en

Datami Blog: Cybersecurity News and Articles

Trending

Oleksandr Filipov: Security engineer at Datami, author of articles
Oleksandr Filipov: Security engineer at Datami, author of articles
2.1K Views
Penetration Testing Results: What Do You Need to Know About a Pentest Report?
Feb 17, 2025
Oleksandr Filipov: Security engineer at Datami, author of articles
Oleksandr Filipov: Security engineer at Datami, author of articles
2.7K Views
Penetration Testing Execution Standard: Benefits and 7 Essential Stages
Feb 27, 2025
Oleksandr Filipov: Security engineer at Datami, author of articles
Oleksandr Filipov: Security engineer at Datami, author of articles
1.5K Views
Effective Penetration Testing Plan: 8 Steps to Reliable Security
Feb 27, 2025
Datami Newsroom
Datami Newsroom
5.5K Views
Ranking the Best Secure Browsers with VPN: Key Privacy, Security, and Performance Insights
Nov 14, 2024

Discover the topics:

Top 5 Companies That Refused to Pay Hackers a Ransom Datami Newsroom
Datami Newsroom

Top 5 Companies That Refused to Pay Hackers a Ransom

In May 2025, hackers breached Coinbase, stole customer data, and demanded a ransom. However, the crypto exchange refused to pay and turned to law enforcement for help. This is just one example of how companies are bravely standing up to cyber extortion.

Jul 4, 2025 3 min
Top 5 Cybersecurity Trends in 2025: What Should You Be Ready For? Datami Newsroom
Datami Newsroom

Top 5 Cybersecurity Trends in 2025: What Should You Be Ready For?

Cybersecurity faces the challenge of rapidly advancing tech. To stay ahead, it’s not enough to follow innovations – we must anticipate them. Forecasting 2025 trends gives a glimpse into the digital future and helps prepare for what’s ahead.

Jul 2, 2025 3 min
The Equifax Data Breach: A Preventable Catastrophe Datami Newsroom
Datami Newsroom

The Equifax Data Breach: A Preventable Catastrophe

This incident occurred back in 2017, but cybersecurity experts are still studying it in detail. This case features a series of classic security failures – serving as a clear example of what not to do.

Jun 30, 2025 3 min
Unconventional Records: Pentesters Hacked a Tesla in Just 2 Minutes Datami Newsroom
Datami Newsroom

Unconventional Records: Pentesters Hacked a Tesla in Just 2 Minutes

Today, all it takes to take over a car is a computer. That’s exactly what hackers demonstrated at a special competition - they hacked a Tesla in just 120 seconds, and the result became a true sensation.

Jun 27, 2025 3 min
Top 5 Reasons to Invest in Penetration Testing in 2025 Datami Newsroom
Datami Newsroom

Top 5 Reasons to Invest in Penetration Testing in 2025

Today, nearly every business is closely connected to the internet: websites, mobile apps, cloud data storage, electronic payments, and more. This brings great convenience, but at the same time, it introduces additional risks and potential financial losses

Jun 25, 2025 3 min
Phishing is Evolving: What Are the Main Threats in 2025 and How to Counter Them Datami Newsroom
Datami Newsroom

Phishing is Evolving: What Are the Main Threats in 2025 and How to Counter Them

This method of digital deception has been known for several decades, yet it remains one of the most dangerous cyber threats for both individual users and companies. 75% of organizations worldwide encountered at least one phishing attempt.

Jun 20, 2025 3 min
Antivirus Is Not a Shield: Why You Can’t Do Without Pentesting Datami Newsroom
Datami Newsroom

Antivirus Is Not a Shield: Why You Can’t Do Without Pentesting

Among companies, there is a common belief that installing antivirus software provides a sufficient level of security. This stems from the popularity of antivirus solutions, which are an important part of protection, but do not cover all threats.

Jun 23, 2025 3 min
Top Cybersecurity Books to Read Datami Newsroom
Datami Newsroom

Top Cybersecurity Books to Read

The 4th edition of Kali Linux 2018: Assuring Security by Penetration Testing is designed for ethical hackers, pentesters, and IT security professionals.

Nov 13, 2024
Order a free consultation
We value your privacy
We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies. Cookie policy