All

Need for cultural change regarding cybersecurity

Roger A. Grimes (KnowBe4’s Data-Driven Defense Evangelist) wrote an excellent Comprehensive Anti-Phishing Guide to help IT personnel combat increasing threats from phishing.

Among the important points Roger Grimes made were:

Training: We have to accept that there will always be to some degree phishing and social engineering activity that will bypass even the best or our defenses. Consequently, it is important to train employees how to recognize phishing and social engineering activity and how to manage them. Social engineering and phishing have long been thought to be the principal cause for many malicious data breaches. Fostering good security awareness training is indispensable to building a human firewall.

Continue reading

Click fix: a new weapon in cyber attacks

A new and particularly dangerous technique, called ClickFix, is at the center of ESET’s latest Threat Report for the first half of 2025. Its activity increased by 500%, now ranking second among the most widespread cyberattack vectors, second only to phishing. ClickFix operates in a deceptive way, displaying fake errors that prompt victims to execute malicious commands on their devices. Alarmingly, it targets all major operating systems — Windows, Linux, and macOS — and is used to spread ransomware, infostealers, trojans, and even state-sponsored malware.

Continue reading

Cybersecurity in Greece: What changes with the Joint Ministerial Decision (JMD) 1689/2025.

The JMD 1689/2025 introduces some important obligations for Greek businesses and public entities in the cyber security field, by setting a new national frame for the protection of the digital infrastructures.

The outline

The new frame, that is relying on the 5160/2024 law, addresses some “basic” and “important” entities and includes technical, organisational and administrative actions for the managing of cyber threats. The “basic” entities are included in strictrer demands but every single one is obliged to comply.

Continue reading

Threats and challenges in Greece - Check Point Software – Cybersecurity 2025

As Greece continues to digitize its public and private sectors, cybersecurity has become a national priority. Recent high-profile cyberattacks on government services and critical infrastructure have underscored the country’s vulnerability to emerging digital threats. With growing investment in AI, cloud technologies, and smart city initiatives, Greece faces the same global challenges—AI-enabled attacks, cloud misconfigurations etc—but often with fewer resources and cybersecurity professionals compared to larger nations. In this evolving threat landscape, staying ahead requires not only adopting global best practices but also preparing for the specific vulnerabilities that come with Greece’s digital transformation. Added to the aforementioned, is the challenge of the lack of digital literacy, which makes the progress in this field even slower.

Continue reading

Inside CS-CONNECT: The open-source technology powering cybersecurity collaboration

At the core of CS-CONNECT stands a clear technical vision: to enable seamless, data-driven collaboration via a customisable, sustainable platform.

To this end, the CS-CONNECT team selected Mattermost, an open-source collaboration platform renowned for its extensibility, as the foundation. Mattermost’s robust plugin system and active developer community make it ideal for building custom features to meet the unique requirements of cybersecurity collaboration.

One of CS-CONNECT’s key innovations is the HOOD (Hyperlinked Object-Oriented Discussion) methodology. This approach enables users to link specific data points (e.g. a field in a policy or an event in a timeline) directly within chat messages. It’s like being able to ‘point’ at data during a digital conversation, helping teams to maintain context and clarity, even in complex discussions.

Continue reading

What is CS-CONNECT? A new approach to cybersecurity collaboration

In a world where cyber threats are becoming increasingly sophisticated and interconnected, collaboration between organisations and regions is essential. That’s where CS-CONNECT comes in.

Developed as part of the CS-AWARE NEXT project and funded by the European Union’s Horizon Europe programme, CS-CONNECT is an innovative platform. Its main goal is to support local and regional cybersecurity collaboration by offering a dynamic environment in which organisations can share and review information, co- create security policies and respond quickly to cybersecurity incidents.

Continue reading

Digital Transformation in Italian Local Authorities: Progress Made, but Cybersecurity Lags Behind

In recent years, Italy’s local governments have taken significant steps toward digital transformation. Fuelled by national reforms and EU recovery funds, more and more municipalities are bringing services online. Yet as digital adoption accelerates, a critical vulnerability has emerged: cybersecurity.

A More Digital Italy—Even at the Local Level?

Digital innovation is no longer the exclusive domain of central ministries or major cities. Local governments across Italy are embracing new technologies at an unprecedented pace. The data speaks for itself:

Continue reading

Greek companies have the weakest cybersecurity

Greek businesses have emerged as the weakest link in the European Union when it comes to cybersecurity, ranking last in terms of protective measures against cyberattacks. Just days after Kaspersky released data showing that Greece tops the list as the most dangerous online environment globally, Eurostat figures paint a grim picture of corporate cyber-readiness, placing Greek companies extremely low in the rankings.

According to the latest Eurostat data, while the majority of companies in the EU have implemented cybersecurity measures, disparities among member-states remain significant. Greek companies stand out negatively, being labeled as the weakest of Europe in terms of implementing cybersecurity protections.

Continue reading

Cyberattack at Hellenic Open University (HOU): 813GB of personal data leaked

The Hellenic Open University clarifies that this size represents an extremely small percentage, compared to the total volume of data that they maintain, and emphasizes that the investigation continues.

The HOU in Greece, has provided clarifications regarding the cyberattack it suffered last October, noting that the investigation on this incident is still ongoing. The cyberattack, which took place on October 25th, resulted in the HOU’s electronic systems being put out of operation.

Continue reading

What can cybersecurity learn from true crime?

Even if you’re not a fan of true crime documentaries or podcasts, you’re probably familiar with some of the well-known serial killers from USA in the 1980s. Ted Bundy, Jeffrey Dahmer, and the Golden State Killer to name a few.

Now what does this have to do with cybersecurity and CS-AWARE-NEXT? I promise there is a connection other than justifying my consumption of true crime podcasts during office hours!

Watching true crime documentaries, where the serial killer is caught much too late because they committed their crimes in different states or counties and the police stations didn’t share information across borders. In their defence, at the time, the technology wasn’t developed to do so.

Continue reading