Ethical hacking &
security blog

Learn about the best security tools, the industry security best practices and ethical hacking in general!

Notify me about new articles

Get notified for every new article! (No ads, only interesting content)

Apr 21, 2026 - 6 min read

How to Audit Every Third-Party Script on Your Website

Apr 21, 2026 - 7 min read

Runtime vs Build-Time Supply Chain Security: What Your Scanner Might Miss

Apr 21, 2026 - 6 min read

What Is an SBOM and Why Every Website Needs One

Apr 16, 2026 - 6 min read

Better Stack Alternative: How to Replace the $269/mo Standard Plan at SMB Scale

Apr 15, 2026 - 5 min read

UptimeRobot's Commercial Use Restriction: What Changed, and 3 Things to Do About It

Apr 12, 2026 - 7 min read

PCI DSS 4.0 Script Integrity: What Requirement 6.4.3 Actually Demands

Apr 8, 2026 - 6 min read

Polyfill.io, One Year Later: How to Detect a Compromised Third-Party Script Before It Hits You

Apr 5, 2026 - 6 min read

Dark Web Monitoring for Small Business: The $9-a-Month Alternative to Enterprise Contracts

Apr 2, 2026 - 5 min read

Snyk Advisor Is Shutting Down: 4 Alternatives for Package Health Checks

Mar 28, 2026 - 5 min read

Subresource Integrity (SRI) in 2026: The 10-Minute Guide Every Site Needs

Mar 24, 2026 - 7 min read

Third-Party Vendor Risk Assessment for SMBs: The Practical Template

Mar 20, 2026 - 6 min read

Magecart Attacks in 2025: Patterns We Saw and How to Catch Them

Mar 16, 2026 - 5 min read

How to Monitor 50 Websites Without Paying Enterprise Prices

Mar 2, 2026 - 6 min read

Shifting Security Left: How to Add Vulnerability Scanning to Your CI/CD Pipeline

Jan 15, 2026 - 5 min read

Drupal Security: Hardening Your Site Beyond Core Updates

Nov 3, 2025 - 6 min read

The Small Business Cybersecurity Playbook: 10 Steps That Actually Matter

Sep 29, 2025 - 5 min read

How to Build a Security Scoring System for Your Organization

Aug 11, 2025 - 6 min read

Security Compliance for Startups: GDPR, SOC 2, and ISO 27001 Without a Dedicated Team

Jul 22, 2025 - 5 min read

Vulnerability Scanning vs Penetration Testing: What You Actually Need

Jun 9, 2025 - 7 min read

The OWASP Top 10 in 2025: What Changed and What It Means for Your Stack

Apr 28, 2025 - 4 min read

Website Uptime Monitoring: What to Track Beyond 'Is It Up?'

Mar 17, 2025 - 5 min read

Open Ports, Open Doors: A Practical Guide to Port Security

Feb 20, 2025 - 5 min read

Core Web Vitals Meet Security: Why Performance and Protection Go Hand in Hand

Jan 13, 2025 - 5 min read

Data Leak Detection: How to Find Out if Your Organization's Credentials Are Exposed

Dec 2, 2024 - 4 min read

Broken Links Are a Security Problem, Not Just an SEO Problem

Nov 7, 2024 - 4 min read

Cookie Security: SameSite, Secure, HttpOnly — Getting the Flags Right

Oct 14, 2024 - 5 min read

JavaScript Supply Chain Attacks: How One npm Package Can Compromise Thousands

Sep 5, 2024 - 7 min read

API Security Checklist: 15 Things to Audit Before You Go Live

Aug 19, 2024 - 5 min read

Why Your WordPress Site Is a Target — and How to Lock It Down

Jul 3, 2024 - 6 min read

SPF, DKIM, DMARC, and BIMI: The Email Authentication Stack Explained

Jun 12, 2024 - 5 min read

DNS Security: How Attackers Hijack Your Domain and How to Stop Them

May 8, 2024 - 5 min read

SSL/TLS Certificates: Beyond the Padlock — What Most Sites Get Wrong

Apr 15, 2024 - 6 min read

The Complete Guide to HTTP Security Headers in 2026

Mar 4, 2024 - 4 min read

How to protect your business against Phishing in 2024 — Complete Guide

Mar 3, 2024 - 5 min read

How to make your Docker Containers more Secure in 2024

Mar 2, 2024 - 2 min read

How to secure your Ubuntu 22.04 default installation with SELinux

Version 1.0.69