
What is a CVE?
In previous weeks, we have talked a lot about different security vulnerabilities and linked to their CVE IDs. I realized however, that I have…
November 7, 2024

Back to School: How to Use Your Expertise to Sell Online Courses
Want to diversify your income? Discover why you should use your expertise to create valuable online courses and how to create and sell courses in no time!…
November 4, 2024

What is a CVSS score and how to prioritise WordPress vulnerabilities?
You’ve most likely noticed a CVSS score whenever a security vulnerability has been reported to you. CVSS (Common Vulnerability Scoring System) scores are calculated…
November 1, 2024

What is a CSV Injection Vulnerability?
CSV Injection vulnerability is rare and somewhat controversial vulnerability which has been found in less than 100 WordPress plugins over the recent years. In…
October 24, 2024

What is an Arbitrary File Upload Vulnerability?
The Arbitrary File Upload vulnerabilities are among some of the most dangerous security flaws in the WordPress ecosystem. These vulnerabilities allow malicious users to…
October 17, 2024

What is Privilege Escalation Vulnerability?
Privilege Escalation occurs when a lower-privileged or unauthenticated user can perform an action that escalates their current privilege to a higher level. These vulnerabilities…
October 10, 2024

From Freelancer to Agency Owner: Is It Time to Hire Employees and Build a Team?
Feel like it might be time to hire your first employee but not sure if you’re ready? Learn about when and how to build a team around you in this blog….
October 8, 2024

What is a Sensitive Data Exposure Vulnerability?
Imagine that you receive an email from your favorite service provider saying that there was an attempt to access your account. Or a phishing…
October 4, 2024

How to Fix Interaction to Next Paint (INP) and Total Blocking Time (TBT) Issues
Learn how to improve INP and TBT to boost your website’s speed with practical tips and strategies….
September 28, 2024

What is a Remote Code Execution vulnerability?
The legendary Remote Code Execution is an uncommon but critical security vulnerability that allows an attacker to run arbitrary code or command line commands…
September 26, 2024

The Web Designer’s Guide to Brand Messaging and How to Craft Your Own
Learn the fundamentals of brand messaging and how to craft your own unique messaging framework that connects with your audience and reflects your brand….
September 25, 2024

Privacy Regulations: How to protect your agency when building websites for clients
Protect your web agency from privacy regulation risks with practical tips on client education, legal documentation, and compliance strategies….
September 23, 2024

What is Local File Inclusion Vulnerability?
Local File Inclusion (LFI) is a type of vulnerability in web applications that occurs when an attacker manipulates the application into including files from…
September 20, 2024

What is Cross-Site Request Forgery?
Let’s talk about Cross-Site Request Forgery. It’s a common security vulnerability that might have affected your website as well. In fact, according to the…
September 11, 2024

What is a Broken Access Control Vulnerability?
This week, let’s dive into broken access control vulnerabilities. It’s probably one of the most self-explanatory vulnerability types, as it arises from—you guessed it—broken…
September 5, 2024

How to Fix Website Cumulative Layout Shift (CLS) Issues
Understand Cumulative Layout Shift (CLS), its impact on user experience, and practical tips to measure and improve your website’s performance….
August 30, 2024

What is a Cross-Site Scripting (XSS) Vulnerability?
Cross-Site Scripting is one of the most common security vulnerabilities found in WordPress plugins over the years. In 2023, XSS ranked #1 as the…
August 28, 2024

Understanding WordPress Taxonomies
Learn how to create and manage custom taxonomies in WordPress to better organize your content and improve site structure….
August 26, 2024

What is an SQL Injection Security Vulnerability?
In our 15th TAB Security Weekly, we explored some of the most dangerous vulnerabilities commonly exploited in WordPress plugins. However, there are many different…
August 22, 2024

6 Ways Creative Outsourcing Can Drive Sales and Boost Profits for Your Agency
Looking for innovative ways to increase sales and boost profit for your digital or creative agency? Here are some expert insights to help guide your journey….
August 20, 2024

Common Privacy Misconceptions Amongst Web Designers
Learn why some of the most common arguments about website privacy are just flat-out wrong!…
August 14, 2024

WordPress Security Through Obscurity?
Occasionally, we still encounter people who passionately recommend security measures that offer questionable value. Many of these recommendations fall into the category of security…
August 14, 2024

Spot the Difference: Detecting AI-Generated Content in the Wild
Tired of trying to figure out if content was written by AI or not? Find out how to detect AI-generated content in this blog and whether to trust AI detectors….
August 12, 2024

Is Headless WordPress more secure?
Terms like headless architecture, Jamstack, or Composable often pop up during discussions about the future of the web. While those terms differ a bit…
August 7, 2024