The Yogosha blog

State-of-the-hack cybersecurity blog.

29/09/2025

Activity Monitoring: No More Blind Spots in Your Security Tests

Are you absolutely certain that your critical assets are sufficiently tested? Can you prove it?…
Sopra Steria x YogoshaCase StudiesInterviews
11/09/2025

Secure Before You Deploy: How Sopra Steria Combines Pentests and Bug Bounty for Greater Agility

In an era of accelerating digital transformation, cybersecurity concerns are shifting to the beginning of…
Veepee x YogoshaCase StudiesInterviews
11/09/2025

How a Key European E-commerce Player Strengthens its Cybersecurity with Bug Bounty

With tens of millions of members, 7,000 partner brands, and an annual turnover of €3.3…
14/03/2025

Why CVEs and Automated Scanners Are Insufficient to Prioritize Your Security Operations

With the exponential growth in volume and sophistication of cyberattacks, further fueled by AI, organizations…
27/01/2025

DORA: Everything About Threat-Led Penetration Testing (TLPT)

Some entities regulated by DORA are required to carry out enhanced security tests, in the…
22/01/2025

DORA: The Challenge of Scaling Security Testing

Scaling security testing is a major challenge for DORA-regulated entities. Let's explore concrete solutions for…

Product News

Subscribe to our NEWSLETTER