The Yogosha blog

State-of-the-hack cybersecurity blog.

Sopra Steria x YogoshaCase StudiesInterviews
17/09/2025

Secure Before You Deploy: How Sopra Steria Combines Pentests and Bug Bounty for Greater Agility

In an era of accelerating digital transformation, cybersecurity concerns are shifting to the beginning of…
Sopra Steria x YogoshaCase StudiesInterviews
11/09/2025

Secure Before You Deploy: How Sopra Steria Combines Pentests and Bug Bounty for Greater Agility

In an era of accelerating digital transformation, cybersecurity concerns are shifting to the beginning of…
Veepee x YogoshaCase StudiesInterviews
11/09/2025

Comment un acteur  européen incontournable du e-commerce renforce sa cybersécurité avec le Bug Bounty

Avec des dizaines de millions de membres, 7 000 marques partenaires et un chiffre d’affaires…
14/03/2025

Why CVEs and Automated Scanners Are Insufficient to Prioritize Your Security Operations

With the exponential growth in volume and sophistication of cyberattacks, further fueled by AI, organizations…
27/01/2025

DORA: Everything About Threat-Led Penetration Testing (TLPT)

Some entities regulated by DORA are required to carry out enhanced security tests, in the…
22/01/2025

DORA: The Challenge of Scaling Security Testing

Scaling security testing is a major challenge for DORA-regulated entities. Let's explore concrete solutions for…

Product News

Subscribe to our NEWSLETTER