Research

Here I’ll have some articles and other resources from where I derive information when making design and content choices. For now it’s more of a repository, but soon I’ll use this page as a home for citations linked throughout the site. Rad.

Dev.To

  • You’ve dived into the world of AI, filled with promises of efficiency and innovation. You craft a prompt, hit enter, and… the response is a dud. Generic, off-topic, repetitive, or just plain bland. It’s easy to feel frustrated, perhaps even betrayed by the hype. But before you write off AI as another overblown trend, consider […]
  • In today’s evolving threat landscape, cybersecurity is no longer a siloed IT function - it is a critical pillar of enterprise resilience and business continuity. As organizations strive to improve their risk posture, reduce vulnerabilities, and align with regulatory frameworks, there’s an urgent need to move beyond reactive defense models. This is where Lean Six Sigma (LSS) - a […]
  • As I delve deeper into the world of Web3, I’ve been working my way through foundational concepts to have a better understanding of the industry (check out my last five posts on the Midnight Dev Diaries!). This week, I dove into one of the most practical and privacy-focused ideas I’ve encountered so far: selective disclosure. […]
  • You’ve probably felt the frustration: hitting ‘generate’ on your AI tool and getting something… almost right. It’s bland, off-brand, or just plain doesn’t sing. In the fast-paced world of marketing, where every word, every headline, and every call-to-action directly impacts your conversion rates, “almost right” simply isn’t good enough. Generic AI outputs don’t build trust, […]
  • TL;DR This article breaks down the total cost of ownership (TCO) for authentication methods, with a developer’s view on implementing passwordless authentication. We’ll cover cost frameworks, technical trade-offs, sample integration code, and practical advice for SaaS and enterprise environments. Table of Contents Introduction: The Real Cost of Authentication Technical Context: Why Devs Should Care Cost […]

WordPress

The Hacker News

  • Cybersecurity researchers are calling attention to a “large-scale campaign” that has been observed compromising legitimate websites with malicious JavaScript injections. According to Palo Alto Networks Unit 42, these malicious injects are obfuscated using JSFuck, which refers to an “esoteric and educational programming style” that uses only a limited set of characters to write and execute […]
  • The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday disclosed that ransomware actors are targeting unpatched SimpleHelp Remote Monitoring and Management (RMM) instances to compromise customers of an unnamed utility billing software provider. “This incident reflects a broader pattern of ransomware actors targeting organizations through unpatched versions of SimpleHelp
  • Introduction: Security at a Tipping Point Security Operations Centers (SOCs) were built for a different era, one defined by perimeter-based thinking, known threats, and manageable alert volumes. But today’s threat landscape doesn’t play by those rules. The sheer volume of telemetry, overlapping tools, and automated alerts has pushed traditional SOCs to the edge. Security teams […]
  • Apple has disclosed that a now-patched security flaw present in its Messages app was actively exploited in the wild to target civil society members in sophisticated cyber attacks. The vulnerability, tracked as CVE-2025-43200, was addressed on February 10, 2025, as part of iOS 18.3.1, iPadOS 18.3.1, iPadOS 17.7.5, macOS Sequoia 15.3.1, macOS Sonoma 14.7.4, macOS […]
  • The threat actors behind the VexTrio Viper Traffic Distribution Service (TDS) have been linked to other TDS services like Help TDS and Disposable TDS, indicating that the sophisticated cybercriminal operation is a sprawling enterprise of its own that’s designed to distribute malicious content. “VexTrio is a group of malicious adtech companies that distribute scams and […]

jQuery News

  • Last February, we released the first beta of jQuery 4.0.0. We’re now ready to release a second, and we expect a release candidate to come soon™. This release comes with a major rewrite to jQuery’s testing infrastructure, which removed all deprecated or under-supported dependencies. But the main change that warranted a second beta was a […]
  • jQuery’s influence on the web will always be evident. When it was first introduced in 2006, jQuery became a fundamental tool for web developers almost immediately. It simplified JavaScript programming, making it easier to manipulate HTML documents, handle events, perform animations, and much more. Since then, it has played and continues to play a major […]
  • jQuery 4.0.0 has been in the works for a long time, but it is now ready for a beta release! There’s a lot to cover, and the team is excited to see it released. We’ve got bug fixes, performance improvements, and some breaking changes. We removed support for IE
  • jQuery 3.7.1 has been released! This release fixes a regression from jQuery 3.6.0 that resulted in rounded dimensions for elements in Chrome and Safari. Also, a (mostly) internal Sizzle method, jQuery.find.tokenize that was on the jQuery object was accidentally removed when we removed Sizzle in jQuery 3.7.0. That method has been restored. As … Continue […]
  • jQuery 3.7.0 is now available! This release has it all: bug fixes, a new method, and a performance improvement! We even dropped our longtime selector engine: Sizzle. Or, I should say, we moved it into jQuery. jQuery no longer depends on Sizzle as a separate project, but has instead dropped its code directly into jQuery […]