<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Blog Archives - GCC HELLAS - ICT DISTRIBUTION</title>
	<atom:link href="https://gcc.net.gr/category/blog/feed/" rel="self" type="application/rss+xml" />
	<link>https://gcc.net.gr/category/blog/</link>
	<description></description>
	<lastBuildDate>Thu, 26 Jun 2025 06:35:45 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://gcc.net.gr/wp-content/uploads/2025/04/android-icon-192x192-1-150x150.png</url>
	<title>Blog Archives - GCC HELLAS - ICT DISTRIBUTION</title>
	<link>https://gcc.net.gr/category/blog/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Bringing SWAG to Enterprise Campus Networking</title>
		<link>https://gcc.net.gr/blog/bringing-swag-to-enterprise-campus-networking/</link>
		
		<dc:creator><![CDATA[gcc]]></dc:creator>
		<pubDate>Fri, 06 Jun 2025 07:15:24 +0000</pubDate>
				<category><![CDATA[Backup]]></category>
		<category><![CDATA[Blog]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Arista]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[distributor]]></category>
		<category><![CDATA[GCC Hellas]]></category>
		<guid isPermaLink="false">https://gcc.net.gr/?p=1670</guid>

					<description><![CDATA[<p>As client users, devices, and IoT continue to proliferate, the need for switching management and workload optimization across domains increases. Many sub-optimal and closed approaches have been designed in the past. Arista was founded to build the best software and hardware, equating to the highest performance and density in cloud/data centers, and now evolving to [&#8230;]</p>
<p>The post <a href="https://gcc.net.gr/blog/bringing-swag-to-enterprise-campus-networking/">Bringing SWAG to Enterprise Campus Networking</a> appeared first on <a href="https://gcc.net.gr">GCC HELLAS - ICT DISTRIBUTION</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As client users, devices, and IoT continue to proliferate, the need for switching management and workload optimization across domains increases. Many sub-optimal and closed approaches have been designed in the past. Arista was founded to build the best software and hardware, equating to the highest performance and density in cloud/data centers, and now evolving to campus switches. In 2020, we introduced the smallest footprint of Arista CCS 750 and 720 series switches as a fitting example of the highest density and lowest footprint.</p>
<p>Yet clearly, there are times when these switches need to be managed as one entity for customers to build and operate flexible designs and topology. In the 1990s, this was done with proprietary cabling hardware and closed stackable ring or chain topologies. This is a closed and cumbersome approach as the management scope is restricted to small numbers (less than 10) of switches and relies on proprietary mechanisms.</p>
<p><strong>Bringing SWAG to Switching</strong></p>
<p>Arista customers recognized the limitations of this legacy stacking approach and encouraged us to help them break free from these shackles. So, we are embarking on yet another breakthrough innovation for modern enterprises. The pioneering efforts began in the early 2010s with MLAG, whereby one could aggregate multiple active-active links and enable alternate and redundant paths to switches in the data center.</p>
<p>Building upon that MLAG experience, Arista SWAG™ (Switch Aggregation Group) brings modern stacking to campus switches. Arista SWAG allows a set of switches to be grouped and share a centralized control plane, thus providing the ability to operate the group of switches through a single IP address and a single CLI interface for automation.  SWAG is based on Arista EOS<sup>Ⓡ </sup>and supports multiple topologies, including Arista&#8217;s universal Leaf-Spine design and the more traditional ring or chain. Importantly, it can scale up to 48 campus stacking elements.</p>
<p>Imagine providing all the benefits of legacy stacking without the limitations! Some of these benefits include:</p>
<ul>
<li aria-level="1">Can scale to up to 48 switches in a single group, allowing for increased IP address conservation</li>
<li aria-level="1">Can extend the scope of the cluster beyond just ‘IDF closet’ to a larger domain in the network</li>
<li aria-level="1">Supports the highly resilient and the high capacity Arista validated Leaf-Spine topology in addition to Ring and Chain topologies</li>
<li aria-level="1">Minimal downtime due to key capabilities such as smart software upgrades (SSU) that are inherited since SWAG is built on the same proven EOS software</li>
</ul>
<p>Our customers now have the flexibility to perform network operations on a logical stack of switches in a standards-based, open, modern leaf spine architecture, as shown in the figure below.</p>
<p>Arista&#8217;s SWAG for Modern Campus Stack</p>
<p><img fetchpriority="high" decoding="async" src="https://blogs.arista.com/hs-fs/hubfs/Arista%20(Marketing%20Only)/Images%20(Marketing%20Only)/Blog/Arista-LSS-SWAG-2024-Blog.png?width=940&amp;height=425&amp;name=Arista-LSS-SWAG-2024-Blog.png" sizes="(max-width: 940px) 100vw, 940px" srcset="https://blogs.arista.com/hs-fs/hubfs/Arista%20(Marketing%20Only)/Images%20(Marketing%20Only)/Blog/Arista-LSS-SWAG-2024-Blog.png?width=470&amp;height=213&amp;name=Arista-LSS-SWAG-2024-Blog.png 470w, https://blogs.arista.com/hs-fs/hubfs/Arista%20(Marketing%20Only)/Images%20(Marketing%20Only)/Blog/Arista-LSS-SWAG-2024-Blog.png?width=940&amp;height=425&amp;name=Arista-LSS-SWAG-2024-Blog.png 940w, https://blogs.arista.com/hs-fs/hubfs/Arista%20(Marketing%20Only)/Images%20(Marketing%20Only)/Blog/Arista-LSS-SWAG-2024-Blog.png?width=1410&amp;height=638&amp;name=Arista-LSS-SWAG-2024-Blog.png 1410w, https://blogs.arista.com/hs-fs/hubfs/Arista%20(Marketing%20Only)/Images%20(Marketing%20Only)/Blog/Arista-LSS-SWAG-2024-Blog.png?width=1880&amp;height=850&amp;name=Arista-LSS-SWAG-2024-Blog.png 1880w, https://blogs.arista.com/hs-fs/hubfs/Arista%20(Marketing%20Only)/Images%20(Marketing%20Only)/Blog/Arista-LSS-SWAG-2024-Blog.png?width=2350&amp;height=1063&amp;name=Arista-LSS-SWAG-2024-Blog.png 2350w, https://blogs.arista.com/hs-fs/hubfs/Arista%20(Marketing%20Only)/Images%20(Marketing%20Only)/Blog/Arista-LSS-SWAG-2024-Blog.png?width=2820&amp;height=1275&amp;name=Arista-LSS-SWAG-2024-Blog.png 2820w" alt="Arista-LSS-SWAG-2024-Blog" width="940" height="425" /></p>
