Skip to content
BSG Blog

Berezha Security Group

  • Main
  • Website
  • Services
    • Appsec
    • Pentest
    • Consulting
  • Training
    • Developer Training
    • Pentester Training
  • Contact
Search
BSG Blog

Berezha Security Group

  • Main
  • Website
  • Services
    • Appsec
    • Pentest
    • Consulting
  • Training
    • Developer Training
    • Pentester Training
  • Contact
Secure End-to-end Encrypted Messaging

Why End-to-End Encrypted Messaging Is Essential Today

Infosec News, Tools & Methods

Secure your communications with end-to-end encryption. Protect sensitive data and ensure compliance with expert guidance from our cybersecurity consulting team.

Why End-to-End Encrypted Messaging Is Essential Today Read More »

NIS2, ENISA and cyber security governance

Enhancing Cybersecurity to Align with NIS2 Directive

Tools & Methods

Ensure compliance with the NIS2 Directive using ENISA’s guidance. Strengthen cybersecurity governance, mitigate risks, and secure your organization’s future.

Enhancing Cybersecurity to Align with NIS2 Directive Read More »

Cyber Security Board Toolkit

Empowering Cybersecurity Governance: NCSC’s Board Toolkit

Tools & Methods

Discover how the NCSC’s Cyber Security Board Toolkit helps boards lead confidently, align cybersecurity with strategy, and protect against evolving threats.

Empowering Cybersecurity Governance: NCSC’s Board Toolkit Read More »

Phishing Training

Why Phishing Training Is Not as Effective as You Think

Infosec News

Phishing training might be failing you. Discover why traditional methods fall short and how interactive, engaging strategies can truly boost your cybersecurity.

Why Phishing Training Is Not as Effective as You Think Read More »

Laptop Screen

Zero-Day Vulnerabilities: A Growing Threat in Cyberattacks

Leave a Comment / Infosec News

Cyber attackers increasingly exploit zero-day vulnerabilities. Learn how proactive measures, patch management, and professional guidance can help safeguard your business.

Zero-Day Vulnerabilities: A Growing Threat in Cyberattacks Read More »

Celebrating 10 Years of Cybersecurity Excellence at BSG

Leave a Comment / BSG News

Berehza Security Group celebrates 10 years of cybersecurity excellence, marking a decade of growth, innovation, and trusted service. Join us in celebrating this milestone!

Celebrating 10 Years of Cybersecurity Excellence at BSG Read More »

SAMMY logo

Enhance Software Security with SAMMY and OWASP SAMM

Leave a Comment / Tools & Methods

Discover how SAMMY, a comprehensive management tool, enhances software security by effectively implementing the OWASP Software Assurance Maturity Model (SAMM).

Enhance Software Security with SAMMY and OWASP SAMM Read More »

SQL Injection Vulnerability

BSG Discovers SQL Injection Vulnerability in Leaflet Maps Marker

Leave a Comment / BSG News

BSG identifies SQL Injection in Leaflet Maps Marker for WordPress. Learn how to bolster your site’s defense against this pressing vulnerability.

BSG Discovers SQL Injection Vulnerability in Leaflet Maps Marker Read More »

Tagify XSS

CVE-2022-25854: Stored XSS in @yaireo/tagify npm module

1 Comment / BSG News

A BSG team has discovered a previously unknown vulnerability in Tagify – a popular JavaScript library.

CVE-2022-25854: Stored XSS in @yaireo/tagify npm module Read More »

Cyber Security Advice for Small Business

Cyber Security Advice for Small Business

Leave a Comment / BSG News

This cyber security for small business advice can be used as a checklist of the most crucial cyber security measures every small business owner can implement.

Cyber Security Advice for Small Business Read More »

← Previous 1 2 3 … 7 Next →
BSG Blog Logo

Berezha Security Group is a cybersecurity firm focused on application security, penetration testing, information security consulting, and professional training.
Learn more: https://bsg.tech/

  • Facebook
  • LinkedIn
  • Twitter
  • YouTube
  • Instagram
  • RSS Feed

Copyright © 2025 BSG Blog | Powered by Astra WordPress Theme