Recommended blog posts
You might be interested in the following related posts.
Beware of insecure-by-default libraries!
An OffSec Exploitation Expert review
An interview with members of our hacking team
What is invisible to some hackers is visible to others
There's not an only way but here's a good one
Benefits and risks of these increasingly used programs
Description and critique of CEH certifications
An OffSec Experienced Pentester review