducing Even More Security Enhancements to npm (git )Jul 26, 2022 224 introductions , npm Top 5 npm Vulnerability Scanners Jul 20, 2022 223 npm , vulnerabilities , tooling What Is Passwordless Authentication and How to Implement It Jul 18, 2022 222 authentication , passwords GA4 Is Being Blocked by Content Security Policy Jun 25, 2022 221 csp , metrics , google Please Remove That .git Folder Jun 22, 2022 220 git Should I Have Separate GitHub Accounts for Personal and Professional Projects? Jun 14, 2022 219 discussions , github , career Understanding CSRF Attacks (zel )May 29, 2022 218 csrf npm Security Update: Attack Campaign Using Stolen OAuth Tokens (git )May 26, 2022 217 oauth , version-control , npm , github Snyk Finds 200+ Malicious npm Packages, Including Cobalt Strike Dependency Confusion Attacks May 24, 2022 216 javascript , npm , dependencies Unexpectedly HTTPS? May 16, 2022 215 http How to Respond to Growing Supply Chain Security Risks? Apr 3, 2022 214 how-tos , dependencies , nodejs , npm The Web Is for Everyone: Our Vision for the Evolution of the Web (moz )Mar 23, 2022 213 web , outlooks , privacy , accessibility , performance , user-experience Using HTTPS in Your Development Environment Mar 7, 2022 212 http , environments How to Prevent SQL Injection Attacks in Node.js Mar 3, 2022 211 how-tos , nodejs , databases , sql Can You Get Pwned With CSS? Feb 23, 2022 210 css How to Fix Your Security Vulnerabilities With npm Override Feb 23, 2022 209 how-tos , vulnerabilities , npm , dependencies Never, Ever, Ever Use Pixelation for Redacting Text Feb 15, 2022 208 content , images , obfuscation Accessibly Insecure Jan 31, 2022 207 accessibility Lessons Learned From Publishing a Content Security Policy Dec 14, 2021 206 lessons , csp Ain’t No Party Like a Third Party (ada /css )Dec 3, 2021 205 dependencies , embed-code Security (htt )Dec 1, 2021 204 web-almanac , studies , research , metrics GitHub’s Commitment to npm Ecosystem Security (git )Nov 15, 2021 203 github , npm Understanding and Implementing OAuth2 in Node.js (hon )Oct 18, 2021 202 nodejs , authorization , oauth How to Win at CORS (jaf )Oct 12, 2021 201 how-tos , cors , html , http The Options for Password-Revealing Inputs (chr /css )Oct 6, 2021 200 html , css , passwords , usability npm Security Best Practices (owa )Aug 3, 2021 199 npm , best-practices Encoding Data for POST Requests (jaf )Jun 30, 2021 198 javascript , encoding NPM Global Audit Jun 16, 2021 197 packages , npm , quality , auditing Understanding and Preventing Common Security Vulnerabilities Jun 15, 2021 196 vulnerabilities Open Source Insights Jun 3, 2021 195 websites , foss , dependencies , licensing I Learned to Love the Same-Origin Policy (eee /css )Dec 17, 2020 194 cors Is Edge Computing Secure? Here Are 4 Security Risks to Be Aware Of Dec 9, 2020 193 edge-computing TLS and mTLS Demystified Dec 9, 2020 192 tls , protocols Best Practices for Inclusive Textual Websites Nov 23, 2020 191 performance , accessibility , best-practices Clickjacking Attacks and How to Prevent Them Oct 30, 2020 190 how-tos How to Safely Use GitHub Actions in Organizations (nza )Jul 21, 2020 189 how-tos , github-actions What Is mTLS and How Does It Work? Apr 30, 2020 188 Mutual TLS: Stuff You Should Know Mar 19, 2020 187 tls , protocols Don’t Try to Sanitize Input—Escape Output Feb 27, 2020 186 sanitization , escaping Encrypting DNS Query Bad for Performance? (erw )Feb 20, 2020 185 performance , dns , http , encryption Apple Joins FIDO Alliance, Commits to Getting Rid of Passwords (zdn )Feb 12, 2020 184 apple , fido , passwords , authentication How to Automatically Update Your JavaScript Dependencies (spa /clo )Jan 30, 2020 183 how-tos , javascript , dependencies , automation , processes What SSL Is, and Which