The Yogosha blog

State-of-the-hack cybersecurity blog.

20/09/2023

What is Unit Testing: explanation, examples and methodology

In web development, Unit Testing plays a key role in guaranteeing the quality and reliability…
Case StudiesInterviews
28/08/2023

leboncoin: “Bug Bounty is our commitment to the hacking community”

We spoke to Zakaria Rachid, CISO of leboncoin. He told us about the group's security,…
23/08/2023

The financial industry and digital operational resilience

Digital operational resilience is a key issue for the financial sector, all the more so…
22/08/2023

How to protect industrial institutions from cyber threats?

Connected industrial systems are prime targets for cyber attackers. What's at stake, and how can…
22/08/2023

Software publishers: bet on Offensive Security

Software publishers are prime targets for cyber-attackers. Investing in Offensive Security can be a real…
07/07/2023

Public sector: cyberthreats, challenges, and consequences

Public services are a prime target for cyber-attackers, and the number of incidents reported is…

Subscribe to our NEWSLETTER