CORS - Cross Origin Resource Sharing

Introduction to CORS:

CSRF - Cross Site Request Forgery

CSRF Demystified I will try to provide a basic explanation about the attack pattern itself, come up with several real word examples and finally summarize a list of things developers can do to protect their sites against CSRF attacks.
All You need To KnowA bout Cross Site Request Forgery (CSRF) A compilation of links by darknet.org.uk
Anatomy of a Cross-site Request Forgery Attack Various code examples about CSRF
CSRF Mitigation for AJAX Requests Ways to mitagate CSRF AJAX Requests

Others

Submit a HTML form without redirection
Reference: Stackoverflow - How to submit html form without redirection?

<iframe width="0" height="0" border="0" name="dummyframe" id="dummyframe"></iframe>

<form action="submitscript.php" target="dummyframe">
    <!-- form body here -->
</form>

XSS - Cross Site Scripting

Understanding XSS Auditor We see a lot of confusion regarding the X-XSS-Protection header and thought it might be worthwhile to go over exactly what this header is and what it isn’t.
X-XSS-Protection header Explanation by OWASP.
HTML5 Security Cheatsheet A collection of HTML5 related XSS attack vectors, a set of useful files for XSS testing and a set of formerly hidden features useful for XSS testing.

SQL Injection

MySQL injection tutorial by sam207 In this tutorial, I will demonstrate the infamous MySQL injection in newbie perspective so that all the newbies become able to become successful SQL injector.

OWASP

OWASP Cheat Sheet Series Created to provide a concise collection of high value information on specific web application security topics. These cheat sheets were created by various application security professionals who have expertise in specific topics.
OWASP Top 10 Cheat Sheet The following is a developer-centric defensive cheat sheet for the 2013 release of the OWASP Top Ten Project. It also presents a quick reference based on OWASP Testing Project to help how to identify the risks.

Special/New Attacks

Web Cache Deception Attack Web cache deception is a new web attack vector that puts various technologies and frameworks at risk.

HTTP

Insecure HTTP headers This page is a collection of instructions to remove unnecessary server headers which may be reported as part of a Penetration Test performed by a security engineer or reported via automated tools.

HPKP & HSTS

HPKP y HSTS: Global analysis and implementation by ElevenPaths  
Is HTTP Public Key Pinning Dead? Comments about current state of HPKP.
Tags: sec web