Is user training a good thing?
by Yiannis Koukouras | December 9, 2025 | BLOG | 0 Comments
In the past years, there has been a major focus on end-user training as it is considered (and rightly so) the weakest link in the cybersecurity chain. I keep hearing more and more experts (and...
The three vectors of a pentest engagement.
by Yiannis Koukouras | November 14, 2025 | BLOG | 0 Comments
There are 3 vectors that define a penetration test engagement. I. Knowledge of the attacker Blackbox The attacker has no previous knowledge of the scope, its technology stack nor the security...
Securing the Smart Future – Why IoT & Hardware Penetration Testing Is No Longer Optional
by George Roumeliotis | October 17, 2025 | BLOG | 0 Comments
Introduction: The Explosive Rise of IoT and the Hidden RisksFrom smart homes and medical devices to connected factories and self-driving cars, the Internet of Things (IoT) is no longer futuristic....
Red Teaming: The Art of Adversarial Simulation
by Athan Georgopoulos | August 19, 2025 | BLOG | 0 Comments
Cybersecurity teams today face an uphill battle against organised, fully equipped, and sophisticated adversaries. Traditional security assessments, such as penetration testing, vulnerability scans,...
Threat Led Penetration Testing: Simulating Tomorrow’s Attacks, Today
by Athan Georgopoulos | July 11, 2025 | BLOG | 0 Comments
Security technology evolves, but so do cybercriminals and threat actors. They are sophisticated and skilled, equipped with advanced toolboxes and knowledge about complex digital systems to conduct...
