The Yogosha blog

State-of-the-hack cybersecurity blog.

Company NewsCase StudiesProduct
10/03/2026

AI Transformation in 3 Months

AI Transformation in 3 Months : How to Create Momentum ? AI transformation has become…
Company NewsCase Studies
10/03/2026

Understanding and anticipating the impact of AI-based offensive tools in the field of cybersecurity

At Yogosha, Offensive Security Platform, we questioned what AI applied to offensive security truly means.…
Company NewsCase Studies
10/03/2026

AI and vulnerability triage: lessons learned from our automated assistance POC

In the world of vulnerability management, triage is the gatekeeper. It ensures the quality of…
Company NewsCase Studies
10/03/2026

AI: From POC to Feature — The Guide to Safe Industrialization

Your AI POC has launched, the lights are green, and internal excitement is at an…
Company NewsCase Studies
10/03/2026

AI pivot, under the hood: use cases, tools & budget

AI is everywhere—it’s all anyone talks about! In the corporate world, between market pressure, sales…
19/01/2026

Scalingo: “Bug bounty gives us access to a broader diversity of testers and helps cover scenarios that are rarely explored.”

This interview with Yannick Jost, CISO at Scalingo, retraces his journey—from growing dissatisfaction with traditional…

Product News

Subscribe to our NEWSLETTER