Our increasing dependence connected exertion brings to the forefront new, critical, and — astir importantly — invisible threats.
Hackers with specialized cognition exploit each vulnerability to summation entree to information and infrastructures — with consequences that impact everyone: individuals, organizations, and full nations.
In the caller occurrence of Medousa, an serviceman from the National Intelligence Service (EYP) speaks nether afloat anonymity, revealing however hacker networks operate. He emphasizes that the archetypal enactment of defence begins with each of america and describes cybersecurity arsenic “a changeless chase.”
He identifies three main types of hackers, explaining that the 3rd benignant is the astir unsafe — hackers who stay “invisible wrong systems to execute their goals,” which usually autumn wrong the realm of cyber-espionage.
Michalis Bletsas, Head of the National Cybersecurity Authority, outlines the existent authorities of cybersecurity successful Greece:
“We inactive person a agelong mode to go, portion galore nationalist services stay stuck successful the ‘paper era’,” helium notes.
Panagiotis Pierrros, Cyber Security Consultant and Managing Director of TicTac, highlights the standard of the threat: ransomware attacks hap astir daily, with ransom demands reaching up to 10 cardinal dollars.
Spyros Papageorgiou (retired Navy Captain, erstwhile Director of Cyber Defense astatine the Hellenic National Defense General Staff, and KPMG associate) explains wherefore the internet is present internationally recognized arsenic the 5th domain of warfare — alongside air, land, sea, and abstraction — with peculiar strategical value successful the Eastern Mediterranean.
Katerina Papasminasian (Forensic Psychologist, CyberX.gr) explores the science of hackers and their victims — their motives, vulnerabilities, and the cycles of manipulation that specify their behavior.
Ask maine anything
Explore related questions
EYP serviceman reveals the types of hackers and their targets: “It’s a changeless chase” — Watch occurrence 4 of Medousa
Marinos Aleiferis and Giannis Charamidis effort to decode the satellite of cybersecurity and shed airy connected an invisible beingness done adept interviews and in-depth analysis
October 8, 2025


A grooming craft has crashed successful Tatoi (Upd.)
October 8, 2025

Andros: River overflowed owed to a tempest – The roads were flooded with mud, spot photos
October 8, 2025

Operation Calypso: How the large instrumentality scam was acceptable up – The customs brokers, the middlemen and the missing traders
October 8, 2025

Organ transplants: The email that gives each Greek the accidental to go a hero
October 8, 2025