Blog

News and guides

OWASP2026-01-02

SQL Injection β€” How it works and how to prevent it

Complete guide on SQL Injection.

Read More
OWASP2026-01-03

Cross-Site Scripting (XSS) β€” The 3 types explained

Complete guide on Cross-Site Scripting (XSS).

Read More
OWASP2026-01-04

OWASP Top 10 2025 β€” Complete guide for Moroccan developers

Complete guide on OWASP Top 10 2025.

Read More
OWASP2026-01-05

Broken Access Control β€” The #1 OWASP flaw explained

Complete guide on Broken Access Control.

Read More
OWASP2026-01-06

Cryptographic Failures β€” Weak encryption and its consequences

Complete guide on Cryptographic Failures.

Read More
OWASP2026-01-07

OS Command Injection β€” Prevention guide

Complete guide on OS Command Injection.

Read More
OWASP2026-01-09

IDOR β€” Insecure Direct Object Reference explained

Complete guide on IDOR.

Read More
OWASP2026-01-10

Security Misconfiguration β€” Common errors AWS Apache Nginx

Complete guide on Security Misconfiguration.

Read More
OWASP2026-01-11

XXE β€” XML External Entity Injection explained

Complete guide on XXE.

Read More
OWASP2026-01-13

Clickjacking β€” How to protect your website

Complete guide on Clickjacking.

Read More
OWASP2026-01-14

Open Redirect β€” Underestimated phishing vector

Complete guide on Open Redirect.

Read More
OWASP2026-01-15

Path Traversal β€” Directory Traversal explained

Complete guide on Path Traversal.

Read More
OWASP2026-01-16

HTTP Response Splitting β€” Understand and prevent

Complete guide on HTTP Response Splitting.

Read More
OWASP2026-01-17

Insecure Deserialization β€” Risks and prevention

Complete guide on Insecure Deserialization.

Read More
OWASP2026-01-18

SSTI β€” Server-Side Template Injection explained

Complete guide on SSTI.

Read More
OWASP2026-01-19

API Security β€” The 10 OWASP API risks

Complete guide on API Security.

Read More
OWASP2026-01-20

JWT Token β€” Common flaws and securing

Complete guide on JWT Token.

Read More
OWASP2026-01-21

OAuth 2.0 β€” Frequent misconfigurations

Complete guide on OAuth 2.0.

Read More
OWASP2026-01-22

CORS Misconfiguration β€” Risks and best practices

Complete guide on CORS Misconfiguration.

Read More
OWASP2026-01-23

File upload vulnerabilities β€” Complete guide

Complete guide on File upload vulnerabilities.

Read More
OWASP2026-01-24

Race Conditions in web applications

Complete guide on Race Conditions in web applications.

Read More
OWASP2026-01-25

Subdomain Takeover β€” How to avoid it

Complete guide on Subdomain Takeover.

Read More
OWASP2026-01-26

HTTP Request Smuggling β€” Advanced attack explained

Complete guide on HTTP Request Smuggling.

Read More
OWASP2026-01-27

NoSQL Injection β€” MongoDB and beyond

Complete guide on NoSQL Injection.

Read More
OWASP2026-01-28

GraphQL Security β€” Common vulnerabilities

Complete guide on GraphQL Security.

Read More
OWASP2026-01-01

WebSocket Security β€” Risks and protections

Complete guide on WebSocket Security.

Read More
OWASP2026-01-02

Cache Poisoning β€” Web cache poisoning

Complete guide on Cache Poisoning.

Read More
OWASP2026-01-03

JavaScript Prototype Pollution β€” Understanding the risk

Complete guide on JavaScript Prototype Pollution.

Read More
OWASP2026-01-04

DNS Rebinding β€” Bypassing network protections

Complete guide on DNS Rebinding.

Read More
OWASP2026-01-05

Session Management β€” Security best practices

Complete guide on Session Management.

Read More
OWASP2026-01-06

CSP β€” Content Security Policy complete guide

Complete guide on CSP.

Read More
OWASP2026-01-07

Advanced SQL Injection β€” Blind and time-based techniques

Complete guide on Advanced SQL Injection.

Read More
OWASP2026-02-08

DOM-Based XSS β€” The most subtle variant

Complete guide on DOM-Based XSS.

Read More
OWASP2026-02-09

SSRF and Cloud Metadata β€” AWS Azure GCP Risks

Complete guide on SSRF and Cloud Metadata.

Read More
OWASP2026-02-10

Authentication Bypass β€” Common techniques

Complete guide on Authentication Bypass.

