The Yogosha blog

State-of-the-hack cybersecurity blog.

24/11/2022

Penetration testing: why and how to conduct a pentest

A penetration test identifies vulnerabilities by simulating an attack by hackers. Tools, types of pentests,…
17/11/2022

SIGMA Rules: how to standardize detections for any SIEM

SIGMA rules are a great collaborative tool for SOC teams. They allow to standardize the…
InterviewsCase Studies
03/11/2022

Veepee: behind the pink logo, a model of digital security

Veepee's CISO and Lead OffSec told us about the tight security of this e-commerce giant.…
Company News
26/10/2022

Yogosha and LOGON bring the VOC to Asia

Yogosha joins hands with LOGON Software, a cyber security solutions provider, to launch the Vulnerability…
Interviews
25/10/2022

Hunter Talks: meet Mohammed Aloraimi, aka ixSly

Mohammed Aloraimi, also known as ixSly, is a Cyber Team Leader from the UAE and…
30/09/2022

Hunters Survival Game #2: Winners & Numbers (Infographic)

On September 1st, hackers of our Top 100 2022 were invited to compete for the…

Subscribe for updates

Platform blog