by Athan Georgopoulos | Mar 3, 2026 |
On the 28th of February 2026, the world witnessed a paradigm shift in modern warfare. The coordinated U.S.A. and Israeli strikes against Iran, termed “Operation Epic Fury,” and the subsequent confirmation of the death of Supreme Leader Ayatollah Ali...
by TwelveSec Lab | Jan 16, 2026 |
Introduction The Open eClass platform (http://www.openeclass.org) is an integrated Learning Management System (LMS). It follows the philosophy of open source software and supports a multitude of e-learning scenarios without restrictions and constraints. The service...
by George Roumeliotis | Jan 14, 2026 |
Abstract Buffer overflow vulnerabilities remain highly relevant in embedded systems, where the absence of operating system abstractions and modern memory protection mechanisms creates conditions fundamentally different from traditional software exploitation. Unlike...
by Yiannis Koukouras | Dec 9, 2025 |
In the past years, there has been a major focus on end-user training as it is considered (and rightly so) the weakest link in the cybersecurity chain. I keep hearing more and more experts (and self-proclaimed ones) emphasize that we should train our users constantly....
by Yiannis Koukouras | Nov 14, 2025 |
There are 3 vectors that define a penetration test engagement. I. Knowledge of the attacker Blackbox The attacker has no previous knowledge of the scope, its technology stack nor the security controls implemented. Graybox The attacker has limited knowledge of the...