The Yogosha blog

State-of-the-hack cybersecurity blog.

13/02/2023

OSINT 101: Understanding OSINT, its tools, benefits and risks

OSINT is an essential part of information gathering. In this article, we'll look at what…
A man wearing a suit and a shiled protecting a server room.
23/01/2023

EDR Security: What is it, and how to choose your EDR solution?

In this article, you'll learn what Endpoint Detection and Response (EDR) security is, what it's…
Illustration of the bug bounty. A futuristic cybersecurity engineer.
10/01/2023

Bug Bounty: the ultimate guide to a successful program

Thinking of getting into bug hunting, but unsure of where to start? Hackers, scope, triage……
Interviews
04/01/2023

Meet vraj: “I hacked an airline and won miles, now I could travel for free”

vraj is a security researcher. We spoke about what makes a good hunter, how to…
Santa CTF !
30/12/2022

Christmas CTF 2022: Winners & numbers!

HO HO HO HUNTERS! Yogosha’s Christmas CTF is over, and it’s time to announce the…
Case StudiesInterviews
19/12/2022

Terega: addressing cybersecurity challenges in the energy sector

Focus on Teréga. A model of digital security in the energy industry, where cybersecurity challenges…

Subscribe for updates

Platform blog