UN1 Blog

UN1 Blog

Empowering You with Cutting-Edge News, Expert Advice, and Fun-Filled Tech Chronicles

Daring Minds Welcome

Daring Minds Welcome

  • Goran Manojlović

    Introduction: A Harmonious Fusion What if I tell you that my job doesn’t just put food on the table, but fills my soul? What if I tell you that this isn’t confined to the occasional ‘good day’, but it’s my five-day-a-week reality? What if I tell you that my profession is intertwined with my ...

    August 17, 2023

    4 min read

  • Miroslav Milićević

    In the dimly lit basement of an abandoned building, hidden beneath the layers of darkness and secrecy, a clandestine cybercrime group known as “The Shadow Syndicate” gathered around a flickering screen displaying the lines of code. Their eyes glimmered with excitement and malice as they discovered a chink in the armor of a renowned ...

    August 17, 2023

    4.4 min read

  • Miroslav Milićević

    AWS Cognito Service With Amazon Cognito, you can add user sign-up and sign-in features and control access to your web and mobile applications. Amazon Cognito provides an identity store that scales to millions of users, supports social and enterprise identity federation, and offers advanced security features to protect your consumers and business. Built on ...

    August 17, 2023

    3.4 min read

  • Damjan Cvetanović

    In the past few years, I keep getting more questions about how to dive into cybersecurity, mainly: 1. What are the best learning resources? 2. Do I need certificates to land a job? 3. Which certificates or University courses would you recommend? 4. Should I work first in general IT? 5. How to transition ...

    August 17, 2023

    5.3 min read

  • Goran Manojlović

    As a Quality Assurance Engineer, writing test cases is a critical step in ensuring that the product under development meets the requirements and is of the highest quality. The process of test case writing involves identifying and documenting the test scenarios and conditions, which are then used to verify the functionality of the software ...

    August 17, 2023

    4 min read

  • Marko Romandić

    When I first started traveling full-time, my friends and family thought I was nuts. “You’re going to get sick of it,” they’d say. “You can’t be productive if you’re not in the office.” They couldn’t have been more wrong. As more and more companies allow employees to work remotely, even the skeptics are embracing ...

    August 17, 2023

    9.6 min read

  • Miroslav Milićević

    Cybercrime and corporate espionage are the reality. This is so primarily because statistics show that the number of cyber-attacks has been growing yearly. In their 2022 Cybersecurity Almanac, Cisco, and Cybersecurity Ventures estimated that the cost of cybercrime will hit $10.5 trillion by 2025. We’re safe to say that attackers are more prepared than ...

    August 17, 2023

    1.8 min read

  • Luka Šikić

    One of the most common questions a security consultant gets from their clients is why vulnerability scanning isn’t enough. The question usually highlights a lack of understanding about the true nature of cyber-attacks and that regular vulnerability scanning is not enough to detect advanced threats. In this blog, we will explain vulnerability scanning, its ...

    August 17, 2023

    2.1 min read

  • Damjan Cvetanović

    This blog post will explain some of the most critical points to consider regarding every company’s Information Security Program. It will also address common questions that I often receive and some mistakes that regularly occur across companies in terms of information security. I will present this matter in the following 10 points, based on ...

    August 17, 2023

    4.1 min read

  • Miroslav Milićević

    AWS Cognito Service With Amazon Cognito, you can add user sign-up and sign-in features and control access to your web and mobile applications. Amazon Cognito provides an identity store that scales to millions of users, supports social and enterprise identity federation, and offers advanced security features to protect your consumers and business. Built on ...

    17 August

    3.4 min read

  • Damjan Cvetanović

    In the past few years, I keep getting more questions about how to dive into cybersecurity, mainly: 1. What are the best learning resources? 2. Do I need certificates to land a job? 3. Which certificates or University courses would you recommend? 4. Should I work first in general IT? 5. How to transition ...

    17 August

    5.3 min read

  • Goran Manojlović

    As a Quality Assurance Engineer, writing test cases is a critical step in ensuring that the product under development meets the requirements and is of the highest quality. The process of test case writing involves identifying and documenting the test scenarios and conditions, which are then used to verify the functionality of the software ...

    17 August

    4 min read

  • Marko Romandić

    When I first started traveling full-time, my friends and family thought I was nuts. “You’re going to get sick of it,” they’d say. “You can’t be productive if you’re not in the office.” They couldn’t have been more wrong. As more and more companies allow employees to work remotely, even the skeptics are embracing ...

    17 August

    9.6 min read

  • Miroslav Milićević

    Cybercrime and corporate espionage are the reality. This is so primarily because statistics show that the number of cyber-attacks has been growing yearly. In their 2022 Cybersecurity Almanac, Cisco, and Cybersecurity Ventures estimated that the cost of cybercrime will hit $10.5 trillion by 2025. We’re safe to say that attackers are more prepared than ...

    17 August

    1.8 min read

  • Luka Šikić

    One of the most common questions a security consultant gets from their clients is why vulnerability scanning isn’t enough. The question usually highlights a lack of understanding about the true nature of cyber-attacks and that regular vulnerability scanning is not enough to detect advanced threats. In this blog, we will explain vulnerability scanning, its ...

    17 August

    2.1 min read

  • Damjan Cvetanović

    This blog post will explain some of the most critical points to consider regarding every company’s Information Security Program. It will also address common questions that I often receive and some mistakes that regularly occur across companies in terms of information security. I will present this matter in the following 10 points, based on ...

    17 August

    4.1 min read

  • Milenko Jevremović

    No one wants to blend in, especially businesses. We all want to make a statement, be seen, and be heard. Here at UN1QUELY, we’re passionate about challenging the ordinary. Since 2021, we rose to the occasion to deliver world-class solutions and products to companies that want to drive success and that put their security ...

    17 August

    1.6 min read

  • Damjan Cvetanović

    This blog post will discuss the basics of binary exploit development on modern x64 Linux systems, including the following topics: ☐ Stack Canary Bypass ☐ Address Space Layout Randomization Bypass ☐ Data Execution Prevention Bypass ☐ Buffer Overflows ☐ Format Strings ☐ Return-Oriented Programming A custom binary will be used to demonstrate a simple ...

    17 August

    7 min read

  • Petar Bajović

    People starting as engineers need to pay attention to the security field. It’s comprehensive, and it will be more prominent. Personally, I think that security will be present on the market forever, and it will keep growing — if not exponentially, then at least linearly. Within the IT security field, various departments and systems ...

    17 August

    8.1 min read

contact

Curious whether UN1QUELY is the Right Fit for Your Project?

Let’s discuss your challenges, goals, and timelines to determine the right services and solutions for your team and what working with the UN1QUELY squad may look like.