UN1 Blog
UN1 Blog
Empowering You with Cutting-Edge News, Expert Advice, and Fun-Filled Tech Chronicles
Daring Minds Welcome
Daring Minds Welcome
Danijel Dejanović
February 1, 2024
2.6min read
In the digital age, cybersecurity is a topic that often comes up in conversations, especially when people learn about my profession in IT security. The most common half-joking request I get is, “Hey, can you hack my Instagram?” While some people think hacking is a far-fetched skill reserved for movie-style villains or tech geniuses, ...
Goran Manojlović
Introduction: A Harmonious Fusion What if I tell you that my job doesn’t just put food on the table, but fills my soul? What if I tell you that this isn’t confined to the occasional ‘good day’, but it’s my five-day-a-week reality? What if I tell you that my profession is intertwined with my ...
August 17, 2023
4 min read
Miroslav Milićević
In the dimly lit basement of an abandoned building, hidden beneath the layers of darkness and secrecy, a clandestine cybercrime group known as “The Shadow Syndicate” gathered around a flickering screen displaying the lines of code. Their eyes glimmered with excitement and malice as they discovered a chink in the armor of a renowned ...
August 17, 2023
4.4 min read
Miroslav Milićević
AWS Cognito Service With Amazon Cognito, you can add user sign-up and sign-in features and control access to your web and mobile applications. Amazon Cognito provides an identity store that scales to millions of users, supports social and enterprise identity federation, and offers advanced security features to protect your consumers and business. Built on ...
August 17, 2023
3.4 min read
Damjan Cvetanović
In the past few years, I keep getting more questions about how to dive into cybersecurity, mainly: 1. What are the best learning resources? 2. Do I need certificates to land a job? 3. Which certificates or University courses would you recommend? 4. Should I work first in general IT? 5. How to transition ...
August 17, 2023
5.3 min read
Goran Manojlović
As a Quality Assurance Engineer, writing test cases is a critical step in ensuring that the product under development meets the requirements and is of the highest quality. The process of test case writing involves identifying and documenting the test scenarios and conditions, which are then used to verify the functionality of the software ...
August 17, 2023
4 min read
Marko Romandić
When I first started traveling full-time, my friends and family thought I was nuts. “You’re going to get sick of it,” they’d say. “You can’t be productive if you’re not in the office.” They couldn’t have been more wrong. As more and more companies allow employees to work remotely, even the skeptics are embracing ...
August 17, 2023
9.6 min read
Miroslav Milićević
Cybercrime and corporate espionage are the reality. This is so primarily because statistics show that the number of cyber-attacks has been growing yearly. In their 2022 Cybersecurity Almanac, Cisco, and Cybersecurity Ventures estimated that the cost of cybercrime will hit $10.5 trillion by 2025. We’re safe to say that attackers are more prepared than ...
August 17, 2023
1.8 min read
Luka Šikić
One of the most common questions a security consultant gets from their clients is why vulnerability scanning isn’t enough. The question usually highlights a lack of understanding about the true nature of cyber-attacks and that regular vulnerability scanning is not enough to detect advanced threats. In this blog, we will explain vulnerability scanning, its ...
August 17, 2023
2.1 min read
Damjan Cvetanović
This blog post will explain some of the most critical points to consider regarding every company’s Information Security Program. It will also address common questions that I often receive and some mistakes that regularly occur across companies in terms of information security. I will present this matter in the following 10 points, based on ...
August 17, 2023
4.1 min read
Miroslav Milićević
AWS Cognito Service With Amazon Cognito, you can add user sign-up and sign-in features and control access to your web and mobile applications. Amazon Cognito provides an identity store that scales to millions of users, supports social and enterprise identity federation, and offers advanced security features to protect your consumers and business. Built on ...
17 August
3.4 min read
Damjan Cvetanović
In the past few years, I keep getting more questions about how to dive into cybersecurity, mainly: 1. What are the best learning resources? 2. Do I need certificates to land a job? 3. Which certificates or University courses would you recommend? 4. Should I work first in general IT? 5. How to transition ...
17 August
5.3 min read
Goran Manojlović
As a Quality Assurance Engineer, writing test cases is a critical step in ensuring that the product under development meets the requirements and is of the highest quality. The process of test case writing involves identifying and documenting the test scenarios and conditions, which are then used to verify the functionality of the software ...
17 August
4 min read
Marko Romandić
When I first started traveling full-time, my friends and family thought I was nuts. “You’re going to get sick of it,” they’d say. “You can’t be productive if you’re not in the office.” They couldn’t have been more wrong. As more and more companies allow employees to work remotely, even the skeptics are embracing ...
17 August
9.6 min read
Miroslav Milićević
Cybercrime and corporate espionage are the reality. This is so primarily because statistics show that the number of cyber-attacks has been growing yearly. In their 2022 Cybersecurity Almanac, Cisco, and Cybersecurity Ventures estimated that the cost of cybercrime will hit $10.5 trillion by 2025. We’re safe to say that attackers are more prepared than ...
17 August
1.8 min read
Luka Šikić
One of the most common questions a security consultant gets from their clients is why vulnerability scanning isn’t enough. The question usually highlights a lack of understanding about the true nature of cyber-attacks and that regular vulnerability scanning is not enough to detect advanced threats. In this blog, we will explain vulnerability scanning, its ...
17 August
2.1 min read
Damjan Cvetanović
This blog post will explain some of the most critical points to consider regarding every company’s Information Security Program. It will also address common questions that I often receive and some mistakes that regularly occur across companies in terms of information security. I will present this matter in the following 10 points, based on ...
17 August
4.1 min read
Milenko Jevremović
No one wants to blend in, especially businesses. We all want to make a statement, be seen, and be heard. Here at UN1QUELY, we’re passionate about challenging the ordinary. Since 2021, we rose to the occasion to deliver world-class solutions and products to companies that want to drive success and that put their security ...
17 August
1.6 min read
Damjan Cvetanović
This blog post will discuss the basics of binary exploit development on modern x64 Linux systems, including the following topics: ☐ Stack Canary Bypass ☐ Address Space Layout Randomization Bypass ☐ Data Execution Prevention Bypass ☐ Buffer Overflows ☐ Format Strings ☐ Return-Oriented Programming A custom binary will be used to demonstrate a simple ...
17 August
7 min read
Petar Bajović
People starting as engineers need to pay attention to the security field. It’s comprehensive, and it will be more prominent. Personally, I think that security will be present on the market forever, and it will keep growing — if not exponentially, then at least linearly. Within the IT security field, various departments and systems ...
17 August
8.1 min read