<p>The Road Ahead &#8211; Avoid the Stackable Tax</p>
<p>Arista CloudVision LSS™(Leaf Spine Stack) management brings swagger to switches! CV LSS reduces complexity in configuration and maintenance by allowing multiple switches to operate under single-entity management. By linking switches together into a &#8220;virtual stack,&#8221; administrators get the best of both worlds. Customers can logically organize groups of switches based on real-world constructs, such as buildings or floors within CloudVision LSS Management, and then perform network operations such as onboarding, provisioning, monitoring, upgrading, and configuring seamlessly across the entire group. Enterprises also benefit from flexible network designs, whether the grouped switches are in standalone mode, a chassis, MLAG, or SWAG-based stack mode.</p>
<p>Arista’s modern software is inherently designed with key availability and segmentation techniques that separate management and control planes, thus avoiding the pitfalls of proprietary stacking. This simplified stacking approach improves operations, minimizes downtime, and reduces TCO—an advancement that has been a long time coming.</p>
<p>The networking industry has been operating in cumbersome silos and closed proprietary networks for too long. It is the right time to transform into a new, modern operating model. Welcome to the new world of SWAG!</p>
<p>source of information: Arista Networks site &#8211; Blog</p>
<p><span class="meta-author"><a href="https://blogs.arista.com/blog/author/praful-bhaidasna"> Praful Bhaidasna </a>: </span><span class="blog-post__timestamp">Mar 12, 2025 6:00:00 AM </span></p>
<p>The post <a href="https://gcc.net.gr/blog/bringing-swag-to-enterprise-campus-networking/">Bringing SWAG to Enterprise Campus Networking</a> appeared first on <a href="https://gcc.net.gr">GCC HELLAS - ICT DISTRIBUTION</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Faster, Smarter, Cheaper: The Networking Revolution Powering Generative AI</title>
		<link>https://gcc.net.gr/blog/faster-smarter-cheaper-the-networking-revolution-powering-generative-ai/</link>
		
		<dc:creator><![CDATA[gcc]]></dc:creator>
		<pubDate>Fri, 06 Jun 2025 07:01:27 +0000</pubDate>
				<category><![CDATA[Backup]]></category>
		<category><![CDATA[Blog]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Arista]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[distributor]]></category>
		<category><![CDATA[GCC Hellas]]></category>
		<guid isPermaLink="false">https://gcc.net.gr/?p=1415</guid>

					<description><![CDATA[<p>AI models have rapidly evolved from GPT-2 (1.5B parameters) in 2019 to models like GPT-4 (1+ trillion parameters) and DeepSeek-V3 (671B parameters, using Mixture-of-Experts). More parameters enhance context understanding and text/image generation but increase computational demands. Modern AI is now multimodal, handling text, images, audio, and video (e.g., GPT-4V, Gemini), and task-specific, fine-tuned for applications [&#8230;]</p>
<p>The post <a href="https://gcc.net.gr/blog/faster-smarter-cheaper-the-networking-revolution-powering-generative-ai/">Faster, Smarter, Cheaper: The Networking Revolution Powering Generative AI</a> appeared first on <a href="https://gcc.net.gr">GCC HELLAS - ICT DISTRIBUTION</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>AI models have rapidly evolved from GPT-2 (1.5B parameters) in 2019 to models like GPT-4 (1+ trillion parameters) and DeepSeek-V3 (671B parameters, using Mixture-of-Experts). More parameters enhance context understanding and text/image generation but increase computational demands. Modern AI is now multimodal, handling text, images, audio, and video (e.g., GPT-4V, Gemini), and task-specific, fine-tuned for applications like drug discovery, financial modeling or coding. As AI models continue to scale and evolve, they require massive parallel computing, specialized hardware (GPUs, TPUs), and crucially, optimized networking to ensure efficient training and inference.</p>
<p>While computational power is an essential factor in AI development, optimized networking has emerged as a key enabler for maximizing AI efficiency and economic feasibility of large-scale AI initiatives.</p>
<p><strong>The Hidden Costs of Suboptimal Networking</strong></p>
<p>Many organizations diving into generative AI deployments focus primarily on computational power, often overlooking the crucial role of networking. This oversight can lead to:</p>
<ul>
<li><strong>Extended Training Times:</strong> Network bottlenecks can significantly prolong model training, delaying project timelines and increasing resource allocation.</li>
<li><strong>Increased Energy Consumption:</strong> Inefficient data movement causes hardware to remain active longer, resulting in higher power usage and electricity costs.</li>
<li><strong>Underutilized Hardware:</strong> When network capacity can&#8217;t keep pace with computational power, expensive GPUs and TPUs sit idle, wasting investment.</li>
</ul>
<p><strong>Optimized Networking is Transforming AI Economics</strong></p>
<p>Enterprises deploying AI are recognizing that networking is as critical as computational power. Investing in AI-optimized networking solutions offers substantial economic advantages:</p>
<ul>
<li><strong>Reduced Time-to-Market:</strong> Faster data transfer and low latency reduce model training and inference times, allowing companies to capitalize on AI innovations more quickly.</li>
<li><strong>Lower Operational Costs:</strong> Optimized networking reduces energy consumption and cooling requirements, leading to significant savings in data center operations.</li>
<li><strong>Improved Resource Utilization:</strong> Load-balancing and congestion avoidance ensure that computational resources are used efficiently, maximizing return on hardware investments.</li>
<li><strong>Enhanced Scalability:</strong> As AI models grow, networking solutions that can scale seamlessly prevent the need for costly overhauls and minimize downtime.</li>
</ul>
<p>By prioritizing networking optimization, businesses can shift from bottlenecks to breakthroughs, accelerating AI deployment while enhancing efficiency and reducing costs.</p>
<p>Is it really possible to optimally connect thousands, or even hundreds of thousands, of XPUs without adding unnecessary complexity, cost, or latency?</p>
