Top

Kristi Shehu

Kristi Shehu is a Cyber Security Engineer (Application Security) and Cyber Journalist based in Albania. She lives and breathes technology, specializing in crafting content on cyber news and the latest security trends, all through the eyes of a cyber professional. Kristi is passionate about sharing her thoughts and opinions on the exciting world of cyber security, from breakthrough emerging technologies to dynamic startups across the globe.


It reads like a headline from a dystopian future, but it is real, and it happened. A file dump containing more than 16 billion stolen credentials, yes, a billion with a "b", has been posted online, and it has been

Place of residence: Munich, Germany  Position: Regional Director DACH and Eastern Germany for K2View Please describe a day in your life I usually wake up around 5 a.m. and head to the gym by 6. After working out, I have breakfast around 8

Typing is automatic. You do not think twice when entering your password, writing an email, or opening a terminal. But what if someone was watching? Not through your webcam, not by hijacking your browser, but through the keyboard itself. Keyloggers

Place of Residence: CT, USA Position: Director of Growth/General Manager Please describe a day in your life: My day starts early, around 6 am. I typically go for a run around my neighbourhood first thing in the morning. That helps me clear my

Ever get the feeling your phone is a little too smart? You like a single video of a beach in Greece, and suddenly TikTok serves you flight deals, hotel tours, and "day in Mykonos" vlogs. It is not magic; it

If you've ever managed a pentest, you probably know the drill: long email threads, clunky PDFs, delayed responses, and findings that get buried before they're fixed. Cyver Core was built to change that. Born from firsthand frustration with outdated pentest workflows,

From automated customer service reps to code-writing copilots and decision-making bots, intelligent agents are no longer science fiction. They are shipping products. But somewhere between the wow factor of generative AI and the push to production, we forget that these

When a penetration test ends, the SOC team becomes the primary audience for the final report, yet too often, reports are written with a detached, formal tone that ignores the practical needs of those defending the organization every day. SOC

Most security teams are good at spotting vulnerabilities when they make noise. They are used to chasing red flags, alerts, and patterns that scream for attention. However, identity-based attacks do not work like that. They move quietly, using real credentials

Loading
OSZAR »