by George Roumeliotis | Jan 14, 2026 |
Abstract Buffer overflow vulnerabilities remain highly relevant in embedded systems, where the absence of operating system abstractions and modern memory protection mechanisms creates conditions fundamentally different from traditional software exploitation. Unlike...
by George Roumeliotis | Oct 17, 2025 |
Introduction: The Explosive Rise of IoT and the Hidden Risks From smart homes and medical devices to connected factories and self-driving cars, the Internet of Things (IoT) is no longer futuristic. It’s here, and it’s everywhere. But as the number of...
by George Roumeliotis | May 23, 2025 |
Would you wait until you caught a deadly disease before seeing a doctor? Penetration Testing: Your Cybersecurity Vaccine Think of a penetration test—or pentest—as a cybersecurity vaccine. Just like a vaccine introduces a weakened form of a virus to train your immune...
by George Roumeliotis | Feb 2, 2024 |
During an assessment, we discovered a vulnerability in the LedgerSMB application, a widely-used open-source accounting software tailored for small and mid-size businesses. This vulnerability, identified in versions 1.3 to 1.9, 1.10.0 to 1.10.29, and 1.11.0 to 1.11.8,...