by Yiannis Koukouras | Dec 9, 2025 |
In the past years, there has been a major focus on end-user training as it is considered (and rightly so) the weakest link in the cybersecurity chain. I keep hearing more and more experts (and self-proclaimed ones) emphasize that we should train our users constantly....
by Yiannis Koukouras | Nov 14, 2025 |
There are 3 vectors that define a penetration test engagement. I. Knowledge of the attacker Blackbox The attacker has no previous knowledge of the scope, its technology stack nor the security controls implemented. Graybox The attacker has limited knowledge of the...
by Yiannis Koukouras | Nov 27, 2020 |
Due to the ongoing Covid-19 pandemic, teleworking has become the norm. Following our previous teleworking tips post, this one aims to help first-comers, both people and organisations to keep safe. It is usually those, who are the prime targets of black hat hackers. In...
by Yiannis Koukouras | Mar 18, 2020 |
When Sir Isaac Newton was in the university, the bubonic plague came around. Thus, he wasforced to stay in self-isolation in his dorm for a very big period of time. This was the time that hecame up with most of his big breakthroughs! When you are confined between four...
by Yiannis Koukouras | Oct 1, 2018 |
During the Bsides Athens 2018 conference, I made a presentation on how – during a penetration test exercise – we managed to infiltrate malware and exfiltrate data in/out of a corporate secure laptop, that was using the “Walled Garden”...