<p><img decoding="async" src="https://blogs.arista.com/hs-fs/hubfs/Arista%20(Marketing%20Only)/Images%20(Marketing%20Only)/Blog/AI-Suite-Blog-Graphic.png?width=940&amp;height=491&amp;name=AI-Suite-Blog-Graphic.png" sizes="(max-width: 940px) 100vw, 940px" srcset="https://blogs.arista.com/hs-fs/hubfs/Arista%20(Marketing%20Only)/Images%20(Marketing%20Only)/Blog/AI-Suite-Blog-Graphic.png?width=470&amp;height=246&amp;name=AI-Suite-Blog-Graphic.png 470w, https://blogs.arista.com/hs-fs/hubfs/Arista%20(Marketing%20Only)/Images%20(Marketing%20Only)/Blog/AI-Suite-Blog-Graphic.png?width=940&amp;height=491&amp;name=AI-Suite-Blog-Graphic.png 940w, https://blogs.arista.com/hs-fs/hubfs/Arista%20(Marketing%20Only)/Images%20(Marketing%20Only)/Blog/AI-Suite-Blog-Graphic.png?width=1410&amp;height=737&amp;name=AI-Suite-Blog-Graphic.png 1410w, https://blogs.arista.com/hs-fs/hubfs/Arista%20(Marketing%20Only)/Images%20(Marketing%20Only)/Blog/AI-Suite-Blog-Graphic.png?width=1880&amp;height=982&amp;name=AI-Suite-Blog-Graphic.png 1880w, https://blogs.arista.com/hs-fs/hubfs/Arista%20(Marketing%20Only)/Images%20(Marketing%20Only)/Blog/AI-Suite-Blog-Graphic.png?width=2350&amp;height=1228&amp;name=AI-Suite-Blog-Graphic.png 2350w, https://blogs.arista.com/hs-fs/hubfs/Arista%20(Marketing%20Only)/Images%20(Marketing%20Only)/Blog/AI-Suite-Blog-Graphic.png?width=2820&amp;height=1473&amp;name=AI-Suite-Blog-Graphic.png 2820w" alt="AI-Suite-Blog-Graphic" width="940" height="491" /></p>
<p>The UEC-ready, Arista Etherlink<sup>TM</sup> AI platforms, revolutionize AI networking with a single-tier topology for over 10,000 XPUs and a two-tier architecture scaling beyond 100,000 XPUs. These platforms dramatically optimize performance, reduce costs, and improve reliability. Unlike traditional networking and conventional load balancing technologies that fail with AI workloads, Arista’s AI-based Cluster Load Balancing (CLB) maximizes bandwidth, eliminates bottlenecks, and minimizes tail latency, ensuring smooth, congestion-free AI job execution. And finally, CV UNO™—an AI-driven, 360° network observability feature set within CloudVision<sup>Ⓡ</sup>—integrates AI job visibility with network and system data, providing real-time insights to optimize AI job performance, pinpoint bottlenecks and hardware issues with unmatched precision for rapid resolution.</p>
<p><strong>The Future AI Economic Landscape</strong></p>
<p>As generative AI evolves, the economic importance of optimized networking—an essential driver of AI innovation—will become increasingly significant. Organizations that invest in advanced networking solutions today position themselves for a competitive advantage by accelerating the deployment of AI innovations, which can secure market leadership and unlock new revenue streams. Additionally, as AI models expand, robust networking infrastructure will be crucial for cost-effective scaling, enabling companies to manage costs while growing their capabilities. Efficient networking for AI supports sustainability goals by reducing carbon footprints, aligning with corporate sustainability initiatives, and potentially helping businesses avoid future carbon taxes.</p>
<p>source of information: Arista Networks site &#8211; Blog</p>
<p><span class="meta-author"><a href="https://blogs.arista.com/blog/author/praful-bhaidasna"> Praful Bhaidasna </a>: </span><span class="blog-post__timestamp">Mar 12, 2025 6:00:00 AM </span></p>
<p>The post <a href="https://gcc.net.gr/blog/faster-smarter-cheaper-the-networking-revolution-powering-generative-ai/">Faster, Smarter, Cheaper: The Networking Revolution Powering Generative AI</a> appeared first on <a href="https://gcc.net.gr">GCC HELLAS - ICT DISTRIBUTION</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>AI  and Machine Learning in the Cybersecurity Battle</title>
		<link>https://gcc.net.gr/blog/ai-artificial-intelligence-and-machine-learning-in-the-cybersecurity-battle/</link>
		
		<dc:creator><![CDATA[gcc]]></dc:creator>
		<pubDate>Thu, 05 Jun 2025 07:03:06 +0000</pubDate>
				<category><![CDATA[Backup]]></category>
		<category><![CDATA[Blog]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[distributor]]></category>
		<category><![CDATA[Fortinet]]></category>
		<category><![CDATA[GCC Hellas]]></category>
		<guid isPermaLink="false">https://gcc.net.gr/?p=1412</guid>

					<description><![CDATA[<p>The Role of Artificial Intelligence and Machine Learning Whether we realize it or not, artificial intelligence (AI) and machine learning (ML) play a part in every second of our lives. From the moment we wake, smart devices decide what time to turn on our heaters and our lights, social media uses complex algorithms to select what news [&#8230;]</p>
<p>The post <a href="https://gcc.net.gr/blog/ai-artificial-intelligence-and-machine-learning-in-the-cybersecurity-battle/">AI  and Machine Learning in the Cybersecurity Battle</a> appeared first on <a href="https://gcc.net.gr">GCC HELLAS - ICT DISTRIBUTION</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="cmp cmp-text aem-GridColumn aem-GridColumn--default--12">
<h2>The Role of Artificial Intelligence and Machine Learning</h2>
<p>Whether we realize it or not, artificial intelligence (AI) and machine learning (ML) play a part in every second of our lives. From the moment we wake, smart devices decide what time to turn on our heaters and our lights, social media uses complex algorithms to select what news to promote to us, and Google Maps navigates us through our day. Even while we sleep, AI monitors our sleeping patterns—with the proliferation of smart devices like Google Home and Apple Watches—identifying when we have had a good night’s sleep and even monitoring our health.</p>
<p>ML and AI in our daily lives have slowly changed how we interact with technology. We use this technology for good by helping the elderly with virtual chatbots, preventing poaching, and providing real-time translation for migrants.</p>
<p>The cybersecurity world has been at the forefront of this technology in the last decade, using artificial intelligence and machine learning in various applications such as tackling huge volumes of malware, detecting spam and business email compromises, analyzing network traffic, using facial recognition, and more. It’s hard to get away from a vendor’s presentation without hearing about their ML and AI nowadays. This blog will demystify and hopefully bring some new angles to our readers in the decision-making around &#8220;ML-enabled&#8221; security solutions.</p>