Read More
OWASP2026-02-11

Business Logic Flaws β€” Invisible vulnerabilities

Complete guide on Business Logic Flaws.

Read More
OWASP2026-02-12

Second Order Injection β€” Deferred injection

Complete guide on Second Order Injection.

Read More
OWASP2026-02-13

API Rate Limiting β€” Preventing abuse

Complete guide on API Rate Limiting.

Read More
Morocco Security2026-02-14

Cybersecurity for Moroccan SMEs β€” 2026 Guide

Complete guide on Cybersecurity for Moroccan SMEs.

Read More
Morocco Security2026-02-15

How hackers target Moroccan startups

Complete guide on How hackers target Moroccan startups.

Read More
Morocco Security2026-02-16

Customer Data Protection in Morocco β€” Legal Obligations

Complete guide on Customer Data Protection in Morocco.

Read More
Morocco Security2026-02-17

Law 09-08 on Personal Data Protection in Morocco

Complete guide on Law 09-08 on Personal Data Protection in Morocco.

Read More
Morocco Security2026-02-18

How to secure a Moroccan e-commerce site

Complete guide on How to secure a Moroccan e-commerce site.

Read More
Morocco Security2026-02-19

Fintech Application Security in Morocco

Complete guide on Fintech Application Security in Morocco.

Read More
Morocco Security2026-02-20

Most Frequent Cyberattacks in Morocco 2025-2026

Complete guide on Most Frequent Cyberattacks in Morocco 2025-2026.

Read More
Morocco Security2026-02-21

How to choose a cybersecurity provider in Morocco

Complete guide on How to choose a cybersecurity provider in Morocco.

Read More
Morocco Security2026-02-22

Phishing in Darija β€” Scams targeting Moroccans

Complete guide on Phishing in Darija.

Read More
Morocco Security2026-02-23

Securing a startup before launch β€” Complete checklist

Complete guide on Securing a startup before launch.

Read More
Morocco Security2026-02-24

AWS Azure Cloud β€” Common Misconfigurations

Complete guide on AWS Azure Cloud.

Read More
Morocco Security2026-02-25

Ransomware β€” What to do if your business is attacked

Complete guide on Ransomware.

Read More
Morocco Security2026-02-26

Social Engineering β€” How to train your employees in Morocco

Complete guide on Social Engineering.

Read More
Morocco Security2026-02-27

Moroccan Mobile App Security

Complete guide on Moroccan Mobile App Security.

Read More
Morocco Security2026-02-28

Security Audit β€” Why it's mandatory before fundraising

Complete guide on Security Audit.

Read More
Morocco Security2026-02-01

Enterprise WiFi Security in Morocco β€” Practical Guide

Complete guide on Enterprise WiFi Security in Morocco.

Read More
Morocco Security2026-02-02

Data Backup Strategy for Moroccan Businesses

Complete guide on Data Backup Strategy for Moroccan Businesses.

Read More
Morocco Security2026-02-03

Enterprise VPN in Morocco β€” Choosing and Deploying

Complete guide on Enterprise VPN in Morocco.

Read More
Morocco Security2026-02-04

PCI DSS Compliance in Morocco β€” Guide for E-commerce

Complete guide on PCI DSS Compliance in Morocco.

Read More
Morocco Security2026-02-05

Enterprise Email Security β€” SPF DKIM DMARC

Complete guide on Enterprise Email Security.

Read More
Morocco Security2026-02-06

Training employees in cybersecurity β€” Complete program

Complete guide on Training employees in cybersecurity.

Read More
Morocco Security2026-02-07

Strong Password Policy β€” Guide for Businesses

Complete guide on Strong Password Policy.

Read More
Morocco Security2026-02-08

Incident Response Plan β€” How to create one

Complete guide on Incident Response Plan.

Read More
Morocco Security2026-02-09

Telework Security in Morocco β€” Best Practices

Complete guide on Telework Security in Morocco.

Read More
Morocco Security2026-02-10

Cyber Insurance in Morocco β€” Why you need it

Complete guide on Cyber Insurance in Morocco.

Read More
Morocco Security2026-02-11

Enterprise IoT Security β€” Risks and Solutions

Complete guide on Enterprise IoT Security.

Read More
Morocco Security2026-02-12

Securing Active Directory β€” Guide for Admins

Complete guide on Securing Active Directory.

Read More
Morocco Security2026-03-13

Zero Trust Architecture β€” Implementing in Morocco

Complete guide on Zero Trust Architecture.

Read More
Morocco Security2026-03-14

DevSecOps in Morocco β€” Integrating Security into Development

Complete guide on DevSecOps in Morocco.

