Forem

# websecurity

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Mastering Web Development: Cookies, Authorization, Authentication, and File Uploads in Node.js
Cover image for Mastering Web Development: Cookies, Authorization, Authentication, and File Uploads in Node.js

Mastering Web Development: Cookies, Authorization, Authentication, and File Uploads in Node.js

1
Comments
5 min read
Securing Web Applications: Stateful vs. Stateless Systems, Authentication, and Authorization in Node.js
Cover image for Securing Web Applications: Stateful vs. Stateless Systems, Authentication, and Authorization in Node.js

Securing Web Applications: Stateful vs. Stateless Systems, Authentication, and Authorization in Node.js

8
Comments
7 min read
Unlock a New Era of Cybersecurity: Free and Open-Source WAF Makes Website Protection Effortless!

Unlock a New Era of Cybersecurity: Free and Open-Source WAF Makes Website Protection Effortless!

14
Comments
2 min read
Preventing Weak Cryptography in JavaScript
Cover image for Preventing Weak Cryptography in JavaScript

Preventing Weak Cryptography in JavaScript

Comments
3 min read
Preventing Remote Code Execution (RCE) Attacks in JavaScript Applications
Cover image for Preventing Remote Code Execution (RCE) Attacks in JavaScript Applications

Preventing Remote Code Execution (RCE) Attacks in JavaScript Applications

Comments
2 min read
Protecting Your JavaScript Applications from DOM-based XSS Attacks
Cover image for Protecting Your JavaScript Applications from DOM-based XSS Attacks

Protecting Your JavaScript Applications from DOM-based XSS Attacks

Comments
3 min read
Steps to Preventing Man-in-the-Middle (MitM) Attacks in JavaScript Applications
Cover image for Steps to Preventing Man-in-the-Middle (MitM) Attacks in JavaScript Applications

Steps to Preventing Man-in-the-Middle (MitM) Attacks in JavaScript Applications

2
Comments
4 min read
Protect JWT Token from Token Forgery and Data Manipulation Attack
Cover image for Protect JWT Token from Token Forgery and Data Manipulation Attack

Protect JWT Token from Token Forgery and Data Manipulation Attack

1
Comments
3 min read
Steps to Preventing Prototype Pollution Attacks in JavaScript
Cover image for Steps to Preventing Prototype Pollution Attacks in JavaScript

Steps to Preventing Prototype Pollution Attacks in JavaScript

1
Comments
3 min read
Preventing Supply Chain Attacks in JavaScript
Cover image for Preventing Supply Chain Attacks in JavaScript

Preventing Supply Chain Attacks in JavaScript

Comments
2 min read
Understanding and Preventing Cross-Site Request Forgery (CSRF) in JavaScript
Cover image for Understanding and Preventing Cross-Site Request Forgery (CSRF) in JavaScript

Understanding and Preventing Cross-Site Request Forgery (CSRF) in JavaScript

2
Comments
3 min read
Mastering Content Security Policy (CSP) for JavaScript Applications: A Practical Guide
Cover image for Mastering Content Security Policy (CSP) for JavaScript Applications: A Practical Guide

Mastering Content Security Policy (CSP) for JavaScript Applications: A Practical Guide

Comments
3 min read
Securing Your API Keys in Frontend Projects
Cover image for Securing Your API Keys in Frontend Projects

Securing Your API Keys in Frontend Projects

Comments
2 min read
Preventing Clickjacking Attacks in JavaScript
Cover image for Preventing Clickjacking Attacks in JavaScript

Preventing Clickjacking Attacks in JavaScript

57
Comments 6
3 min read
Advanced Techniques for Detecting and Preventing JavaScript Injection Attacks
Cover image for Advanced Techniques for Detecting and Preventing JavaScript Injection Attacks

Advanced Techniques for Detecting and Preventing JavaScript Injection Attacks

2
Comments
3 min read
Ethical Hacking, Penetration Testing, and Web Security: A Comprehensive Overview

Ethical Hacking, Penetration Testing, and Web Security: A Comprehensive Overview

2
Comments 1
3 min read
Securing JavaScript Applications with Subresource Integrity (SRI): A Comprehensive Guide
Cover image for Securing JavaScript Applications with Subresource Integrity (SRI): A Comprehensive Guide

Securing JavaScript Applications with Subresource Integrity (SRI): A Comprehensive Guide

9
Comments
4 min read
GCP Cloud Armor - How to Leverage and add extra layer of security
Cover image for GCP Cloud Armor - How to Leverage and add extra layer of security

GCP Cloud Armor - How to Leverage and add extra layer of security

2
Comments
2 min read
HTTPS là gì mà web nào cũng xài (Phần 1)
Cover image for HTTPS là gì mà web nào cũng xài (Phần 1)

HTTPS là gì mà web nào cũng xài (Phần 1)

1
Comments
6 min read
Open Web Application Security Project OWASP Top Ten
Cover image for Open Web Application Security Project OWASP Top Ten

Open Web Application Security Project OWASP Top Ten

Comments
3 min read
Understanding JSON Web Tokens (JWT) and Their Use in Web Authentication

Understanding JSON Web Tokens (JWT) and Their Use in Web Authentication

5
Comments
3 min read
Enhancing Security in React with External Script Loading

Enhancing Security in React with External Script Loading

1
Comments
2 min read
Navigating the Risks of Third-Party Libraries in Web

Navigating the Risks of Third-Party Libraries in Web

Comments
4 min read
Best Security Practices for Web Browsing
Cover image for Best Security Practices for Web Browsing

Best Security Practices for Web Browsing

Comments
3 min read
Story of SSRF from Stored XSS in PDF generator application
Cover image for Story of SSRF from Stored XSS in PDF generator application

Story of SSRF from Stored XSS in PDF generator application

7
Comments 3
3 min read
loading...