Certificate Type Is Right for You Jan 29, 2020 182 ssl , certificates , privacy , concepts Usability and Security; Better Together (24w )Dec 22, 2019 181 usability , user-experience Server-Side Includes (SSI) Injection (owa )Dec 4, 2019 180 ssi How Internet Security Works: TLS, SSL, and CA (osd )Nov 18, 2019 179 tls , ssl , protocols , certificates Security and Privacy for Our Times (luk /w3c )Sep 11, 2019 178 privacy , web-platform Web Feature Developers Told to Dial Up Attention on Privacy and Security (rip /tec )Sep 11, 2019 177 w3c , privacy , web-platform CSS Security Vulnerabilities (chr /css )Sep 9, 2019 176 css , privacy , vulnerabilities Understanding Subresource Integrity (dre /sma )Apr 9, 2019 175 hashing , embed-code W3C Strategic Highlights: Web for All (Security, Privacy, Identity) (w3c )Mar 18, 2019 174 w3c , privacy , authentication Guide to Web Authentication Jan 24, 2019 173 websites , authentication , webauthn , javascript It’s Beginning to Look a Lot Like XSSmas (24w )Dec 17, 2018 172 vulnerabilities , csrf , xss Protecting Your Site With Feature Policy (rac /sma )Dec 12, 2018 171 http-headers , http AWS Security Guide: 7 Best Practices to Avoid Security Risks (wom )Oct 31, 2018 170 guides , aws , best-practices WebAuthn, FIDO2 Infuse Browsers, Platforms With Strong Authentication (dar )Sep 19, 2018 169 w3c , fido , authentication , webauthn , browsers In Your Face, Passwords: Big Three Browsers All Adopt Authentication API Aug 1, 2018 168 authentication , webauthn , apis , edge , microsoft , chrome , google , firefox , mozilla , browsers HTTPS Is Easy (tro )Jun 27, 2018 167 websites , http WordPress Security as a Process (sma )Jun 21, 2018 166 wordpress , processes Making Your Website Faster and Safer With Cloudflare Jun 12, 2018 165 performance , caching , cloudflare Validating Dependencies in the Project With npm-check and depcheck Jun 1, 2018 164 dependencies , maintenance , auditing , tooling , npm Third Party CSS Is Not Safe (jaf )Feb 27, 2018 163 html , css , embed-code Attackers Can Steal Sensitive Data by Abusing CSS—CSS Exfil Vulnerability Feb 7, 2018 162 css , csp Building Secure JavaScript Applications Jan 18, 2018 161 javascript , xss , csrf , json-web-tokens , passwords Creating Secure Password Resets With JSON Web Tokens (sma )Nov 9, 2017 160 passwords , json-web-tokens , nodejs The Complete Guide to Switching From HTTP to HTTPS (sma )Jun 12, 2017 159 guides , http How (Not) to Control Your CDN (mno )Jun 7, 2017 158 content-delivery , caching , http How to Secure WordPress With SSL May 10, 2017 157 how-tos , wordpress , ssl Encrypting IP Addresses (ber )May 7, 2017 156 ip , network , privacy , encryption How to Secure Your Web App With HTTP Headers (sma )Apr 3, 2017 155 how-tos , web-apps , http , http-headers , csp Just Another HTTPS Nudge (chr /css )Mar 3, 2017 154 http On EME in HTML5 (tim /w3c )Feb 28, 2017 153 eme , drm , html , legal , standards , w3c Using SSH Securely (ann )Jan 24, 2017 152 ssh More Than 300 Federal Gov Websites Fail to Meet Domain Encryption Deadline Jan 4, 2017 151 http , tls , protocols , encryption Content Security Policy Level 2 (mik +/w3c )Dec 15, 2016 150 standards , csp A Checklist for Website Reviews (hcr )Dec 5, 2016 149 checklists , performance , browsers , seo , accessibility Content Security Policy, Your Future Best Friend (sma )Sep 12, 2016 148 csp , link-lists A Refined Content Security Policy (web )Aug 5, 2016 147 html , csp , webkit , safari , apple , browsers The Performance Benefits of “rel=noopener” (jaf )Jul 21, 2016 146 html , links , performance Web Platform Security Boundaries (ann )Jun 24, 2016 145 web-platform Subresource Integrity (dev +/w3c )Jun 23, 2016 144 hashing , html , standards W3C Looks to Secure the Web (sdt )Feb 17, 2016 143 