by Athan Georgopoulos | Feb 5, 2025 |
Intro If you are involved with the infosec community odds are that you have heard the term “red teaming”; but do you know where the term originates from, what does it include when we are talking cybersecurity, and finally is it something that your organisation needs?...
by Aristotelis Koureleas | Jul 24, 2024 |
Introduction In this blog post, we will explore the methods to utilize printers as a means to establish an initial foothold within a network, potentially compromising the domain controller and, consequently, the entire network. We will introduce a newly discovered...
by George Karpouzas | Oct 10, 2018 |
Part 1 In this blog post series, we will show you certain steps among with the tools used in order to conduct IoT security assessments. In this first part you will need a .bin file of a device firmware in order to continue. Tools needed file It...