Recommended blog posts
You might be interested in the following related posts.
Beware of insecure-by-default libraries!
Outstanding incidents of this type of crime since 2011
Introduction to a trend of just over a decade ago
An OffSec Exploitation Expert review
An interview with members of our hacking team
What is invisible to some hackers is visible to others
Watch out for keylogging/keyloggers
There's not an only way but here's a good one