<h2>What Are Machine Learning and Artificial Intelligence?</h2>
<p>Let’s start with simple definitions of machine learning and artificial intelligence. Machine learning involves enabling computers to learn how to do something. This requires input such as <a>training data and knowledge</a>, while AI is the goal of applying the knowledge learned. AI attempts to solve data-based business or technical problems, assisting users in the decision-making process or making judgment itself (if we programmed it in such a way). When it needs to, it can be used to rapidly analyze large sets of data that no human brain could possibly process and can come up with AI-assisted decisions and conclusions on an issue.</p>
<p>Is artificial intelligence perfect? Not always. Any computer program is only as good as its writer, and any ML or AI is only as good as the information it has been fed. There are well-known examples of programmatic biases in some AI algorithms and examples where chatbots have gone rogue after being trained with the wrong data. So, while there is still work to be done, these algorithms can deliver significant benefits over even more fallible humans.</p>
<h2>AI-Driven Malware – Myth or Reality?</h2>
<p>Despite a large amount of hype and clickbait, there is little evidence to support the belief that criminal cyber gangs are already using AI to help generate new strains of malware, however there is evidence that artificial intelligence and machine learning are being used in other areas to circumvent protective security measures:</p>
<ul>
<li>Generating <a href="https://www.fortinet.com/resources/cyberglossary/deepfake?utm_source=blog&amp;utm_campaign=deepfake">deep fake videos</a> and images to <a href="https://www.fortinet.com/resources/cyberglossary/phishing?utm_source=blog&amp;utm_campaign=phishing">phish users</a> and bypass security measures. This is particularly prevalent on social media sites to create fake identities.</li>
<li>Solving <a href="https://www.fortinet.com/resources/cyberglossary/captcha?utm_source=blog&amp;utm_campaign=captcha">CAPTCHAs</a> to bypass authentication protections.</li>
<li>To gather open source intelligence on organizations in order to target attackers.</li>
</ul>
<h2>AI and ML for Cybersecurity: Always Consider Your Use Case</h2>
<p>When considering investment priorities among security solutions, evaluate the use cases you’re trying to achieve. Understand how threats are evolving and what tactics and techniques black-hats use. Then ask why you couldn’t stop these attacks with the investment you have so far. It’s pretty easy to get caught up with the AI/ML hype. But customers are starting to move cleverly to consider practical use cases, whether this is detection, forensics, hunting, or mitigation.</p>
<h2>How Does Fortinet Use AI and ML-Driven Cybersecurity?</h2>
<p>The big change in the malware industry that triggered the need for AI was heuristics and adaptive malware. We went almost overnight from a volume of malware that could be handled manually to a situation with exponential growth in the number of samples. We had to adapt and take advantage of artificial intelligence and machine learning to support our malware analysts.</p>
<p>Fortinet has been in the AI business for more than a decade. At a high level, Fortinet uses artificial intelligence and machine learning in multiple areas:</p>
<h3>Scale</h3>
<p>One of the first use cases 10 years ago was the advent of the virtual FortiGuard threat analyst. The huge growth in samples meant that analysts could no longer handle the volumes of samples they were receiving, so we created an artificial neural network (ANN) for sub-second sample classification. Over six generations of this solution, this grew into FortiAI, which analyzes millions of samples per day with near-perfect accuracy—a task that would normally require thousands of human analysts.</p>
<h3>Enhance</h3>
<p>An ML use case is a great way to enhance traditional security solutions. Some examples are:</p>
<ul>
<li>Adding ML analysis of malicious vectors in FortiSandbox</li>
<li>ML-enabled AV engine in FortiOS</li>
<li>Widely adopt ML in other solutions such as FortiWeb, FortiGuard Security Services, and many more. This enables better and more accurate detections of malicious activities or anomalies for our customers. In this area, innovation is key.</li>
</ul>
<h3>Predict</h3>
<p>ML/AI is particularly good at drawing relationships and making predictions. An example is comparing two infections’ “DNA” and tracing the source of a problem. This is a more advanced application of AI, as prediction has a time element—meaning you can tell ahead of time what will happen. Based on the historical data points, trending, etc., it is possible to predict what might happen to your network.</p>
<h3>Reduce time to detect</h3>
<p>Fortinet pushes the physical limit to “sub-second” detection of malicious code, enabling SecOps solutions to integrate with our flagship <a href="https://www.fortinet.com/products/next-generation-firewall?utm_source=blog&amp;utm_medium=blog&amp;utm_campaign=NGFW">FortiGate NGFW</a> for <i><a href="https://www.fortinet.com/products/fortigate/fortios?utm_source=blog&amp;utm_medium=blog&amp;utm_campaign=FortiOSpage">inline blocking</a>, </i>stopping patient zero. While reducing the time to detect from minutes to sub-second might not sound significant, it’s crucial when a major, widespread outbreak occurs. Customers should have the ability to react quickly to threat actors.</p>
<div></div>
</div>
<section class="text-image aem-GridColumn aem-GridColumn--default--12">
<div class="text-image__container text-image__align-default">
<div class="text-image__image cmp-image"><img decoding="async" class="aligncenter" src="https://marvel-b1-cdn.bc0a.com/f00000000310757/www.fortinet.com/blog/business-and-technology/battle-ai-ml-cybersecurity-world/_jcr_content/root/responsivegrid/text_image_1040446582.img.jpeg/1650064813490/ftnt-fabric-diagram.jpeg" alt="diagram showing how ai and ml impacts cybersecurity" width="553" height="566" /></div>
