en

Datami Blog: Cybersecurity News and Articles

Trending

Oleksandr Filipov: Security engineer at Datami, author of articles
Oleksandr Filipov: Security engineer at Datami, author of articles
5.3K Views
Penetration Testing Results: What Do You Need to Know About a Pentest Report?
Feb 17, 2025
Oleksandr Filipov: Security engineer at Datami, author of articles
Oleksandr Filipov: Security engineer at Datami, author of articles
16.3K Views
Penetration Testing Execution Standard: Benefits and 7 Essential Stages
Feb 27, 2025
Oleksandr Filipov: Security engineer at Datami, author of articles
Oleksandr Filipov: Security engineer at Datami, author of articles
4.9K Views
Effective Penetration Testing Plan: 8 Steps to Reliable Security
Feb 27, 2025
Datami Newsroom
Datami Newsroom
13.1K Views
Ranking the Best Secure Browsers with VPN: Key Privacy, Security, and Performance Insights
Nov 14, 2024

Discover the topics:

How to tell if your WordPress site has been hacked: Expert tips from Datami Oleksandr Filipov: Security engineer at Datami, author of articles
Oleksandr Filipov: Security engineer at Datami, author of articles

How to tell if your WordPress site has been hacked: Expert tips from Datami

Is your WordPress site acting unstable or redirecting to other pages? Discover how to check for hacks. Read expert tips from Datami.

Apr 17, 2025
What is an Advanced Persistent Threat (APT)? Oleksandr Filipov: Security engineer at Datami, author of articles
Oleksandr Filipov: Security engineer at Datami, author of articles

What is an Advanced Persistent Threat (APT)?

Advanced Persistent Threats (APTs) are sophisticated cyberattacks in which an attacker remains unnoticed in the network for an extended period of time. What should you do to avoid becoming a victim of an APT attack?

Dec 2, 2025 15 min
Datami at MERGE Madrid and EBC 25 Datami Newsroom
Datami Newsroom

Datami at MERGE Madrid and EBC 25

The Datami team attended MERGE Madrid and the European Blockchain Convention 2025 to share their expertise and witness how Web3 is evolving. This year, the focus shifted toward real-world solutions – security, auditing, and transparent standards.

Nov 13, 2025 3 min
KillSec Ransomware Attacks Healthcare Datami Newsroom
Datami Newsroom

KillSec Ransomware Attacks Healthcare

The hacker group KillSec has recently been actively attacking the IT systems of the healthcare sector in Latin America and other countries — the attackers have already stolen dozens of gigabytes and nearly 95,000 files.

Nov 18, 2025
Modern Phishing Campaigns Use PDF Files for Attacks Datami Newsroom
Datami Newsroom

Modern Phishing Campaigns Use PDF Files for Attacks

Next-generation phishing campaigns disguise themselves as well-known brands and use artificial intelligence to mislead users. In 2025, companies face a wave of sophisticated attacks that are changing cybersecurity rules.

Nov 24, 2025 3 min
Cybersecurity for Business Oleksandr Filipov: Security engineer at Datami, author of articles
Oleksandr Filipov: Security engineer at Datami, author of articles

Cybersecurity for Business

Today, any business, whether a three-person startup or a corporation with thousands of employees, is a target for hackers. That’s why cybersecurity is a key element of business stability and growth.

Oct 28, 2025 15 min
Cyberattack Types Oleksandr Filipov: Security engineer at Datami, author of articles
Oleksandr Filipov: Security engineer at Datami, author of articles

Cyberattack Types

To effectively protect data and systems, it is important to understand what types of cyberattacks exist and how they work. In this article, we will look at the main types of attacks and figure out how to protect your business from them.

Nov 6, 2025 15 min
What Is a Cyberattack? Oleksandr Filipov: Security engineer at Datami, author of articles
Oleksandr Filipov: Security engineer at Datami, author of articles

What Is a Cyberattack?

Do you know what a cyberattack is and how to recognize it? In this article, we will talk about the motives and consequences of attacks, how to act during an incident, and how to protect yourself from cyberattacks.

Nov 5, 2025 15 min
Order a free consultation
We value your privacy
We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies. Cookie policy