by Athan Georgopoulos | Jul 11, 2025 |
Security technology evolves, but so do cybercriminals and threat actors. They are sophisticated and skilled, equipped with advanced toolboxes and knowledge about complex digital systems to conduct fierce attacks. To address these threats, businesses and organisations...
by George Roumeliotis | May 23, 2025 |
Would you wait until you caught a deadly disease before seeing a doctor? Penetration Testing: Your Cybersecurity Vaccine Think of a penetration test—or pentest—as a cybersecurity vaccine. Just like a vaccine introduces a weakened form of a virus to train your immune...
by Athan Georgopoulos | Feb 5, 2025 |
Intro If you are involved with the infosec community odds are that you have heard the term “red teaming”; but do you know where the term originates from, what does it include when we are talking cybersecurity, and finally is it something that your organisation needs?...
by Aristotelis Koureleas | Jul 24, 2024 |
Introduction In this blog post, we will explore the methods to utilize printers as a means to establish an initial foothold within a network, potentially compromising the domain controller and, consequently, the entire network. We will introduce a newly discovered...
by George Roumeliotis | Feb 2, 2024 |
During an assessment, we discovered a vulnerability in the LedgerSMB application, a widely-used open-source accounting software tailored for small and mid-size businesses. This vulnerability, identified in versions 1.3 to 1.9, 1.10.0 to 1.10.29, and 1.11.0 to 1.11.8,...