en
background

Oleksandr Filipov

Cybersecurity author

Author of articles on cybersecurity Alexander Filipov – certified cybersecurity engineer with practical experience in the field of information security since 2017.

He graduated from Columbia University (New York, USA) and received a number of international certificates, including from PentesterLab, Udemy, Ehacking and IYT Worldwide, which cover a wide range of areas – from web pentesting and mobile security to OSINT intelligence.

Alexander specializes in conducting pentests using OWASP, OSSTMM and PTES methodologies, auditing smart contracts, reverse engineering, vulnerability assessment, protecting digital resources from DDoS attacks and other external threats. He works with both web services and mobile applications, and corporate networks.

Among successful cases – cybersecurity audit of businesses from various industries: banking, pharmaceutical and medical organizations, SaaS companies, and others.

In his articles, Alexander Filipov shares his own practical knowledge – these materials will be useful not only to specialists, but also to businesses and cybersecurity enthusiasts. The cybersecurity author writes based on real Datami projects about current threats and vulnerabilities of cyber defense systems, effective security audit methods, and effective solutions for strengthening the protection of digital resources.

Learn more from our author's cybersecurity practice
Types of Cybersecurity Vulnerabilities: The Most Common and Critical from Datami’s Practice Oleksandr Filipov
Oleksandr Filipov
Types of Cybersecurity Vulnerabilities: The Most Common and Critical from Datami’s Practice

In this article, we outline the main types of vulnerabilities. Based on the results of our projects, we have also compiled top lists of the most common and the most critical ones.

Mar 7, 2026 15 min
Cybersecurity for Business Oleksandr Filipov
Oleksandr Filipov
Cybersecurity for Business

Today, any business, whether a three-person startup or a corporation with thousands of employees, is a target for hackers. That’s why cybersecurity is a key element of business stability and growth.

Oct 28, 2025 15 min
What Is a Cyberattack? Oleksandr Filipov
Oleksandr Filipov
What Is a Cyberattack?

Do you know what a cyberattack is and how to recognize it? In this article, we will talk about the motives and consequences of attacks, how to act during an incident, and how to protect yourself from cyberattacks.

Nov 5, 2025 15 min
Cyberattack Types Oleksandr Filipov
Oleksandr Filipov
Cyberattack Types

To effectively protect data and systems, it is important to understand what types of cyberattacks exist and how they work. In this article, we will look at the main types of attacks and figure out how to protect your business from them.

Nov 6, 2025 15 min
What is an Advanced Persistent Threat (APT)? Oleksandr Filipov
Oleksandr Filipov
What is an Advanced Persistent Threat (APT)?

Advanced Persistent Threats (APTs) are sophisticated cyberattacks in which an attacker remains unnoticed in the network for an extended period of time. What should you do to avoid becoming a victim of an APT attack?

Dec 2, 2025 15 min
What is Penetration Testing, or How Can You Avoid Being Caught Off Guard by Hackers? Oleksandr Filipov
Oleksandr Filipov
What is Penetration Testing, or How Can You Avoid Being Caught Off Guard by Hackers?

Penetration test definition and types. The key steps penetration testers take during different pentestings and how it helps companies improve their overall cybersecurity resilience

Dec 9, 2024
How to tell if your WordPress site has been hacked: Expert tips from Datami Oleksandr Filipov
Oleksandr Filipov
How to tell if your WordPress site has been hacked: Expert tips from Datami

Is your WordPress site acting unstable or redirecting to other pages? Discover how to check for hacks. Read expert tips from Datami.

Apr 17, 2025
Web Applications Penetration Testing: A Pentest Guide Oleksandr Filipov
Oleksandr Filipov
Web Applications Penetration Testing: A Pentest Guide

Web applications are targeted by attacks every day - from simple scanners to deliberate breaches. To understand how vulnerable a web application is and how to protect it from hackers’ actions, a special assessment is conducted - penetration testing (pente

Oct 1, 2025
Back to home page
Order a consultation
We value your privacy
We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies. Cookie policy