• Follow
  • Follow
  • Follow
  • Follow
  • Follow
Twelvesec
BLOG
  • SERVICES
    • CYBER ASSURANCE
    • SECURITY MANAGEMENT
    • INCIDENT HANDLING & RESPONSE
    • SECURITY TRAINING
    • SECURE SDLC
  • SECTORS
  • TOOLS
  • BLOG
  • ABOUT US
    • ΤWELVESEC
    • CLIENTS
    • HEADQUARTERS
    • CAREERS
    • NEWS
  • SERVICES
    • CYBER ASSURANCE
    • SECURITY MANAGEMENT
    • INCIDENT HANDLING & RESPONSE
    • SECURITY TRAINING
    • SECURE SDLC
  • SECTORS
    • Aerospace
    • Automotive
    • Defence
    • Finance
    • Healthcare
    • Law enforcement & Security agencies
    • Manufacturing
    • Maritime
    • Public sector
    • Rail
    • Retail
    • Software development
    • Telecommunications
    • Tourism
  • TOOLS
  • BLOG
  • ABOUT US
    • Twelvesec
    • Clients
    • Life @ Twelvesec
    • Careers
    • News
    • Contact
The Silent Storm in Brussels: Decoding the ShinyHunters Breach of the European Commission

The Silent Storm in Brussels: Decoding the ShinyHunters Breach of the European Commission

by Athan Georgopoulos | Mar 30, 2026 | 0 comments

Introduction On March 24, 2026, the digital defences of one of the world’s most influential governing bodies were breached. The European Commission (EC), the executive branch of the European Union (EU), confirmed it had fallen victim to a sophisticated...
The Iran War And The Global Digital Threat Landscape

The Iran War And The Global Digital Threat Landscape

by Athan Georgopoulos | Mar 3, 2026 | 0 comments

On the 28th of February 2026, the world witnessed a paradigm shift in modern warfare. The coordinated U.S.A. and Israeli strikes against Iran, termed “Operation Epic Fury,” and the subsequent confirmation of the death of Supreme Leader Ayatollah Ali...

LATEST POSTS

  • The Silent Storm in Brussels: Decoding the ShinyHunters Breach of the European Commission March 30, 2026
  • The Iran War And The Global Digital Threat Landscape March 3, 2026
  • RCE Via Arbitrary File Upload at Open eClass January 16, 2026
  • BoFs Are Not Dead January 14, 2026
  • Is user training a good thing? December 9, 2025
  • The three vectors of a pentest engagement. November 14, 2025
  • Securing the Smart Future – Why IoT & Hardware Penetration Testing Is No Longer Optional October 17, 2025

TAGS

Architecture Review Athens Android App Reversing ALPHA BANK APPI 0-day adb ADSL 0day 13033 Application Source Code Review android Apple airlines Aerospace Application Penetration Test 0-days Android Security ALDI apk

ΝΟΤΕ

* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.

STAY CONNECTED

[email protected]

+30 211 182 21 58

LEGAL

  • DATA PROTECTION POLICY
  • TERMS & CONDITIONS

NAVIGATE

  • CONTACT
  • BLOG
  • CAREERS
Copyright 2026 Twelvesec | Created by Amiad