Skip to main content

ZeriFlow Journal

Security guides your team can ship this week

Actionable articles on TLS, headers, CSP, privacy, and practical hardening for modern web apps.

Tags

All#agencies#agency#alerting#alternatives#api-keys#api-security#api-automation#application-security#audit#automated-security#bfg-repo-cleaner#branch-protection#browser-security#check-security-headers#check-ssl-online#ci-cd-security-tools#ci-cd#clickjacking-protection#client-reports#cloud-security#code-scanning#code-security#comparison#compliance#content-security-policy#cookies#cors#cors-configuration#cron#csp#csp-directives#csp-header#csrf#cve#dangling-dns#database-security#dependabot#dependency-security#dependency-scanning#detectify-alternative#detectify-free-alternative#detectify-pricing-alternative#developer-security#developer-experience#developer-tools#devops#devops-security#devsecops#devsecops-tools#discord-webhook#dkim#dmarc#dns#dns-security#dnssec#ecommerce-security#ecommerce-site-security-checklist#email#email-authentication#email-security#express#frame-ancestors-csp#free-security-scan#free-ssl-check#free-website-security-scanner#freelance-security-audit#gdpr#git-security#gitguardian-alternative#github#github-actions#github-actions-security-tools#github-security#google-analytics#hardcoded-api-keys#hardcoded-secrets#headers#hsts#hsts-preload#http-headers-scanner-comparison#http-security-headers#http-strict-transport-security#httponly#https-configuration#improve-security#javascript-security#monitoring#mozilla-observatory-alternative#mozilla-observatory-tool#next-js#nextjs#next-js-security-tools#next-js-vulnerability-scanner#nextjs-app-router#nextjs-security-audit#nodejs#npm-audit#npm-cve#npm-vulnerabilities#npm-security#observatory-scanner#online-store-security#open-source#orm-security#owasp#owasp-2026#owasp-top-10#package-audit#parameterized-queries#payment-security#pci-dss#penetration-testing#pentest#permissions-policy#phishing-prevention#pipeline-security-scanner#pre-launch-security#preflight#prevent-clickjacking#privacy#pull-requests#rate-limiting#react#readme#redis#referrer-policy#repository-scanning#rest-api#saas-security-checklist#saas-security-tools#saas-security#samesite#sast-tools#secret-scanning#secrets-detection#secure-next-js-application#security-as-a-service-agency#security-audit#security-checklist#security-for-saas#security-headers#security-headers-checker-tool#security-headers-list#security-scan-tool#security-score#security-alerts#security-automation#security-badge#security-benchmark#security-gate#security-misconfiguration#security-monitoring#security-pipeline#security-reporting#security-scanner#security-scanning#securityheaders-com-alternative#server-security#session-security#shift-left-security#shift-left#shopify-security#slack-integration#snyk#spf#sql-injection#ssl-certificate-check#ssl-certificate-checker#ssl-check#ssl-checker-tool#ssl-security#startup-security-tools#startup-security#static-analysis#stripe#subdomain-takeover#supply-chain-security#supply-chain#tls#tls-1-3#tls-best-practices#tls-check-tool#tls-configuration#trufflehog#upsell-security-clients#vulnerability-assessment#vulnerability-detection#vulnerability-scanner#vulnerability-scan#web-agency-security-service#web-app-security#web-application-vulnerabilities#web-security#web-security-scanner#web-security-checklist#website-scanner-like-detectify#website-security#website-security-check-alternative#website-security-checklist#website-security-scanner#website-security-score#website-vulnerability-scanner#website-audit#website-monitoring#white-label#white-label-security#wordpress#x-frame-options#xss#xss-protection#xss-prevention
Web Security

How to Add Security Headers to Next.js (Complete Guide with Code)

Mar 24, 2026·10 min

Security headers are the fastest way to harden a Next.js application. This guide covers all seven essential headers with production-ready configuration for both App Router and Pages Router.

#next-js#security-headers#csp
Read article
Web Security

How to Check Your Website Security for Free (5 Methods)

Mar 23, 2026·9 min

You do not need an enterprise budget to find serious security vulnerabilities on your website. These five free methods cover everything from TLS configuration to missing HTTP headers and vulnerable dependencies.

#website-security#free-security-scan#vulnerability-scanner
Read article
Web Security

X-Frame-Options vs CSP frame-ancestors: Which Header to Use in 2026?

Mar 22, 2026·9 min

X-Frame-Options and CSP's frame-ancestors directive both prevent clickjacking by controlling how your page can be embedded in iframes. But they are not equivalent — one is a legacy header, the other is the modern standard. This guide explains the differences, which to use, and why you should set both.

#x-frame-options#clickjacking-protection#frame-ancestors-csp
Read article
Web Security

TLS/SSL for Developers: A Practical Security Guide (2026)

Mar 21, 2026·11 min

TLS is the foundation of web security — but most developers configure it once and never look at it again. This guide covers the practical details: TLS 1.2 vs 1.3 differences, how to choose cipher suites, certificate validation mechanics, OCSP stapling, and the most common TLS misconfigurations that still show up in production.

#ssl-certificate-check#tls-1-3#tls-best-practices
Read article
Web Security

CVE Vulnerabilities in npm Packages: How to Scan and Fix Them

Mar 20, 2026·10 min

Vulnerable npm packages are responsible for some of the most damaging supply chain attacks in recent years. This guide explains how CVEs get into your dependencies, how to use npm audit effectively, when upgrading is the right call, and how to automate security scanning so you're not caught off guard.

#npm-vulnerabilities#npm-audit#dependency-security
Read article
Web Security

Hardcoded Secrets: What They Are, Why They're Dangerous, and How to Find Them

Mar 19, 2026·10 min

Hardcoded secrets — API keys, passwords, and tokens embedded directly in source code — are one of the most common causes of cloud infrastructure breaches. This guide explains the risks, shows you how to find them using automated tools, and walks through the correct remediation process including git history cleanup.

#hardcoded-secrets#hardcoded-api-keys#secret-scanning
Read article
Web Security

OWASP Top 10 Web Application Vulnerabilities (2026 Edition)

Mar 18, 2026·14 min

The OWASP Top 10 is the most widely referenced framework for web application security risks. This guide covers all ten vulnerabilities with real-world examples, concrete testing methods, and specific fixes — not abstract theory.

#owasp-top-10#web-application-vulnerabilities#owasp-2026
Read article
Web Security

Website Security Checklist: 20 Checks Every Developer Must Run Before Launch

Mar 17, 2026·10 min

Most security incidents are caused by preventable configuration gaps, not sophisticated zero-day exploits. This 20-point checklist covers every layer of web application security that needs to be verified before you push to production, with brief explanations and remediation steps for each item.

#website-security-checklist#pre-launch-security#web-app-security
Read article
Web Security

HSTS Explained: How to Enable HTTP Strict Transport Security

Mar 16, 2026·8 min

HSTS (HTTP Strict Transport Security) is a single header that eliminates an entire class of SSL stripping attacks. This guide explains how it works, how to configure it safely, and what you must check before enabling the preload flag.

#hsts#http-strict-transport-security#hsts-preload
Read article