Software publishers: cybersecurity as a trust-building lever Software publishers are experiencing the sharpest increase in cyber-attacks. Cybersecurity is essential to maintain user…Mehdi Bhih14/06/2023
What is Attack Surface Management? (tools, strategy, guidelines) Cybersecurity loves its fancy words, and you're in for a treat! ASM, DRPs, EASM, CAASM,…Sébastien Palais23/05/2023
Case Studies Ethical hackers test security of French online proxy voting service Yogosha's ethical hackers have tested the security of MaProcuration, the digital proxy voting system of…Sébastien Palais10/05/2023
Case StudiesInterviews Paris Aéroport: Hackers to test airport equipment cybersecurity Groupe ADP called on Yogosha and its hackers to test the cybersecurity of airport equipment.…Sébastien Palais02/05/2023
What is Offensive Security? An introductory guide to OffSec Pentesting, ethical hacking, certifications... Let's take a closer look at Offensive Security, or OffSec, an…Sébastien Palais20/04/2023
DORA: A Complete Guide to Compliance for the Financial Sector Looking for a practical guide to DORA compliance? Here's a 17-point checklist to get you…Sébastien Palais08/03/2023
OSINT 101: Understanding OSINT, its tools, benefits and risks OSINT is an essential part of information gathering. In this article, we'll look at what…Sébastien Palais13/02/2023
EDR Security: What is it, and how to choose your EDR solution? In this article, you'll learn what Endpoint Detection and Response (EDR) security is, what it's…Sébastien Palais23/01/2023
Bug Bounty: the ultimate guide to a successful program Thinking of getting into bug hunting, but unsure of where to start? Hackers, scope, triage……Sébastien Palais10/01/2023
Interviews Meet vraj: “I hacked an airline and won miles, now I could travel for free” vraj is a security researcher. We spoke about what makes a good hunter, how to…Sébastien Palais04/01/2023