The Yogosha blog

State-of-the-hack cybersecurity blog.

Case Studies

Ethical hackers test security of French online proxy voting service

Yogosha's ethical hackers have tested the security of MaProcuration, the digital proxy voting system of…
Case StudiesInterviews

Paris Aéroport: Hackers to test airport equipment cybersecurity

Groupe ADP called on Yogosha and its hackers to test the cybersecurity of airport equipment.…

What is Offensive Security? An introductory guide to OffSec

Pentesting, ethical hacking, certifications... Let's take a closer look at Offensive Security, or OffSec, an…

DORA: A complete guide to compliance for the financial sector

Looking for a practical guide to DORA compliance? Here's a 17-point checklist to get you…

OSINT 101: Understanding OSINT, its tools, benefits and risks

OSINT is an essential part of information gathering. In this article, we'll look at what…
A man wearing a suit and a shiled protecting a server room.

EDR Security: What is it, and how to choose your EDR solution?

In this article, you'll learn what Endpoint Detection and Response (EDR) security is, what it's…

Platform blog