Blog

Articles about self-hosting, security, DevOps, and how to get the most out of your VPS.

How to Know If Your Cronjobs Are Failing Silently
Tutorial2026-03-29·9 min

How to Know If Your Cronjobs Are Failing Silently

A cronjob that fails without warning is one of the most dangerous problems in infrastructure. This guide explains how to detect them, diagnose them, and prevent it from happening again.

SecuryBlack vs Healthchecks.io: Which to Use to Monitor Your Cronjobs
Comparison2026-03-29·7 min

SecuryBlack vs Healthchecks.io: Which to Use to Monitor Your Cronjobs

Healthchecks.io and SecuryBlack solve the same problem: knowing if your cronjobs and backups run. This comparison helps you choose which one fits your stack.

Uptime Robot vs Uptime Kuma vs SecuryBlack: Which to Use in 2026
Comparison2026-03-29·8 min

Uptime Robot vs Uptime Kuma vs SecuryBlack: Which to Use in 2026

Honest comparison between Uptime Robot, Uptime Kuma, and SecuryBlack: prices, features, use cases, and which to choose according to your needs in 2026.

Digital Security Checklist for SMEs
Security2026-03-15·7 min

Digital Security Checklist for SMEs

A practical checklist with 20 digital security measures every SME should implement to protect their business.

Why Homelabbers Need Their Own Security Stack
Product2026-03-02·7 min

Why Homelabbers Need Their Own Security Stack

You manage your own server, your own backups, your own apps. But who monitors that everything works?

SecuryBlack vs Have I Been Pwned: Which One to Choose?
Comparison2026-02-19·6 min

SecuryBlack vs Have I Been Pwned: Which One to Choose?

Detailed comparison between SecuryBlack and Have I Been Pwned. Discover the differences, advantages, and which one best suits your needs.

How to Know If Your Email Has Been Compromised (and What to Do)
Security2026-02-18·6 min

How to Know If Your Email Has Been Compromised (and What to Do)

Your email may be circulating in breach databases without you knowing. Here's how to check.

GDPR and Data Breaches: What Obligations Does Your Company Have?
GDPR2026-02-12·7 min

GDPR and Data Breaches: What Obligations Does Your Company Have?

Guide on GDPR obligations when your company suffers a data breach: notification deadlines, sanctions, and steps to follow.

Heartbeats: How to Know Your Backups Actually Run
Tutorial2026-02-05·7 min

Heartbeats: How to Know Your Backups Actually Run

A cronjob that fails silently is worse than having no backup. Heartbeats alert you when your backup script stops running. Here's how they work.

What to Do If Your Data Appears in a Leak
Guide2026-02-05·6 min

What to Do If Your Data Appears in a Leak

Step-by-step guide on how to act if you discover that your email or personal data has been leaked in a security breach.

What Is a Data Breach and How Does It Affect You?
Breaches2026-01-29·7 min

What Is a Data Breach and How Does It Affect You?

Discover what a data breach is, how they occur, what risks they involve for you, and what you can do to protect yourself effectively.

What Is the Dark Web and Why Should You Worry?
Dark web2026-01-22·7 min

What Is the Dark Web and Why Should You Worry?

Discover what the dark web is, how it works, what type of stolen data is sold there, and why your credentials may be there without you knowing.

What Is Credential Stuffing and How Does It Affect Your Business?
Credential stuffing2026-01-15·6 min

What Is Credential Stuffing and How Does It Affect Your Business?

Discover what credential stuffing is, why it's so dangerous for businesses and individuals, and how to protect yourself from this automated attack.

What Data of Mine Is Circulating on the Internet Without Me Knowing?
Privacy2026-01-08·7 min

What Data of Mine Is Circulating on the Internet Without Me Knowing?

Discover what personal information about you may be exposed on the internet, how it leaks, and what you can do to reduce your digital footprint.

How to Protect Your Company's Email Against Leaks
Business2026-01-01·7 min

How to Protect Your Company's Email Against Leaks

Guide for SMEs and companies on how to protect corporate email accounts against data breaches and targeted attacks.

Why Your Company Needs a Breach Scanner (Even If It's Small)
Business2025-12-25·6 min

Why Your Company Needs a Breach Scanner (Even If It's Small)

Discover why SMEs are the favorite target of cybercriminals and how a breach scanner can protect your business.

Phishing: What It Is, How to Detect It, and How to Protect Yourself
Phishing2025-12-18·8 min

Phishing: What It Is, How to Detect It, and How to Protect Yourself

Complete guide on phishing: what it is, the most common types, how to identify a fraudulent email, and the best practices to protect yourself.

SecuryBlack News: What's Coming in 2026
Product2025-12-11·5 min

SecuryBlack News: What's Coming in 2026

Discover the new features we're developing at SecuryBlack for 2026: Network Scanner, Uptime Monitor, Heartbeat, and more.

Breach Monitoring: What Is It and Why Do You Need It?
Monitoring2025-12-04·5 min

Breach Monitoring: What Is It and Why Do You Need It?

Discover what breach monitoring is, how it works, and why it's essential to protect your digital identity continuously.

The 10 Biggest Data Breaches in History
Breaches2025-11-27·9 min

The 10 Biggest Data Breaches in History

A review of the largest data breaches of all time: Yahoo, LinkedIn, Facebook, and more. Discover what data was leaked and what lessons they left.

Complete Guide to Two-Factor Authentication (2FA)
2fa2025-11-20·7 min

Complete Guide to Two-Factor Authentication (2FA)

Everything you need to know about two-factor authentication: what it is, how to enable it, what methods exist, and why it's essential for your security.

Cybersecurity Glossary: All the Terms You Need to Know
Glossary2025-11-13·10 min

Cybersecurity Glossary: All the Terms You Need to Know

Complete cybersecurity dictionary. All key terms explained clearly and simply, from A to Z.

Is It Safe to Save Passwords in the Browser?
Passwords2025-11-06·6 min

Is It Safe to Save Passwords in the Browser?

Analysis of the pros and cons of saving passwords in Chrome, Firefox, or Safari. Discover if it's a safe practice or if you should use alternatives.

How to Know If My Email Has Been Hacked (2026 Guide)
Guide2025-10-30·6 min

How to Know If My Email Has Been Hacked (2026 Guide)

Learn how to check if your email address has appeared in a data leak and what steps to follow to protect yourself.

How the k-Anonymity Model Works and Why It Protects Your Privacy
Privacy2025-10-23·6 min

How the k-Anonymity Model Works and Why It Protects Your Privacy

Accessible technical explanation of the k-Anonymity model: how it allows checking if your email has been leaked without revealing your email to the server.

How to Create Secure Passwords You Can Remember
Passwords2025-10-16·6 min

How to Create Secure Passwords You Can Remember

Learn techniques for creating strong and easy-to-remember passwords, and discover why a password manager is your best ally.