Ethical hacking &
security blog
Learn about the best security tools, the industry security best practices and ethical hacking in general!
Notify me about new articles
Get notified for every new article! (No ads, only interesting content)
Apr 21, 2026 - 6 min read
How to Audit Every Third-Party Script on Your Website
Apr 21, 2026 - 7 min read
Runtime vs Build-Time Supply Chain Security: What Your Scanner Might Miss
Apr 21, 2026 - 6 min read
What Is an SBOM and Why Every Website Needs One
Apr 16, 2026 - 6 min read
Better Stack Alternative: How to Replace the $269/mo Standard Plan at SMB Scale
Apr 15, 2026 - 5 min read
UptimeRobot's Commercial Use Restriction: What Changed, and 3 Things to Do About It
Apr 12, 2026 - 7 min read
PCI DSS 4.0 Script Integrity: What Requirement 6.4.3 Actually Demands
Apr 8, 2026 - 6 min read
Polyfill.io, One Year Later: How to Detect a Compromised Third-Party Script Before It Hits You
Apr 5, 2026 - 6 min read
Dark Web Monitoring for Small Business: The $9-a-Month Alternative to Enterprise Contracts
Apr 2, 2026 - 5 min read
Snyk Advisor Is Shutting Down: 4 Alternatives for Package Health Checks
Mar 28, 2026 - 5 min read
Subresource Integrity (SRI) in 2026: The 10-Minute Guide Every Site Needs
Mar 24, 2026 - 7 min read
Third-Party Vendor Risk Assessment for SMBs: The Practical Template
Mar 20, 2026 - 6 min read
Magecart Attacks in 2025: Patterns We Saw and How to Catch Them
Mar 16, 2026 - 5 min read
How to Monitor 50 Websites Without Paying Enterprise Prices
Mar 2, 2026 - 6 min read
Shifting Security Left: How to Add Vulnerability Scanning to Your CI/CD Pipeline
Jan 15, 2026 - 5 min read
Drupal Security: Hardening Your Site Beyond Core Updates
Nov 3, 2025 - 6 min read
The Small Business Cybersecurity Playbook: 10 Steps That Actually Matter
Sep 29, 2025 - 5 min read
How to Build a Security Scoring System for Your Organization
Aug 11, 2025 - 6 min read
Security Compliance for Startups: GDPR, SOC 2, and ISO 27001 Without a Dedicated Team
Jul 22, 2025 - 5 min read
Vulnerability Scanning vs Penetration Testing: What You Actually Need
Jun 9, 2025 - 7 min read
The OWASP Top 10 in 2025: What Changed and What It Means for Your Stack
Apr 28, 2025 - 4 min read
Website Uptime Monitoring: What to Track Beyond 'Is It Up?'
Mar 17, 2025 - 5 min read
Open Ports, Open Doors: A Practical Guide to Port Security
Feb 20, 2025 - 5 min read
Core Web Vitals Meet Security: Why Performance and Protection Go Hand in Hand
Jan 13, 2025 - 5 min read
Data Leak Detection: How to Find Out if Your Organization's Credentials Are Exposed
Dec 2, 2024 - 4 min read
Broken Links Are a Security Problem, Not Just an SEO Problem
Nov 7, 2024 - 4 min read
Cookie Security: SameSite, Secure, HttpOnly — Getting the Flags Right
Oct 14, 2024 - 5 min read
JavaScript Supply Chain Attacks: How One npm Package Can Compromise Thousands
Sep 5, 2024 - 7 min read
API Security Checklist: 15 Things to Audit Before You Go Live
Aug 19, 2024 - 5 min read
Why Your WordPress Site Is a Target — and How to Lock It Down
Jul 3, 2024 - 6 min read
SPF, DKIM, DMARC, and BIMI: The Email Authentication Stack Explained
Jun 12, 2024 - 5 min read
DNS Security: How Attackers Hijack Your Domain and How to Stop Them
May 8, 2024 - 5 min read
SSL/TLS Certificates: Beyond the Padlock — What Most Sites Get Wrong
Apr 15, 2024 - 6 min read
The Complete Guide to HTTP Security Headers in 2026
Mar 4, 2024 - 4 min read
How to protect your business against Phishing in 2024 — Complete Guide
Mar 3, 2024 - 5 min read
How to make your Docker Containers more Secure in 2024
Mar 2, 2024 - 2 min read
How to secure your Ubuntu 22.04 default installation with SELinux