Our Blog
Resources and insights
The latest industry news, interviews, technologies, and resources.
How I Almost Got Phished: Advanced Phishing Example
Investigation of real phishing email that used background and interest targeting and an advanced tactic for bypassing spam filters and appearing legitimate.
Coding Projects for Beginners
This blog post will provide some tips and suggest a few project ideas to help you acquire and develop programming skills to advance your coding abilities.
Introduction To Digital Privacy
This article contains actionable steps and resources to help you practice digital privacy, stop data brokers from collecting your information, and restore a sense of freedom and peace of mind.
Understanding, Detecting, and Exploiting SSRF
SSRF has emerged as a significant threat to web security. We discuss how to identify it, verify its presence, and responsibly exploit it for security testing.
Start your Journey with Bug Bounty
Bug bounty programs are an opportunity for anyone to identify vulnerabilities in a company’s software or infrastructure and get rewarded for their discoveries.
Understanding and Finding Open Redirects
An Open Redirect is a vulnerability in a web application that allows an attacker to redirect a user to an arbitrary website. At first glance, this might not seem harmful, but with a malicious intent, it can be used as part of phishing attacks, malware distribution, or...
Local File Inclusion: A Practical Guide
Local File Inclusion allows an attacker to read files from a server they should not have access to, leading to the exposure of sensitive information.
Should a Company Provide Credentials for Their Penetration Test?
Is giving credentials to a pentester considered cheating? Or is it an efficient use of resources during a limited engagement? Learn about both perspectives.
Secure Web Development Part 1: Common Mistakes
Web development is a dynamic field that’s constantly evolving with new technologies, trends, and security threats. Learn some of the most common mistakes.
Stay Ahead of Cyber Threats
Get expert insights on the latest penetration testing strategies, emerging vulnerabilities, and cybersecurity best practices—straight to your inbox.
Loading form...
We care about your data in our privacy policy.