Read More
Morocco Security2026-03-15

GDPR and its impact on Moroccan businesses

Complete guide on GDPR and its impact on Moroccan businesses.

Read More
Morocco Security2026-03-16

Threat Intelligence β€” Anticipating Threats in Morocco

Complete guide on Threat Intelligence.

Read More
Morocco Security2026-03-17

Log Management and SIEM β€” Guide for Businesses

Complete guide on Log Management and SIEM.

Read More
Morocco Security2026-03-18

Digital Supply Chain Security

Complete guide on Digital Supply Chain Security.

Read More
Morocco Security2026-03-19

Docker and Kubernetes Container Security

Complete guide on Docker and Kubernetes Container Security.

Read More
Morocco Security2026-03-20

Backup and Disaster Recovery β€” Complete Plan for SMEs

Complete guide on Backup and Disaster Recovery.

Read More
Ethical Hacking2026-03-21

What is Penetration Testing β€” Beginner's Guide

Complete guide on What is Penetration Testing.

Read More
Ethical Hacking2026-03-22

Bug Bounty in Morocco β€” How to start in 2026

Complete guide on Bug Bounty in Morocco.

Read More
Ethical Hacking2026-03-23

Open Source Pentest Tools β€” Top 15 in 2026

Complete guide on Open Source Pentest Tools.

Read More
Ethical Hacking2026-03-24

How to read a pentest report β€” Guide for managers

Complete guide on How to read a pentest report.

Read More
Ethical Hacking2026-03-25

Difference between Pentest and Security Audit

Complete guide on Difference between Pentest and Security Audit.

Read More
Ethical Hacking2026-03-26

Ethical Hacking vs Malicious Hacking β€” Legal Framework in Morocco

Complete guide on Ethical Hacking vs Malicious Hacking.

Read More
Ethical Hacking2026-03-27

OSCP β€” The most respected cybersecurity certification

Complete guide on OSCP.

Read More
Ethical Hacking2026-03-28

TryHackMe vs HackTheBox β€” Which one to choose to start

Complete guide on TryHackMe vs HackTheBox.

Read More
Ethical Hacking2026-03-01

Burp Suite β€” User Guide for Beginners

Complete guide on Burp Suite.

Read More
Ethical Hacking2026-03-02

Passive Reconnaissance β€” OSINT for Professionals

Complete guide on Passive Reconnaissance.

Read More
Ethical Hacking2026-03-03

How to secure a REST API in 10 steps

Complete guide on How to secure a REST API in 10 steps.

Read More
Ethical Hacking2026-03-04

OWASP ZAP β€” Free Automatic Vulnerability Scanner

Complete guide on OWASP ZAP.

Read More
Ethical Hacking2026-03-05

Metasploit β€” Understanding the framework (ethical use)

Complete guide on Metasploit.

Read More
Ethical Hacking2026-03-06

Cybersecurity β€” Professions and salaries in Morocco in 2026

Complete guide on Cybersecurity.

Read More
Ethical Hacking2026-03-07

CVE β€” How the flaw rating system works

Complete guide on CVE.

Read More
Ethical Hacking2026-03-08

Kali Linux β€” Installation and getting started

Complete guide on Kali Linux.

Read More
Ethical Hacking2026-03-09

Nmap β€” Complete Network Scanning Guide

Complete guide on Nmap.

Read More
Ethical Hacking2026-03-10

Linux Privilege Escalation β€” Common Techniques

Complete guide on Linux Privilege Escalation.

Read More
Ethical Hacking2026-03-11

Windows Privilege Escalation β€” Practical Guide

Complete guide on Windows Privilege Escalation.

Read More
Ethical Hacking2026-03-12

CTF Competitions β€” Guide to Getting Started

Complete guide on CTF Competitions.

Read More
Ethical Hacking2026-03-13

Web Fuzzing β€” Discovering Hidden Endpoints

Complete guide on Web Fuzzing.

Read More
Ethical Hacking2026-03-14

Reverse Engineering β€” The basics to getting started

Complete guide on Reverse Engineering.

Read More
Ethical Hacking2026-03-15

Ethical WiFi Hacking β€” Techniques and Tools

Complete guide on Ethical WiFi Hacking.

Read More
Ethical Hacking2026-03-16

Social Engineering in Pentesting β€” Techniques

Complete guide on Social Engineering in Pentesting.

Read More
Ethical Hacking2026-03-17

Launching your cybersecurity career in Morocco β€” Roadmap 2026

Complete guide on Launching your cybersecurity career in Morocco.

Read More