As web applications become increasingly critical for business operations, they’re also more attractive targets for cyber attacks. Unfortunately th...
For further actions, you may consider blocking this person and/or reporting abuse
Insightful overview! Your clear explanations make it easier for developers to understand and address front-end security challenges effectively
Thanks for sharing💖
@random_ti Glad it was effective!
Very nice article. Some examples would really help understand.
@aceix I plan on diving into more detail! Will ping you when I publish some examples of the attack and defense as well
@aceix I just published an article that's a bit more of a deep dive on the first attack
XSS
Thanks for sharing this insightful piece.
@chideracode Glad it was helpful!
Great! Also it would've been better if defensive measures were included. But thanks for the knowledge.
@kk_786 Plan on posting more articles with examples!
@kk_786 Just published an article that's a bit more of a deep dive on the first type of common attack XSS
Nice article. CSRF link is missing f from the end and goes into 404
@timocodes Good catch! Thank you, just fixed it
Nice article and explanation. As others commented about missing more examples and counter measures. Do let me know when you post with more details.
@javed74 Just published an article that's a bit more of a deep dive on the first type of common attack
XSS
Several flaws in this article.
For example, MITM attacks does not fall into the frontend attacks.
@begueradj Thanks for pointing this out. Man-in-the-Middle (MITM) attacks are also considered front-end security attacks because they typically target the communication between a user (the client) and the server. In front-end security, the focus is on protecting data as it's transferred from the user's device to the server, which is where MITM attacks come into play. Here's a few ways how it fits into the front-end security paradigm:
While I do agree that MITM attacks affect the data transmission between client and server (which to many can be considered the 'back end' of a system), it's essential to understand that security requires both strong front-end and back-end measures against a wide range of vulnerabilities, including MITM which is a very common vulnerability
Very good! Thank you!