en

Datami Blog: Cybersecurity News and Articles

Trending

Oleksandr Filipov: Security engineer at Datami, author of articles
Oleksandr Filipov: Security engineer at Datami, author of articles
4K Views
Penetration Testing Results: What Do You Need to Know About a Pentest Report?
Feb 17, 2025
Oleksandr Filipov: Security engineer at Datami, author of articles
Oleksandr Filipov: Security engineer at Datami, author of articles
9.2K Views
Penetration Testing Execution Standard: Benefits and 7 Essential Stages
Feb 27, 2025
Oleksandr Filipov: Security engineer at Datami, author of articles
Oleksandr Filipov: Security engineer at Datami, author of articles
3.3K Views
Effective Penetration Testing Plan: 8 Steps to Reliable Security
Feb 27, 2025
Datami Newsroom
Datami Newsroom
9.5K Views
Ranking the Best Secure Browsers with VPN: Key Privacy, Security, and Performance Insights
Nov 14, 2024

Discover the topics:

Web Applications Penetration Testing: A Pentest Guide Oleksandr Filipov: Security engineer at Datami, author of articles
Oleksandr Filipov: Security engineer at Datami, author of articles

Web Applications Penetration Testing: A Pentest Guide

Web applications are targeted by attacks every day - from simple scanners to deliberate breaches. To understand how vulnerable a web application is and how to protect it from hackers’ actions, a special assessment is conducted - penetration testing (pente

Oct 1, 2025
Types of Penetration Testing: Choosing the Best One for Your Company Oleksandr Filipov: Security engineer at Datami, author of articles
Oleksandr Filipov: Security engineer at Datami, author of articles

Types of Penetration Testing: Choosing the Best One for Your Company

Learn, what are the different types of penetration testing that exist, and how each assesses an organization's security posture and identifies vulnerabilities.

Jan 17, 2025
Microsoft enables email bombing protection Datami Newsroom
Datami Newsroom

Microsoft enables email bombing protection

Microsoft announced a new update to Defender for Office 365 that automatically detects and blocks email bombing attacks. The rollout started in June, and most users will receive the feature by mid-July 2025.

Sep 12, 2025 3 min
Cloudflare Repelled a Record DDoS Attack of 11.5 Tbit/s Datami Newsroom
Datami Newsroom

Cloudflare Repelled a Record DDoS Attack of 11.5 Tbit/s

Cloudflare reported that it stopped the most powerful UDP flood DDoS attack aimed at exhausting system resources. In 35 seconds, the attackers flooded the company with traffic at 11.5 Tbit/s.

Sep 5, 2025 2 min
Dangerous Calendar: A New Tool for Phishing Attacks Datami Newsroom
Datami Newsroom

Dangerous Calendar: A New Tool for Phishing Attacks

Did you know that an ordinary calendar can become a tool for a hacker attack? Google researchers discovered that the hacker group APT41 is using Google Calendar to send commands to infected systems.

Sep 2, 2025 3 min
The Myth of HTTPS Reliability: How Encryption Can Mislead Users Datami Newsroom
Datami Newsroom

The Myth of HTTPS Reliability: How Encryption Can Mislead Users

Among internet users, a long-standing myth has taken hold: if a website has the HTTPS mark - that is, a padlock in the address bar and the letter S after “http” - it means the resource is safe and trustworthy. But in reality, the situation is much more co

Sep 3, 2025 3 min
What is Penetration Testing, or How Can You Avoid Being Caught Off Guard by Hackers? Oleksandr Filipov: Security engineer at Datami, author of articles
Oleksandr Filipov: Security engineer at Datami, author of articles

What is Penetration Testing, or How Can You Avoid Being Caught Off Guard by Hackers?

Penetration test definition and types. The key steps penetration testers take during different pentestings and how it helps companies improve their overall cybersecurity resilience

Dec 9, 2024
Automation vs. Pentesters: Can AI Replace Humans? Datami Newsroom
Datami Newsroom

Automation vs. Pentesters: Can AI Replace Humans?

Every year, companies are increasingly integrating automated tools into their cybersecurity processes. Automation is just one auxiliary tool that comes with both advantages and disadvantages that must be kept in mind.

Jul 25, 2025 3 min
Order a free consultation
We value your privacy
We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies. Cookie policy