11 Types of Ethical Hacking: The Definitive Guide for 2026 

11 Types of Ethical Hacking: The Definitive Guide for 2026 

There are 11 distinct types of ethical hacking, and most organizations only think about two or three of them. Everything outside that narrow band is a blind spot, and blind spots are where breaches happen. A colleague of mine once ran a quick social engineering test...
What is Ethical Hacking

What is Ethical Hacking

Ethical hacking is the authorized practice of testing computer systems, networks, and applications to find vulnerabilities before malicious attackers do. What separates ethical hackers from their malicious counterparts isn’t the techniques they use, its...
OSINT Resources and Tools

OSINT Resources and Tools

As our personal lives, businesses, entertainment, and communities move deeper into digital spaces, various levels of Open Source Intelligence (OSINT) have become commonplace. From verifying a suspicious social media account to conducting a highly targeted phishing...
How I Almost Got Phished: Advanced Phishing Example

How I Almost Got Phished: Advanced Phishing Example

Usually, I pride myself in being able to spot a phishing email from a mile away, however, I’ve always maintained that anyone, even the most security-minded individual, could be phished with enough research and time.  Recently, I was targeted by a few phishing...
Defend Against DoS with Rate Limiting

Defend Against DoS with Rate Limiting

Every web application is vulnerable to a type of attack in which a malicious third party repeatedly connects to your web server and/or makes bulk HTTP requests, consuming resources and preventing other legitimate requests from being processed. This is called a Denial...
How To Identify URL Phishing Techniques

How To Identify URL Phishing Techniques

In 2025, phishing is still one of the most ubiquitous and effective attack vectors cybercriminals use to steal credentials, distribute malware, and compromise organizations. Oftentimes, these phishing campaigns stem from deceptive URLs which are crafted to appear...