The Yogosha blog

State-of-the-hack cybersecurity blog.


OSINT 101: Understanding OSINT, its tools, benefits and risks

OSINT is an essential part of information gathering. In this article, we'll look at what…
A man wearing a suit and a shiled protecting a server room.

EDR Security: What is it, and how to choose your EDR solution?

In this article, you'll learn what Endpoint Detection and Response (EDR) security is, what it's…
Illustration of the bug bounty. A futuristic cybersecurity engineer.

Bug Bounty: the ultimate guide to a successful program

Thinking of getting into bug hunting, but unsure of where to start? Hackers, scope, triage……

Meet vraj: “I hacked an airline and won miles, now I could travel for free”

vraj is a security researcher. We spoke about what makes a good hunter, how to…
Santa CTF !

Christmas CTF 2022: Winners & numbers!

HO HO HO HUNTERS! Yogosha’s Christmas CTF is over, and it’s time to announce the…
Case StudiesInterviews

Terega: addressing cybersecurity challenges in the energy sector

Focus on Teréga. A model of digital security in the energy industry, where cybersecurity challenges…

Subscribe for updates

Platform blog