Project blog

Cyberattack at Hellenic Open University (HOU): 813GB of personal data leaked

The Hellenic Open University clarifies that this size represents an extremely small percentage, compared to the total volume of data that they maintain, and emphasizes that the investigation continues.

The HOU in Greece, has provided clarifications regarding the cyberattack it suffered last October, noting that the investigation on this incident is still ongoing. The cyberattack, which took place on October 25th, resulted in the HOU’s electronic systems being put out of operation.

Continue reading

What can cybersecurity learn from true crime?

Even if you’re not a fan of true crime documentaries or podcasts, you’re probably familiar with some of the well-known serial killers from USA in the 1980s. Ted Bundy, Jeffrey Dahmer, and the Golden State Killer to name a few.

Now what does this have to do with cybersecurity and CS-AWARE-NEXT? I promise there is a connection other than justifying my consumption of true crime podcasts during office hours!

Watching true crime documentaries, where the serial killer is caught much too late because they committed their crimes in different states or counties and the police stations didn’t share information across borders. In their defence, at the time, the technology wasn’t developed to do so.

Continue reading

Cybersecurity & the Domino effect

A cyberattack is rarely caused by one big thing, but more often a combination of many little things. We see it all the time in disaster documentary film, how even the tiniest little detail can start a chain reaction with devastating results. A chain reaction that could have been stopped if even just one of the Dominos in the line were missing.

Take documentary film about plane crashes for example. We know flying is safe, we know how high the security priority is. In the events of a crash, we hear of all the frustratedly many small errors and we are left wondering how so many things have been overlooked.

Continue reading

Beyond 2025

OTS Company, as a partner of the CS-AWARE-NEXT, represented the project at the international digital technology and innovation exhibition “Beyond”, which took place from 4 to 6 of April 2025 in Athens, Greece.

Beyond fosters the development of innovative technologies and business opportunities, while it aims at creating a hub that promotes collaboration and encourages the exchange of knowledge and ideas. It is a great opportunity for global innovators, researchers, and start-ups to connect. This year, the title of the exhibition was “AI Reality Bites” and focused on artificial intelligence and all the factors that come along as it integrates society. Cybersecurity was also a key theme: there were experts who demonstrated live, discussed in panels and showcased in workshops the importance of it and how a user or an organization can be safer online.

Continue reading

Cybersecurity in Italian Municipalities: A Growing Emergency

In recent years, the digitalization of Public Administration has increasingly exposed the cybersecurity vulnerabilities of Italian municipalities. Hacker attacks are multiplying, targeting public offices and essential services, while institutions struggle to respond with new regulations and protective measures. However, the problems persist, and municipalities often find themselves unprepared in the face of increasingly sophisticated threats.

Rising Concern Over Cybersecurity in Municipalities

According to data from the National Cybersecurity Agency (ACN), in 2024 about 18% of cyberattacks targeted Public Administration, particularly affecting local authorities and healthcare centers. This alarming trend prompted the government to respond with legislative measures and security strategies.

Continue reading

Social engineering - the Jedi mind trick of cyberattacks.

“These aren’t the droids you’re looking for”, “These aren’t the droids we’re looking for” - The iconic exchange between Ben (Obi-Wan Kenobi) and the Stormtroopers in Star Wars episode IV - A New Hope. A scene where our heroes are almost caught in a check-point, but are able to convince the enemy Stormtroopers to let them pass.

And while the cybercriminals haven’t graduated from the Jedi Academy, they can use similar techniques to manipulate you when you least expect it.

Continue reading

Increased ransomware incidents in 2024 – Checkpoint Report

The annual Ransomware report for 2024 from the research team of Checkpoint reveals a deep change in cyber threats, with ransomware incidents facing an increase of 11% in 2024 in comparison to 2023.

In particular, Q4’s attacks represented the 33% of all the attacks, making it the most active semester recorded, with a total of 1.827 incidents.

Key findings of the report are outlined below:

  • General increase: the report records in total 5.414 ransomware attacks in 2024, with an increase of 11% when compared to 2023. The most active period was the fourth semester, with 1.827 incidents which represent the 33% of the annual total.

    Continue reading

CriM 2024

The yearly cyber security seminar CriM is upon us once again! We are glad to host three days of expert lectures on this year’s topic: CyberSec in Muumimaa - Finnish Cybersecurity in a changing world.

Alongside with the expert lectures, there is a workshop on TPM 2.0 and a two-afternoon hackathon on AI Security focused on Large Language Models. The 100+ attendants from the industry and University of Oulu will get acquainted with TPM2.0 security, prompt engineering, and the latest LLM security testing tools.

Continue reading

Amateur criminals pose a significant threat to cyberspace

Amateur criminals who use do-it-yourself solutions to increase their attacks are now an increasing threat for the internet users. Kaspersky’s GReAT (Global Research & Analysis Team) published a report that describes the recent ransomware attacks with the use of code. The report sheds a light on the tools and the methods that are used by organized ransomware groups and single users. According to its findings the ransomware criminal organisations have a vast variety of tools and samples at their disposal. They often own sample ransomware, while isolated users often use DIY leaked variations to launch their attacks. The study by Kasperksy reveals recent ransomware attacks, which take advantage of the source code leaks, by allowing the attackers to locate their victims and reproduce fast any malware activity, thus constituting them a significant threat. Last April, the SEXi team attacked IxMetro, by using a recent ransomware variation called SEXi. This group targets ESXi apps while all the recognized victims used versions of the apps that were not supported. SEXi uses different ransomware versions for every platform – Bakuk for Linus and Lockbit for Windows. They are, also, the only ones using this Session app for communication, with a unified ID for multiple attacks. This lack of professionalism and the absence of a TOR leak website made them stand out even more.

Continue reading

Dangerous malware in Greece

The last report from Check Point Research, in August 2024, reveals the most recent data on the most prevalent cyberthreats in a global scale but also in Greece. Qbot software was the main threat in Greece, affecting 12.77% of the organisations. FakeUpdates was second, which affected 10.21% of the Greek organisations, while Androgyh0st reached 3.62%. A number of other significant threats include Tofsee (3.19%), Njrat (2,34%), Joker (1,91%), SnakeKeylogger (1,70%) and AsyncRat, which recorded a percentage of 1,70% both in Greece and globally.

Continue reading