People who say “PHP is insecure” are uninformed
I hear a lot of folks parrot the opinion that PHP is somehow less secure than other languages. This simply isn't true. Here's why.
Most people know me as a computer hacker.
I document the things I learn about cybersecurity, wealth creation, and lifestyle design. I'm a techie and a minimalist, always seeking to simplify the complex. I'm a light traveller who craves exploration, connection, authenticity and growth.
I founded two businesses: a cybersecurity consultancy called Haksec, and a marketing agency for cybersecurity orgs called HackerContent. With these two projects, I'm fulfilling two of my life purposes: protecting humans, and reforming the cybersecurity marketing landscape.
When I'm not managing Haksec and HackerContent, I'm a dad, a hacker, a coder and a qualified jazz trumpet player. My ultimate goal is to build an incredible life for myself and my family.
I hear a lot of folks parrot the opinion that PHP is somehow less secure than other languages. This simply isn't true. Here's why.
Exploring the human side of cybersecurity, this post delves into personal stories, industry challenges, and the urgent need for innovation and collaboration.
I want to share with you my top 10 bite-sized tips to help you crush bug bounties in your first 12 months. Let’s dive in!
Remote Code Execution vs. Remote Command Execution vs. Code Injection vs. Command Injection vs. RCE. What's the difference?
Set up your very own in-depth EASM platform complete with screenshots, continuous monitoring and an API leveraging open-source software.
Was the cyber attack on JBS Meatworks inevitable, because their primary business is something that many feel is unethical?
This one is for you cybersecurity redditors - a list of cybersecurity subreddits that you might not already know about!
Ever wondered how to hack your ex-girlfriend's Facebook account? Here's everything you need to know.
I quit my awesome, well-paid job at Bugcrowd to start my own business.
Introducing Haktrails, a tool for querying SecurityTrails data conveniently from your terminal.
You've found the perfect XSS, you just need to quickly host your payload somewhere... but where? Surge.sh comes to the rescue. Here's how to use it.