Digital Operational Resilience Act – DORA – Part II
by Ioanna Dima | March 7, 2025 | BLOG | 0 Comments
Intro Hello and welcome to the second part of our two-part blog post where we take a deep dive into the Digital Operational Resilience Act (DORA). For those of you who join us now, I would advise...
Digital Operational Resilience Act – DORA
by Ioanna Dima | February 26, 2025 | BLOG | 0 Comments
Hello, welcome to our deep dive into the Digital Operational Resilience Act (DORA), a pivotal regulatory framework reshaping cybersecurity and operational resilience in the European financial...
The EU NIS 2 Directive
by Ioanna Dima | October 11, 2024 | BLOG | 0 Comments
The NIS 2 Directive (Directive (EU) 2022/2555), adopted by the European Parliament and Council on 14 December 2022, marks a significant legislative effort to enhance cybersecurity and resilience...
Domain Admin through a simple Xerox Printer
by Aristotelis Koureleas | July 24, 2024 | BLOG | 0 Comments
IntroductionIn this blog post, we will explore the methods to utilize printers as a means to establish an initial foothold within a network, potentially compromising the domain controller and,...
LedgerSMB – CVE-2024-23831: Privilege escalation through CSRF attack on “setup.pl”
by George Roumeliotis | February 2, 2024 | BLOG | 0 Comments
During an assessment, we discovered a vulnerability in the LedgerSMB application, a widely-used open-source accounting software tailored for small and mid-size businesses. This vulnerability,...