The EU NIS 2 Directive
by Ioanna Dima | October 11, 2024 | BLOG | 0 Comments
The NIS 2 Directive (Directive (EU) 2022/2555), adopted by the European Parliament and Council on 14 December 2022, marks a significant legislative effort to enhance cybersecurity and resilience...
Domain Admin through a simple Xerox Printer
by Aristotelis Koureleas | July 24, 2024 | BLOG | 0 Comments
IntroductionIn this blog post, we will explore the methods to utilize printers as a means to establish an initial foothold within a network, potentially compromising the domain controller and,...
LedgerSMB – CVE-2024-23831: Privilege escalation through CSRF attack on “setup.pl”
by George Roumeliotis | February 2, 2024 | BLOG | 0 Comments
During an assessment, we discovered a vulnerability in the LedgerSMB application, a widely-used open-source accounting software tailored for small and mid-size businesses. This vulnerability,...
The Current State of Phishing Attacks
by Andrei Grigoras | November 22, 2023 | BLOG | 1 Comment
Modern Challenges and SolutionsPart 1: Defenses Against Phishing AttacksPhishing attacks, one of the oldest types of cyber threats, have become more sophisticated and diverse. This evolution is due,...
Bypassing anti-reversing defences in iOS applications
by Xenofon Vassilakopoulos | October 10, 2023 | BLOG | 0 Comments
Introduction This blog post provides a walktrough on dynamically bypassing anti-debugging and anti-reversing defences in iOS applications. Furthermore, this blog post is using resources from OWASP...