<div class="text-image__image cmp-image" style="text-align: center;"><span class="cmp-image--title">Diagram: Fortinet Security Fabric &#8211; AI and ML</span></div>
<div class="text-image__text">
<div class="cmp cmp-text">
<h2>What Makes One ML-Driven Cybersecurity Solution Better Than the Others?</h2>
<p>Fortinet embarked on the artificial intelligence and machine learning journey over a decade ago. The Fortinet Security Fabric includes ML and AI applied to the areas that will benefit users the most—whether this is on-premises investigating web traffic, gathering useful NOC data, using face recognition to detect malicious objects, or in the cloud (FortiGuard) for tracking malicious web campaigns, zero-day detection with inference training, and more. Not only are our NGFWs ML-enabled, but we provide a complete <i>ML-enabled Security Fabric</i>. Customers can rely on Fortinet for our experience, innovation, and competitive edge, delivered in our broad, integrated, and automated Security Fabric. In the next decade, watch our space! Fortinet will continue to bring more innovative ML-enabled solutions to our valued customers.</p>
<p>source of information Fortinet&#8217;s website (Blog)</p>
<p><a href="https://www.youtube.com/watch?v=ygh5rc4nYpM&amp;t=11s">Machine Learning Across the Digital Attack Surface</a></p>
</div>
</div>
</div>
</section>
<p>The post <a href="https://gcc.net.gr/blog/ai-artificial-intelligence-and-machine-learning-in-the-cybersecurity-battle/">AI  and Machine Learning in the Cybersecurity Battle</a> appeared first on <a href="https://gcc.net.gr">GCC HELLAS - ICT DISTRIBUTION</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Data Breach 2025: Meta, Coinbase, AT&#038;T, Google, Apple, M&#038;S, and More</title>
		<link>https://gcc.net.gr/blog/data-breach-2025-meta-coinbase-att-google-apple-ms-and-more/</link>
		
		<dc:creator><![CDATA[gcc]]></dc:creator>
		<pubDate>Wed, 04 Jun 2025 07:00:00 +0000</pubDate>
				<category><![CDATA[Backup]]></category>
		<category><![CDATA[Blog]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[distributor]]></category>
		<category><![CDATA[Fortinet]]></category>
		<category><![CDATA[GCC Hellas]]></category>
		<guid isPermaLink="false">https://gcc.net.gr/?p=1402</guid>

					<description><![CDATA[<p>By Carl Windsor &#124; February 23, 2022 With escalating tensions in Ukraine and threats of nation-state attacks, it is worth noting that modern warfare is no longer only based on traditional ground, air, or sea assaults, but it has progressed to the point where cyber attacks are a common part of the offensive arsenal.  They are commonly made [&#8230;]</p>
<p>The post <a href="https://gcc.net.gr/blog/data-breach-2025-meta-coinbase-att-google-apple-ms-and-more/">Data Breach 2025: Meta, Coinbase, AT&#038;T, Google, Apple, M&#038;S, and More</a> appeared first on <a href="https://gcc.net.gr">GCC HELLAS - ICT DISTRIBUTION</a>.</p>
]]></description>
										<content:encoded><![CDATA[<section class="b15-blog-meta aem-GridColumn aem-GridColumn--default--12">
<h2 class="b15-blog-meta__container text-container">By <span class="b15-blog-meta__author">Carl Windsor </span><span class="b15-blog-meta__date">| February 23, 2022</span></h2>
</section>
<div class="responsivegrid aem-GridColumn aem-GridColumn--default--12">
<div class="aem-Grid aem-Grid--12 aem-Grid--default--12 ">
<div class="raw-import aem-GridColumn aem-GridColumn--default--12">
<div class="text-container">With escalating tensions in Ukraine and threats of nation-state attacks, it is worth noting that modern warfare is no longer only based on traditional ground, air, or sea assaults, but it has progressed to the point where cyber attacks are a common part of the offensive arsenal.  They are commonly made on the financial, government, and communications of target countries in order to destabilize the country’s critical infrastructure and delay any required response to an attack.</div>
</div>
<div class="cmp cmp-text aem-GridColumn aem-GridColumn--default--12">
<p>Even if you are not directly in the line of fire, it is a timely reminder during these concerning times that we all need to be taking our cybersecurity more seriously. This is a sentiment echoed by Department of Justice (DoJ) official Deputy Attorney General Lisa Monaco in remarks at the Munich Cybersecurity Conference.</p>
<p><i>&#8220;Given the very high tensions that we are experiencing, companies of any size and of all sizes would be foolish not to be preparing right now as we speak &#8212; to increase their defenses, to do things like patching, to heighten their alert systems, to be monitoring in real-time their cybersecurity. They need to be as we say, &#8216;shields up&#8217; and to be really on the most heightened level of alert that they can be and taking all necessary precautions.&#8221;</i></p>
<h2>Why do we even need to say this?</h2>
<p>Anyone who has been keeping up with Fortinet blogs is aware that we have been saying this for some time, Prioritizing Patching is Essential for Network Integrity.  We are dealing from the fallout of some customers not patching. It has caused an ongoing news cycle related to an SSL-VPN issue resolved back in 2019, which remains unpatched for some customers. <i><b>If you take nothing else away from this blog, check that you have taken action to </b><b>remediate this issue</b><b>.</b></i></p>
<p>Given that some organizations are not always taking action to patch, how can we better understand the reasons why, so that we can help to change this behavior? Human psychology gives us some useful clues as to why this is the case.</p>
<p>Hyperbolic discounting is a cognitive bias that refers to the inclination to choose immediate rewards over rewards that come later in the future, even when these immediate rewards are smaller. This is most clearly demonstrated by the phrase: “A bird in the hand is worth two in the bush.”<i><b></b></i></p>
<p>In cybersecurity terms: I will continue working on a time-sensitive project that my boss is chasing rather than patching systems against a cybersecurity issue that might never happen, thinking “maybe we’ll get lucky and nobody will attack us.”</p>
