Security

Security

Goodbye innerHTML, Hello setHTML: Stronger XSS Protection in Firefox 148 - Mozilla Hacks - the Web developer blog
Goodbye innerHTML, Hello setHTML: Stronger XSS Protection in Firefox 148 - Mozilla Hacks - the Web developer blog
Cross-site scripting (XSS) remains one of the most prevalent vulnerabilities on the web. The new standardized Sanitizer API provides a straightforward way for web developers to sanitize untrusted HTML before inserting it into the DOM. Firefox 148 is the first browser to ship this standardized security enhancing API, advancing a safer web for everyone. We expect other browsers to follow soon.
·hacks.mozilla.org·
Goodbye innerHTML, Hello setHTML: Stronger XSS Protection in Firefox 148 - Mozilla Hacks - the Web developer blog
Famous DDoS attacks | Biggest DDoS attacks
Famous DDoS attacks | Biggest DDoS attacks
A DDoS attack attempts to overwhelm a targeted server. Learn about some of the biggest DDoS attacks ever, along with famous DDoS attacks from the past.
·cloudflare.com·
Famous DDoS attacks | Biggest DDoS attacks
XBOW – The road to Top 1: How XBOW did it
XBOW – The road to Top 1: How XBOW did it
For the first time in bug bounty history, an autonomous penetration tester has reached the top spot on the US leaderboard.
·xbow.com·
XBOW – The road to Top 1: How XBOW did it
MCP Servers Are the New APIs — And We’re Making the Same Security Mistakes
MCP Servers Are the New APIs — And We’re Making the Same Security Mistakes
MCP Servers Are the New APIs — And We’re Making the Same Security Mistakes Lessons from a decade of API security failures — applied to the MCP ecosystem Remember when REST APIs first exploded …
·infosecwriteups.com·
MCP Servers Are the New APIs — And We’re Making the Same Security Mistakes
New npm supply-chain attack self-spreads to steal auth tokens
New npm supply-chain attack self-spreads to steal auth tokens
A new supply chain attack targeting the Node Package Manager (npm) ecosystem is stealing developer credentials and attempting to spread through packages published from compromised accounts.
·bleepingcomputer.com·
New npm supply-chain attack self-spreads to steal auth tokens
Introducing OpenAI Privacy Filter
Introducing OpenAI Privacy Filter
OpenAI Privacy Filter is an open-weight model for detecting and redacting personally identifiable information (PII) in text with state-of-the-art accuracy
·openai.com·
Introducing OpenAI Privacy Filter
Cloudflare targets 2029 for full post-quantum security
Cloudflare targets 2029 for full post-quantum security
Recent advances in quantum hardware and software have accelerated the timeline on which quantum attack might happen. Cloudflare is responding by moving our target for full post-quantum security to 2029.
·blog.cloudflare.com·
Cloudflare targets 2029 for full post-quantum security
Build Secure AI Applications | Promptfoo
Build Secure AI Applications | Promptfoo
The AI Security Platform that catches vulnerabilities in development. Trusted by 127 of the Fortune 500 and 300,000+ developers worldwide.
·promptfoo.dev·
Build Secure AI Applications | Promptfoo
code-review
code-review
Perform code reviews following Sentry engineering practices. Use when reviewing pull requests, examining code changes, or providing feedback on code quality. Covers security, performance, testing, and design review.
·tessl.io·
code-review
Firehound | Security Operations
Firehound | Security Operations
Industrial management platform for Firehound-Go scans.
·firehound.covertlabs.io·
Firehound | Security Operations
Securing Coolify with CrowdSec: A Complete Guide 2025 - hasto.pl
Securing Coolify with CrowdSec: A Complete Guide 2025 - hasto.pl
Learn how to secure your Coolify installation with CrowdSec - a community-driven intelligent threat detection system that provides advanced protection against attacks with CAPTCHA challenges and real-time notifications.