w3c , authentication Distribution Packages Considered Insecure Feb 13, 2016 142 dependencies , unix-like The Current State of Web Security (An Interview With Anselm Hannemann) (hel +/css )Jan 18, 2016 141 interviews , http , ssl , tls , encryption , cloudflare , lets-encrypt Eliminating Known Vulnerabilities With Snyk (sma )Jan 13, 2016 140 vulnerabilities , tooling 10 Web Predictions for 2016 (cra )Jan 6, 2016 139 web , outlooks , site-generators , browsers , css , mobile , performance , webassembly , seo HSTS and “Let’s Encrypt” (tka )Jan 4, 2016 138 http , http-headers , ssl , lets-encrypt An in-Depth Look at CORS Dec 17, 2015 137 cors , javascript , php Indexing HTTPS Pages by Default Dec 17, 2015 136 google , search , http Why Passwordless Authentication Works (cra )Nov 10, 2015 135 authentication , passwords Introduction to TLS and SSL (ope )Aug 22, 2015 134 introductions , tls , ssl , protocols , certificates A Simple Developer Error Is Exposing Private Information on Thousands of Websites (owe )Jul 27, 2015 133 version-control , git , mistakes , vulnerabilities More Tips to Further Secure WordPress (eli )Jul 9, 2015 132 wordpress , tips-and-tricks , plugins Improving Web Security With the Content Security Policy Jun 24, 2015 131 csp , http Deprecating HTTP May 11, 2015 130 http , protocols , deprecation Mozilla Wants to Deprecate Non-Secure HTTP, Will Make Proposals to W3C “Soon” (epr /ven )Apr 30, 2015 129 mozilla , http , deprecation Want Fancy Firefox Features? Secure Your Website (sts /cne )Apr 14, 2015 128 firefox , mozilla , browsers , http WordPress Front End Security: CSRF and Nonces (css )Mar 24, 2015 127 wordpress , csrf Introduction to WordPress Front End Security: Escaping the Things (css )Mar 23, 2015 126 introductions , wordpress , escaping What Are the Security Risks of HTML5 Apps? Mar 18, 2015 125 web-apps , sanitization Moving to HTTPS on WordPress (chr /css )Mar 6, 2015 124 wordpress , http Same-Origin Policy (ann )Feb 23, 2015 123 cors , web-platform Securing the Web (w3c )Jan 23, 2015 122 web-platform HTTPS as a Ranking Signal (met )Aug 7, 2014 121 google , search , http , seo mXSS (gaz )May 6, 2014 120 xss , html It’s Time to Encrypt the Entire Internet (kli /wir )Apr 17, 2014 119 web , http , ssl , encryption 3 Tips to Find Hacking on Your Site, and Ways to Prevent and Fix It Feb 28, 2014 118 search , google , tips-and-tricks Cross-Origin Resource Sharing (ann /w3c )Jan 16, 2014 117 cors , standards Despite Automatic Updates, Old Browsers Are Still a Problem (edb /zdn )Jan 6, 2014 116 browsers , web-platform , chrome , google , firefox , mozilla , internet-explorer , microsoft , safari , apple Cross-Origin Resource Sharing on Track to Become a W3C Recommendation (sdt )Jan 3, 2014 115 w3c , cors , standards Bid to Kill CAPTCHA Security Test Gains Momentum Aug 5, 2013 114 captcha , accessibility We Should All Have Something to Hide Jun 12, 2013 113 privacy Mobile Website Security May 14, 2013 112 mobile , hosting , policies WordPress Security Tips Apr 17, 2013 111 wordpress , tips-and-tricks Brad Hill: “HTML5 Security Realities” (chr /css )Feb 22, 2013 110 slides , xss , html Bulletproof Your Drupal Website Jan 21, 2013 109 drupal Top 10 PHP Security Vulnerabilities Oct 15, 2012 108 php , vulnerabilities A Front End Engineer’s Manifesto (zac )Aug 24, 2012 107 websites , manifestos , user-experience , progressive-enhancement , simplicity , foss , accessibility , community , learning A JavaScript Security Flaw Aug 9, 2012 106 javascript The Secure Programmer’s Pledge Jul 16, 2012 105 manifestos An Introduction to Content Security Policy (mik /dev )Jun 15, 2012 104 introductions , csp Cross-Site Scripting Attacks (XSS) Apr 30, 2012 103 xss , examples How to Secure Your WordPress Website (sma )Nov 10, 2011 102 how-tos , wordpress , link-lists Using CORS (dev )Oct 26, 2011 101 cors Some Notes on the Recent XML Encryption Attack (w3c )Oct 24, 2011 100 xml , encryption XML Encryption Flaw Leaves Web Services Vulnerable (eur )Oct 24, 2011 99 web-services , xml , encryption HTTPS Is More Secure, So Why Isn’t the Web Using It? (ars )Mar 20, 2011 98 http , protocols , web Web Cryptography: Salted Hash and Other Tasty Dishes (ali )Feb 22, 2011 97 cryptography What Are the JSON Security Concerns in Web Development? (sim )Jan 6, 2011 96 json What Is Cross Site Scripting or XSS? (chr /css )Nov 19, 2010 95 xss , javascript , concepts Web Developers Accountable for HTML 5 Security Oct 5, 2010 94 html HTML5 Raises New Security Issues Aug 20, 2010 93 html , browsers 10 Useful WordPress Security Tweaks (sma )Jul 1, 2010 92 wordpress Web Security: Are You Part of the Problem? (cod /sma )Jan 14, 2010 91 vulnerabilities , php , javascript Full Frontal ’09: Chris Heilmann on JavaScript Security (mic /aja )Nov 20, 2009 90 javascript Cookies and Security (nza )May 12, 2009 89 cookies , xss , csrf Finally Something to Get a Few More Users Off of IE 6? (dal /aja )Dec 17, 2008 88 internet-explorer , microsoft , browsers The Internet Is Closing to Innovation (zit /new )Nov 28, 2008 87 web You Could Be Getting Clickjacked (tec )Nov 21, 2008 86 vulnerabilities , frames , w3c Video and Audio Tags and Cross Origin Access (dal /aja )Nov 10, 2008 85 html , multimedia Dumb Security Tips: Think Before You Follow Online Guides (tan )Oct 26, 2008 84 tips-and-tricks Simon Willison, @Media Ajax (mic /aja )Sep 16, 2008 83 ajax , xss , csrf , javascript , json Frame-Busting Gadgets (mic )Sep 16, 2008 82 frames , iframes Evil GIFs: Hiding Java in Your Image (dal /aja )Jul 4, 2008 81 gif , images , java What’s in a “window.name”? (cod /aja )May 13, 2008 80 javascript Internet Explorer 8 Promises Better Standards Compliance… and a Whole Lot More (est /cio )Mar 6, 2008 79 internet-explorer , microsoft , browsers , standards Ajaxian Roundup for January 2008: JavaScript Turtles and IE 8 (dal /aja )Feb 2, 2008 78 javascript , prototypejs , dojo , extjs , jquery , gwt , yui , dwr , gears , flash , air , json , browsers , standards , css , design , comet , ajaxian , link-lists Book Recommendation: AJAX Security by Hoffman and Sullivan Jan 16, 2008 77 books , ajax , javascript Ajaxian Roundup for December 2007: It’s the End of the Year as We Know It (dal /aja )Jan 1, 2008 76 browsers , javascript , prototypejs , extjs , yui , jquery , microsoft , dwr , performance , gwt , comet , css , mobile , ajaxian , link-lists Cross Site Scripting Joy (tri )Dec 4, 2007 75 xss Making JavaScript Safe With No Script (dal /aja )Nov 8, 2007 74 javascript Automated Security Scanners Choke on AJAX (rey /aja )Oct 8, 2007 73 ajax , javascript Quick Security Checklist for Webmasters Sep 18, 2007 72 checklists How to Protect a JSON or JavaScript Service Apr 4, 2007 71 how-tos , json , javascript Securing Your JSON Mar 13, 2007 70 json , javascript , arrays CSRF Protection Idea (dal /aja )Feb 8, 2007 69 csrf JavaScript Security Experiments (mar )Feb 7, 2007 68 javascript , experiments Security vs. Usability (nza )Jan 19, 2007 67 usability Prepare for Attack—Making Your Web Applications More Secure Jan 16, 2007 66 web-apps , sql , xss , examples JSON vs. XML: Browser Security Model (car )Jan 2, 2007 65 browsers , json , xml , comparisons The Dangers of Cross-Domain AJAX With Flash (shi )Sep 24, 2006 64 ajax , javascript , flash DOM vs. Web (mno )Apr 20, 2006 63 http , dom AJAX: Is Your Application Secure Enough? Apr 5, 2006 62 ajax , javascript , web-apps AJAX, XHR, JavaScript, and Cross Domain Security Story Dec 30, 2005 61 ajax , javascript Top 7 PHP Security Blunders Dec 21, 2005 