<p>The situation in Ukraine and the warning from DoJ Official Lisa Monaco demonstrates we should not be taking this lightly but we need to change human nature if we want to succeed in prioritizing patch management. To do this, we need to give people an instant payback.</p>
<h2>Removing Cognitive Bias</h2>
<p>This is where the <a href="https://www.fortinet.com/support/support-services/fortiguard-security-subscriptions/security-rating">Security Rating Service</a> comes into play helping to remove this cognitive bias. It gives customers immediate feedback that the actions they are taking have an impact on the security of their systems. While this has been available for some time, in the coming months we will push this to the next level and will include patching (or lack of) into the rating. We will also provide a roll-up report in FortiCare to help encourage this process even further.</p>
</div>
</div>
</div>
<p><img decoding="async" src="https://marvel-b1-cdn.bc0a.com/f00000000310757/www.fortinet.com/blog/business-and-technology/the-art-of-war-and-patch-management/_jcr_content/root/responsivegrid/image.img.png/1645650199602/fig1.png" /></p>
<p>The post <a href="https://gcc.net.gr/blog/data-breach-2025-meta-coinbase-att-google-apple-ms-and-more/">Data Breach 2025: Meta, Coinbase, AT&#038;T, Google, Apple, M&#038;S, and More</a> appeared first on <a href="https://gcc.net.gr">GCC HELLAS - ICT DISTRIBUTION</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Art of War (and Patch Management)</title>
		<link>https://gcc.net.gr/blog/the-art-of-war-and-patch-management/</link>
		
		<dc:creator><![CDATA[gcc]]></dc:creator>
		<pubDate>Wed, 04 Jun 2025 06:47:29 +0000</pubDate>
				<category><![CDATA[Backup]]></category>
		<category><![CDATA[Blog]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[distributor]]></category>
		<category><![CDATA[Fortinet]]></category>
		<category><![CDATA[GCC Hellas]]></category>
		<guid isPermaLink="false">https://gcc.net.gr/?p=1400</guid>

					<description><![CDATA[<p>By Carl Windsor &#124; February 23, 2022 With escalating tensions in Ukraine and threats of nation-state attacks, it is worth noting that modern warfare is no longer only based on traditional ground, air, or sea assaults, but it has progressed to the point where cyber attacks are a common part of the offensive arsenal.  They are commonly made [&#8230;]</p>
<p>The post <a href="https://gcc.net.gr/blog/the-art-of-war-and-patch-management/">The Art of War (and Patch Management)</a> appeared first on <a href="https://gcc.net.gr">GCC HELLAS - ICT DISTRIBUTION</a>.</p>
]]></description>
										<content:encoded><![CDATA[<section class="b15-blog-meta aem-GridColumn aem-GridColumn--default--12">
<h2 class="b15-blog-meta__container text-container">By <span class="b15-blog-meta__author">Carl Windsor </span><span class="b15-blog-meta__date">| February 23, 2022</span></h2>
</section>
<div class="responsivegrid aem-GridColumn aem-GridColumn--default--12">
<div class="aem-Grid aem-Grid--12 aem-Grid--default--12 ">
<div class="raw-import aem-GridColumn aem-GridColumn--default--12">
<div class="text-container">With escalating tensions in Ukraine and threats of nation-state attacks, it is worth noting that modern warfare is no longer only based on traditional ground, air, or sea assaults, but it has progressed to the point where cyber attacks are a common part of the offensive arsenal.  They are commonly made on the financial, government, and communications of target countries in order to destabilize the country’s critical infrastructure and delay any required response to an attack.</div>
</div>
<div class="cmp cmp-text aem-GridColumn aem-GridColumn--default--12">
<p>Even if you are not directly in the line of fire, it is a timely reminder during these concerning times that we all need to be taking our cybersecurity more seriously. This is a sentiment echoed by Department of Justice (DoJ) official Deputy Attorney General Lisa Monaco in remarks at the Munich Cybersecurity Conference.</p>
<p><i>&#8220;Given the very high tensions that we are experiencing, companies of any size and of all sizes would be foolish not to be preparing right now as we speak &#8212; to increase their defenses, to do things like patching, to heighten their alert systems, to be monitoring in real-time their cybersecurity. They need to be as we say, &#8216;shields up&#8217; and to be really on the most heightened level of alert that they can be and taking all necessary precautions.&#8221;</i></p>
<h2>Why do we even need to say this?</h2>
<p>Anyone who has been keeping up with Fortinet blogs is aware that we have been saying this for some time, Prioritizing Patching is Essential for Network Integrity.  We are dealing from the fallout of some customers not patching. It has caused an ongoing news cycle related to an SSL-VPN issue resolved back in 2019, which remains unpatched for some customers. <i><b>If you take nothing else away from this blog, check that you have taken action to </b><b>remediate this issue</b><b>.</b></i></p>
<p>Given that some organizations are not always taking action to patch, how can we better understand the reasons why, so that we can help to change this behavior? Human psychology gives us some useful clues as to why this is the case.</p>
<p>Hyperbolic discounting is a cognitive bias that refers to the inclination to choose immediate rewards over rewards that come later in the future, even when these immediate rewards are smaller. This is most clearly demonstrated by the phrase: “A bird in the hand is worth two in the bush.”<i><b></b></i></p>
<p>In cybersecurity terms: I will continue working on a time-sensitive project that my boss is chasing rather than patching systems against a cybersecurity issue that might never happen, thinking “maybe we’ll get lucky and nobody will attack us.”</p>
<p>The situation in Ukraine and the warning from DoJ Official Lisa Monaco demonstrates we should not be taking this lightly but we need to change human nature if we want to succeed in prioritizing patch management. To do this, we need to give people an instant payback.</p>
<h2>Removing Cognitive Bias</h2>
