by Athan Georgopoulos | Mar 3, 2026 |
On the 28th of February 2026, the world witnessed a paradigm shift in modern warfare. The coordinated U.S.A. and Israeli strikes against Iran, termed “Operation Epic Fury,” and the subsequent confirmation of the death of Supreme Leader Ayatollah Ali...
by Yiannis Koukouras | Dec 9, 2025 |
In the past years, there has been a major focus on end-user training as it is considered (and rightly so) the weakest link in the cybersecurity chain. I keep hearing more and more experts (and self-proclaimed ones) emphasize that we should train our users constantly....
by George Roumeliotis | Oct 17, 2025 |
Introduction: The Explosive Rise of IoT and the Hidden Risks From smart homes and medical devices to connected factories and self-driving cars, the Internet of Things (IoT) is no longer futuristic. It’s here, and it’s everywhere. But as the number of...
by Athan Georgopoulos | Aug 19, 2025 |
Cybersecurity teams today face an uphill battle against organised, fully equipped, and sophisticated adversaries. Traditional security assessments, such as penetration testing, vulnerability scans, and compliance audits, offer valuable insights but often fail to...
by Athan Georgopoulos | Jul 11, 2025 |
Security technology evolves, but so do cybercriminals and threat actors. They are sophisticated and skilled, equipped with advanced toolboxes and knowledge about complex digital systems to conduct fierce attacks. To address these threats, businesses and organisations...