A repository to store all my published work that I have contributed to.
- https://www.validin.com/blog/i_cant_hear_you_unc1069/
- https://blog.nviso.eu/2025/12/16/the-detection-response-chronicles-exploring-telegram-abuse/
- https://blog.nviso.eu/2025/11/13/contagious-interview-actors-now-utilize-json-storage-services-for-malware-delivery/
- https://blog.nviso.eu/2025/10/01/lunar-spider-expands-their-web-via-fakecaptcha/
- https://blog.nviso.eu/2025/08/12/shedding-light-on-poisonseeds-phishing-kit/
- https://medium.com/@s.lontzetidis/lummastealer-campaign-too-much-love-for-software-pirates-66ebe4b2f3a6
- https://www.validin.com/blog/inoculating_contagious_interview_with_validin/
- https://medium.com/@s.lontzetidis/lumma-2024-dominating-the-info-stealer-market-070e7d8fa3d6 & https://www.infostealers.com/article/lumma-2024-dominating-the-info-stealer-market/
- https://medium.com/@s.lontzetidis/greeces-2024-cyber-threat-landscape-trends-and-predictions-4015a1f0fbbc & https://informationsecuritybuzz.com/greeces-2024-cyber-threat-landscape/
- https://www.obrela.com/advisory/pikabot-a-new-emerging-threat/
- https://www.obrela.com/advisory/editbot-a-new-infostealer-on-the-rise/
- https://medium.com/@s.lontzetidis/exploring-pythia-a-generic-query-format-for-discovering-malicious-infrastructure-8956876cc15a
- https://medium.com/@s.lontzetidis/cyber-threat-intelligence-lifecycle-answering-the-cti-analyst-challenge-3ddf7e0be28c
- https://medium.com/@s.lontzetidis/understanding-the-ransomware-ecosystem-1af87b3dc2e5
- https://medium.com/@s.lontzetidis/combining-cybersecurity-frameworks-an-alternative-to-incident-reporting-9d642d9a5456
- https://medium.com/@s.lontzetidis/integrating-tweetfeed-into-misp-using-python-e0a94e01fec2
- https://medium.com/@s.lontzetidis/cyber-threat-intelligence-sharing-making-the-investigation-outcomes-actionable-82ca6e7cb7e3
- https://medium.com/@s.lontzetidis/cyber-threat-intelligence-pivoting-from-a-single-alert-to-multiple-iocs-646662142608
- https://www.first.org/conference/firstcti26/program - FIRST CTI 2026 - Unlocking Insights: The Role of TI in Modern DFIR Operations
- https://2025.bsidesath.gr/ - Security BSides Athens 2025 - Adversary Infrastructure Hunting - A practical case of hunting Lazarus APT
- https://www.obrela.com/advisory/prominent-ransomware-in-2024/
- https://www.obrela.com/whitepaper/threat-intelligence-about-oil-gas-industry/
- https://www.obrela.com/report/digital-universe-report-2023/
- https://www.researchgate.net/publication/362606078_Themis_Computer-Aided_Cybercrime_Case_Classification_using_Cosine_Similarity_and_Ontological_Reasoning
- https://www.researchgate.net/publication/366709594_Fronesis_Digital_Forensics-based_Early_Detection_of_Ongoing_Cyber-Attacks
- https://www.researchgate.net/publication/354397081_Evaluation_and_Enhancement_of_the_Actionability_of_Publicly_Available_Cyber_Threat_Information_in_Digital_Forensics
- https://www.researchgate.net/publication/351984537_Evaluation_and_Classification_of_Cyber_Threat_Intelligence_Sources_Greek