<p>This is where the <a href="https://www.fortinet.com/support/support-services/fortiguard-security-subscriptions/security-rating">Security Rating Service</a> comes into play helping to remove this cognitive bias. It gives customers immediate feedback that the actions they are taking have an impact on the security of their systems. While this has been available for some time, in the coming months we will push this to the next level and will include patching (or lack of) into the rating. We will also provide a roll-up report in FortiCare to help encourage this process even further.</p>
</div>
</div>
</div>
<p><img decoding="async" src="https://marvel-b1-cdn.bc0a.com/f00000000310757/www.fortinet.com/blog/business-and-technology/the-art-of-war-and-patch-management/_jcr_content/root/responsivegrid/image.img.png/1645650199602/fig1.png" /></p>
<p>The post <a href="https://gcc.net.gr/blog/the-art-of-war-and-patch-management/">The Art of War (and Patch Management)</a> appeared first on <a href="https://gcc.net.gr">GCC HELLAS - ICT DISTRIBUTION</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Analysis of Threat Actor Activity</title>
		<link>https://gcc.net.gr/blog/analysis-of-threat-actor-activity/</link>
		
		<dc:creator><![CDATA[gcc]]></dc:creator>
		<pubDate>Mon, 02 Jun 2025 10:54:00 +0000</pubDate>
				<category><![CDATA[Backup]]></category>
		<category><![CDATA[Blog]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[distributor]]></category>
		<category><![CDATA[Fortinet]]></category>
		<category><![CDATA[GCC Hellas]]></category>
		<guid isPermaLink="false">https://gcc.net.gr/?p=1388</guid>

					<description><![CDATA[<p>By Carl Windsor &#124; April 10, 2025 As a driving force in the evolution of cybersecurity, Fortinet has long been at the forefront of the industry in embracing and advocating for cybersecurity best practices. We are committed to being a role model for ethical product development and vulnerability disclosure, which includes embracing responsible transparency, holding ourselves to robust disclosure practices, and adhering [&#8230;]</p>
<p>The post <a href="https://gcc.net.gr/blog/analysis-of-threat-actor-activity/">Analysis of Threat Actor Activity</a> appeared first on <a href="https://gcc.net.gr">GCC HELLAS - ICT DISTRIBUTION</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>By <span class="b15-blog-meta__author"><a href="https://www.fortinet.com/blog/search?author=Carl+Windsor">Carl Windsor</a> </span><span class="b15-blog-meta__date">| April 10, 2025</span></h2>
<p>As a driving force in the evolution of cybersecurity, Fortinet has long been at the forefront of the industry in embracing and advocating for cybersecurity best practices. We are <a href="https://www.fortinet.com/trust?tab=trusted%20products">committed</a> to being a role model for ethical <a href="https://www.fortinet.com/content/dam/fortinet/assets/flyer/flyer-fortinet-commitment-to-product-security-and-integrity.pdf" target="_blank" rel="noopener">product development and vulnerability disclosure</a>, which includes <a href="https://www.fortinet.com/blog/psirt-blogs/proactive-responsible-disclosure-is-one-cucial-way-fortinet-strengthens-customer-security">embracing responsible transparency, holding ourselves to robust disclosure practices, and adhering to international and industry-recognized standards.</a> Fortinet continues to collaborate with the industry to develop and implement stronger practices and standards for the benefit of all our customers, including through ongoing threat research, delivering <a href="https://www.fortinet.com/blog/industry-trends/fortinet-secure-by-design-commitments-making-measureable-progress-in-cybersecurity">automatic upgrade features</a>, cybersecurity training and education, and responsible and proactive communications about best practices and cyber hygiene.</p>
<p>Recent incidents continue to bring this into focus with active exploitations of known vulnerabilities as investigations by Fortinet have discovered a post exploitation technique used by a threat actor.</p>
<p>During this investigation, a threat actor was observed using known vulnerabilities (e.g. <a href="https://www.fortiguard.com/psirt/FG-IR-22-398" target="_blank" rel="noopener">FG-IR-22-398</a>, <a href="https://www.fortiguard.com/psirt/FG-IR-23-097" target="_blank" rel="noopener">FG-IR-23-097</a>, <a href="https://fortiguard.fortinet.com/psirt/FG-IR-24-015" target="_blank" rel="noopener">FG-IR-24-015</a>) to gain access to Fortinet devices. The targeting of known, unpatched vulnerabilities by a threat actor is not new and has been previously <a href="https://www.fortinet.com/blog/psirt-blogs/importance-of-patching-an-analysis-of-the-exploitation-of-n-day-vulnerabilities">examined</a>; this specific finding is the result of a threat actor taking advantage of a known vulnerability with a new technique to maintain read-only access to vulnerable FortiGate devices after the original access vector was locked down. Immediately upon discovery, we activated our PSIRT response efforts, developed necessary mitigations and have communicated with affected customers. We continue to work directly with those customers to ensure they have taken steps to remediate the issue.</p>
<p>Fortinet diligently balances our commitment to the security of our customers and our culture of responsible transparency and commits to sharing information with that goal in mind. The following describes the situation.</p>
<h2>Description</h2>
<p>A threat actor used a known vulnerability to implement read-only access to vulnerable FortiGate devices. This was achieved via creating a symbolic link connecting the user filesystem and the root filesystem in a folder used to serve language files for the SSL-VPN. This modification took place in the user filesystem and avoided detection. Therefore, even if the customer device was updated with FortiOS versions that addressed the original vulnerabilities, this symbolic link may have been left behind, allowing the threat actor to maintain read-only access to files on the device’s file system, which may include configurations.</p>
<p>Notably, if the customer has never had SSL-VPN enabled, then the customer is not impacted by this issue.</p>
<p>As part of our investigation, Fortinet performed scans to identify impacted devices using internal telemetry and in collaboration with third party organizations. The data indicates that this threat actor activity was not targeted to a specific region or industry.</p>
<h2>Mitigation</h2>