60 php , databases , sql How to Make “XMLHttpRequest” Calls to Another Server in Your Domain Nov 28, 2005 59 how-tos , javascript IE Frame Bug (dal /aja )Jun 21, 2005 58 internet-explorer , microsoft , browsers , frames Validate Your Input! May 9, 2005 57 validation JavaScript Security Oct 4, 2004 56 javascript File Upload Security (lac )Sep 8, 2004 55 html , file-handling Spot the Security Hole Jul 3, 2004 54 php JavaScript and Security (sim )Apr 19, 2004 53 javascript Handling Content From Strangers Mar 26, 2004 52 content Web Services Security Gets Serious Apr 23, 2003 51 web-services Getting Started With XML Security Nov 28, 2002 50 introductions , xml Sorting Out the Web Services Security Landscape (tec )Aug 28, 2002 49 web-services , ssl , w3c Website Experience Analyzer 48 tools , analysis , performance , user-experience Server Port Scanner 47 tools , analysis , network , servers Abuse Contact Lookup 46 tools , analysis , policies Content Security Policy Validator (CSP Validator) 45 tools , analysis , csp , conformance Content Security Policy Validator (Google) 44 tools , analysis , csp , conformance Cookie Use Checker 43 tools , analysis , cookies Cross-Site WebSocket Hijacking Tester 42 tools , analysis DNSSEC Checker 41 tools , analysis , dns Domain or IP Spam Checker 40 tools , analysis , domains , ip Email Blacklist Checker 39 tools , analysis , email Malware and Security Scanner 38 tools , analysis Site and Origin Comparer 37 tools , analysis , comparisons SPF Record Checker 36 tools , analysis , dns , domains SSL Checker (Qualys) 35 tools , analysis , ssl , certificates SSL Checker (SSL Shopper) 34 tools , analysis , ssl , certificates Virus Scanner 33 tools , analysis Website Certificate Fingerprint Checker 32 tools , analysis , certificates Website Headers Analyzer (Mozilla) (moz )31 tools , analysis , http , http-headers Website Headers Analyzer (Security Headers) 30 tools , analysis , http , http-headers Website Scam Checker 29 tools , analysis Website Security Checker (Google) 28 tools , analysis Website Security Checker (Norton) 27 tools , analysis AES Encrypter and Decrypter 26 tools , exploration , encryption Blowfish Hash Generator 25 tools , exploration , hashing Browser Fingerprint Checker 24 tools , exploration , browsers “chmod” Calculator 23 tools , exploration , permissions CSR Decoder 22 tools , exploration Device Vulnerability Checker 21 tools , exploration , vulnerabilities Executable File Analyzer 20 tools , exploration Hash Generator 19 tools , exploration , hashing HMAC Checker 18 tools , exploration MD5 Hash Generator 17 tools , exploration , hashing Password Generator (Arantius.com) 16 tools , exploration , passwords Password Generator (Frontend Dogma) (fro )15 tools , exploration , frontend-dogma , passwords Password Generator (Gibson Research Corporation) 14 tools , exploration , passwords Password Security Checker and Generator 13 tools , exploration , passwords Password Security Checker 12 tools , exploration , passwords Security Leak Victim Checker 11 tools , exploration SHA-512 Hash Generator 10 tools , exploration , hashing SPF Record Generator 9 tools , exploration , dns , domains SSL Client Checker 8 tools , exploration , ssl , tls Subresource Integrity Hash Generator (moz )7 tools , exploration , hashing User Identity Generator 6 tools , exploration , placeholders , randomness Website Headers Analyzer (Dries Buytaert) (dri )5 tools , analysis , http , http-headers WebRTC and IP Address Leak Checker 4 tools , exploration , network , webrtc , ip , protocols security.txt Generator 3 tools , exploration , content ASCII to Unicode Encoder and Decoder 2 tools , exploration , conversion , ascii , unicode , encoding SSL Checker (EXPERTE.com) 1 tools , analysis , ssl , certificates