Forem

# websecurity

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Steps to Preventing Man-in-the-Middle (MitM) Attacks in JavaScript Applications
Cover image for Steps to Preventing Man-in-the-Middle (MitM) Attacks in JavaScript Applications

Steps to Preventing Man-in-the-Middle (MitM) Attacks in JavaScript Applications

2
Comments
4 min read
Protect JWT Token from Token Forgery and Data Manipulation Attack
Cover image for Protect JWT Token from Token Forgery and Data Manipulation Attack

Protect JWT Token from Token Forgery and Data Manipulation Attack

1
Comments
3 min read
Steps to Preventing Prototype Pollution Attacks in JavaScript
Cover image for Steps to Preventing Prototype Pollution Attacks in JavaScript

Steps to Preventing Prototype Pollution Attacks in JavaScript

1
Comments
3 min read
Preventing Supply Chain Attacks in JavaScript
Cover image for Preventing Supply Chain Attacks in JavaScript

Preventing Supply Chain Attacks in JavaScript

Comments
2 min read
Understanding and Preventing Cross-Site Request Forgery (CSRF) in JavaScript
Cover image for Understanding and Preventing Cross-Site Request Forgery (CSRF) in JavaScript

Understanding and Preventing Cross-Site Request Forgery (CSRF) in JavaScript

2
Comments
3 min read
Mastering Content Security Policy (CSP) for JavaScript Applications: A Practical Guide
Cover image for Mastering Content Security Policy (CSP) for JavaScript Applications: A Practical Guide

Mastering Content Security Policy (CSP) for JavaScript Applications: A Practical Guide

Comments
3 min read
Securing Your API Keys in Frontend Projects
Cover image for Securing Your API Keys in Frontend Projects

Securing Your API Keys in Frontend Projects

Comments
2 min read
Preventing Clickjacking Attacks in JavaScript
Cover image for Preventing Clickjacking Attacks in JavaScript

Preventing Clickjacking Attacks in JavaScript

57
Comments 6
3 min read
Advanced Techniques for Detecting and Preventing JavaScript Injection Attacks
Cover image for Advanced Techniques for Detecting and Preventing JavaScript Injection Attacks

Advanced Techniques for Detecting and Preventing JavaScript Injection Attacks

2
Comments
3 min read
Ethical Hacking, Penetration Testing, and Web Security: A Comprehensive Overview

Ethical Hacking, Penetration Testing, and Web Security: A Comprehensive Overview

2
Comments 1
3 min read
Securing JavaScript Applications with Subresource Integrity (SRI): A Comprehensive Guide
Cover image for Securing JavaScript Applications with Subresource Integrity (SRI): A Comprehensive Guide

Securing JavaScript Applications with Subresource Integrity (SRI): A Comprehensive Guide

9
Comments
4 min read
GCP Cloud Armor - How to Leverage and add extra layer of security
Cover image for GCP Cloud Armor - How to Leverage and add extra layer of security

GCP Cloud Armor - How to Leverage and add extra layer of security

2
Comments
2 min read
HTTPS là gì mà web nào cũng xài (Phần 1)
Cover image for HTTPS là gì mà web nào cũng xài (Phần 1)

HTTPS là gì mà web nào cũng xài (Phần 1)

1
Comments
6 min read
Open Web Application Security Project OWASP Top Ten
Cover image for Open Web Application Security Project OWASP Top Ten

Open Web Application Security Project OWASP Top Ten

Comments
3 min read
Understanding JSON Web Tokens (JWT) and Their Use in Web Authentication

Understanding JSON Web Tokens (JWT) and Their Use in Web Authentication

5
Comments
3 min read
Enhancing Security in React with External Script Loading

Enhancing Security in React with External Script Loading

1
Comments
2 min read
Navigating the Risks of Third-Party Libraries in Web

Navigating the Risks of Third-Party Libraries in Web

Comments
4 min read
Best Security Practices for Web Browsing
Cover image for Best Security Practices for Web Browsing

Best Security Practices for Web Browsing

Comments
3 min read
Story of SSRF from Stored XSS in PDF generator application
Cover image for Story of SSRF from Stored XSS in PDF generator application

Story of SSRF from Stored XSS in PDF generator application

6
Comments 3
3 min read
OWASP Top 10 - Write-up - TryHackMe
Cover image for OWASP Top 10 - Write-up - TryHackMe

OWASP Top 10 - Write-up - TryHackMe

55
Comments
7 min read
Common Web Security Attacks and Top Tips to Protect Your Website
Cover image for Common Web Security Attacks and Top Tips to Protect Your Website

Common Web Security Attacks and Top Tips to Protect Your Website

9
Comments
2 min read
Web Security
Cover image for Web Security

Web Security

1
Comments
7 min read
Top websites for website vulnerability checks online

Top websites for website vulnerability checks online

3
Comments
2 min read
Web Security: Recon
Cover image for Web Security: Recon

Web Security: Recon

2
Comments 1
7 min read
Web Security: Introduction
Cover image for Web Security: Introduction

Web Security: Introduction

12
Comments
3 min read
loading...