<p>Upon discovering the new technique used by the threat actor described above, Fortinet took steps to mitigate this issue and balance varying levels of cyber hygiene and challenges that the customer may face. Fortinet mitigation efforts included:</p>
<ul>
<li>An AV/IPS signature was created to detect and clean this symbolic link from impacted devices.</li>
<li>Changes were made to the latest releases to detect and remove the symbolic link and ensure the SSL-VPN only serves the expected files.</li>
<li>Proactive communications urging customers to update their devices, carefully balancing our communications to protect against further inadvertent compromise while delivering on our commitment to responsible transparency.</li>
</ul>
<p>Specific to the findings detailed in this blog, we have released multiple FortiOS mitigations, including:</p>
<ul>
<li><b>FortiOS 7.4, 7.2, 7.0, 6.4:</b> The symbolic link was flagged as malicious by the AV/IPS engine so that it would be automatically removed if the engine was licensed and enabled.</li>
<li><b>FortiOS 7.6.2, 7.4.7, 7.2.11 &amp; 7.0.17, 6.4.16: </b>Upgrading to this release will remove the malicious symbolic link.</li>
<li><b>FortiOS 7.6.2, 7.4.7, 7.2.11 &amp; 7.0.17, 6.4.16:</b> The SSL-VPN UI has been modified to prevent the serving of such malicious symbolic links.</li>
</ul>
<p>We have communicated directly with customers identified as impacted by this issue based on the available telemetry and are recommending that they take the following steps:</p>
<ul>
<li>Upgrade all devices to 7.6.2, 7.4.7, 7.2.11 &amp; 7.0.17 or 6.4.16.</li>
<li>Review the configuration of all devices.</li>
<li>Treat all configuration as potentially compromised and follow the recommended steps below to recover:
<ul>
<li><a href="https://community.fortinet.com/t5/FortiGate/Technical-Tip-Recommended-steps-to-execute-in-case-of-a/ta-p/230694" target="_blank" rel="noopener">https://community.fortinet.com/t5/FortiGate/Technical-Tip-Recommended-steps-to-execute-in-case-of-a/ta-p/230694</a></li>
</ul>
</li>
</ul>
<h2>Do I need to upgrade?</h2>
<p>It is critically important for all organizations to keep their devices up to date. A variety of government organizations have reported state sponsored threat actors are targeting all vendors, including known but unpatched vulnerabilities. In general, the best defense against any known vulnerability is following good cyber hygiene practices, including upgrading.</p>
<p>The 2H 2023 Global Threat Landscape <a href="https://www.fortinet.com/corporate/about-us/newsroom/press-releases/2024/fortinet-threat-research-finds-cybercriminals-are-exploiting-new-industry-vulnerabilities-faster">Report</a> from FortiGuard Labs research found that threat actors are taking advantage of a known vulnerability on average 4.76 days after a new vulnerability was publicly disclosed. In this climate, both vendors and customers have a role to play. Vendors must introduce robust security scrutiny at all stages of the product development life cycle and dedicate themselves to responsible transparency in their vulnerability disclosures. With more than 40,000 vulnerabilities recorded in 2024 based on data provided by NIST, it is also critical that customers maintain a strict patching regimen to reduce the risk of exploitation.</p>
<p>With regard to this incident, we have communicated directly with identified impacted customers who need to take action based on available telemetry. However, we recommend all customers to upgrade to one of these recommended versions regardless.</p>
<p>Fortinet has also incorporated many changes to further enhance security features that address key customer challenges and are available for customers to take advantage of once upgraded to the latest release, including but not limited to:</p>
<ul>
<li>Additional compile-time hardening to raise the barrier for attack on products.</li>
<li><a href="https://docs.fortinet.com/document/fortigate/7.6.1/administration-guide/393161/virtual-patching-on-the-local-in-management-interface" target="_blank" rel="noopener">Virtual patching</a> to allow mitigation of issues prior to patching.</li>
<li>Implementation of <a href="https://docs.fortinet.com/document/fortigate/7.4.4/administration-guide/249947/bios-level-signature-and-file-integrity-checking" target="_blank" rel="noopener">firmware integrity validation in hardware (BIOS).</a></li>
<li>Introduction of Integrity Measurement Architecture (IMA)  / <a href="https://docs.fortinet.com/document/fortigate/7.4.4/administration-guide/226732/real-time-file-system-integrity-checking" target="_blank" rel="noopener">Filesystem Integrity</a>.</li>
<li><a href="https://docs.fortinet.com/document/fortigate/7.4.0/new-features/597060/automatic-firmware-upgrade-control-7-4-5" target="_blank" rel="noopener">Auto-updates</a> to seamlessly patch devices against vulnerabilities without administrator intervention.</li>
</ul>
<p>Fortinet continues to encourage customers to leverage <a href="https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/f07c9167-03f4-11ee-8e6d-fa163e15d75b/FortiOS-7.4-Best_Practices.pdf" target="_blank" rel="noopener">FortiOS best practice resources,</a> including guidance for system hardening, as well as features that help customers automate the upgrade process, such as <a target="_blank">Uninterrupted Cluster Upgrade</a>, Sub-second failover, <a href="https://docs.fortinet.com/document/fortigate/7.6.2/administration-guide/489324/failover-protection" target="_blank" rel="noopener">Fail-over protection</a>, <a href="https://community.fortinet.com/t5/FortiGate/Technical-Tip-Auto-restore-a-previous-config-if-the-change-fails/ta-p/209749" target="_blank" rel="noopener">Auto-restore configs</a> / <a href="https://community.fortinet.com/t5/FortiGate/Technical-Tip-Using-the-Revision-option-to-revert-to-a-previous/ta-p/194312" target="_blank" rel="noopener">Configuration revisions</a>, and <a href="https://docs.fortinet.com/document/fortimanager/7.4.0/new-features/392320/support-for-fortios-automatic-firmware-patch-upgrade-and-scheduling-7-4-1" target="_blank" rel="noopener">Automatic / Scheduled patch upgrades</a>.</p>
<p>The post <a href="https://gcc.net.gr/blog/analysis-of-threat-actor-activity/">Analysis of Threat Actor Activity</a> appeared first on <a href="https://gcc.net.gr">GCC HELLAS - ICT DISTRIBUTION</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