·hasto.pl·
Securing Coolify with CrowdSec: A Complete Guide 2025 - hasto.pl
I've locked myself out of my digital life
I've locked myself out of my digital life
Imagine… Last night, lightning struck our house and burned it down. I escaped wearing only my nightclothes. In an instant, everything was vaporised. Laptop? Cinders. Phone? Ashes. Home server? A smouldering wreck. Yubikey? A charred chunk of gristle. This presents something of a problem. In order to recover my digital life, I need to be able to log in to things. This means I need to know my u…
·shkspr.mobi·
I've locked myself out of my digital life
Our plan for a more secure npm supply chain
Our plan for a more secure npm supply chain
GitHub is strengthening npm's security with stricter authentication, granular tokens, and enhanced trusted publishing.
·github.blog·
Our plan for a more secure npm supply chain
SQL injection cheat sheet
SQL injection cheat sheet
The Invicti SQL Injection Cheat Sheet is the definitive resource for payloads and technical details about exploiting many different variants of SQLi vulnerabilities.
·invicti.com·
SQL injection cheat sheet
Exploiting SQL Injection: a Hands-on Example | Acunetix
Exploiting SQL Injection: a Hands-on Example | Acunetix
In this series we will be showing step by step examples of common attacks. We will start off with an example of exploiting SQL Injection - a basic SQL injection exploitation of a web application and then privilege escalation to O.S root.
·acunetix.com·
Exploiting SQL Injection: a Hands-on Example | Acunetix
Application Level Denial of Service – A Comprehensive Guide
Application Level Denial of Service – A Comprehensive Guide
Application level Denial of Service attacks are designed to render systems unresponsive, denying the services for users. They are notoriously difficult to detect & prevent, & often underestimated. This comprehensive guide explains how to identify and remove the conditions necessary for DoS attacks.
·invicti.com·
Application Level Denial of Service – A Comprehensive Guide
OWASP Top 10 Broken Access Control Explained
OWASP Top 10 Broken Access Control Explained
We'll cover preventing Broken Access Control in your code in this article. Also, check out The Diligent Developer Chronicles for training your team.
·securityjourney.com·
OWASP Top 10 Broken Access Control Explained
Casbin · An authorization library that supports access control models like ACL, RBAC, ABAC, ReBAC, BLP, Biba, LBAC, UCON, Priority, RESTful for Golang, Java, C/C++, Node.js, Javascript, PHP, Laravel, Python, .NET (C#), Delphi, Rust, Ruby, Swift (Objective-C), Lua (OpenResty), Dart (Flutter) and Elixir | Casbin
Casbin · An authorization library that supports access control models like ACL, RBAC, ABAC, ReBAC, BLP, Biba, LBAC, UCON, Priority, RESTful for Golang, Java, C/C++, Node.js, Javascript, PHP, Laravel, Python, .NET (C#), Delphi, Rust, Ruby, Swift (Objective-C), Lua (OpenResty), Dart (Flutter) and Elixir | Casbin
An authorization library that supports access control models like ACL, RBAC, ABAC, ReBAC, BLP, Biba, LBAC, UCON, Priority, RESTful for Golang, Java, C/C++, Node.js, Javascript, PHP, Laravel, Python, .NET (C#), Delphi, Rust, Ruby, Swift (Objective-C), Lua (OpenResty), Dart (Flutter) and Elixir
·casbin.org·
Casbin · An authorization library that supports access control models like ACL, RBAC, ABAC, ReBAC, BLP, Biba, LBAC, UCON, Priority, RESTful for Golang, Java, C/C++, Node.js, Javascript, PHP, Laravel, Python, .NET (C#), Delphi, Rust, Ruby, Swift (Objective-C), Lua (OpenResty), Dart (Flutter) and Elixir | Casbin
CWE - Common Weakness Enumeration
CWE - Common Weakness Enumeration
Common Weakness Enumeration (CWE) is a list of software and hardware weaknesses.
·cwe.mitre.org·
CWE - Common Weakness Enumeration
CyberChef
CyberChef
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
·gchq.github.io·
CyberChef