{"id":17868,"date":"2025-02-17T16:21:43","date_gmt":"2025-02-17T13:21:43","guid":{"rendered":"https:\/\/powersoft365.com\/?p=17868"},"modified":"2025-02-17T16:49:27","modified_gmt":"2025-02-17T13:49:27","slug":"kyvernoasfaleia-to-pio-diadomeno-kakovoulo-logismiko-gia-ton-ianouario-2025","status":"publish","type":"post","link":"https:\/\/powersoft365.com\/el\/blog\/news\/kyvernoasfaleia-to-pio-diadomeno-kakovoulo-logismiko-gia-ton-ianouario-2025\/","title":{"rendered":"\u039a\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03b1\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1: \u03a4\u03bf \u03c0\u03b9\u03bf \u03b4\u03b9\u03b1\u03b4\u03bf\u03bc\u03ad\u03bd\u03bf \u03ba\u03b1\u03ba\u03cc\u03b2\u03bf\u03c5\u03bb\u03bf \u03bb\u03bf\u03b3\u03b9\u03c3\u03bc\u03b9\u03ba\u03cc \u03b3\u03b9\u03b1 \u03c4\u03bf\u03bd \u0399\u03b1\u03bd\u03bf\u03c5\u03b1\u03c1\u03af\u03bf 2025"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"17868\" class=\"elementor elementor-17868\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-dc08b7a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dc08b7a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-65230f9\" data-id=\"65230f9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8489034 elementor-widget elementor-widget-text-editor\" data-id=\"8489034\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h5 class=\"post-summary\">\u03a4\u03bf FakeUpdates \u03c3\u03c5\u03bd\u03b5\u03c7\u03af\u03b6\u03b5\u03b9 \u03bd\u03b1 \u03b4\u03b9\u03b5\u03c5\u03ba\u03bf\u03bb\u03cd\u03bd\u03b5\u03b9 \u03c4\u03b9\u03c2 \u03b5\u03c0\u03b9\u03b8\u03ad\u03c3\u03b5\u03b9\u03c2 ransomware, \u03b5\u03bd\u03ce \u03bf\u03b9 \u03b5\u03b3\u03ba\u03bb\u03b7\u03bc\u03b1\u03c4\u03af\u03b5\u03c2 \u03c4\u03bf\u03c5 \u03ba\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03c7\u03ce\u03c1\u03bf\u03c5 \u03b5\u03bd\u03b9\u03c3\u03c7\u03cd\u03bf\u03c5\u03bd \u03c4\u03b9\u03c2 \u03b4\u03c5\u03bd\u03b1\u03c4\u03cc\u03c4\u03b7\u03c4\u03ad\u03c2 \u03c4\u03bf\u03c5\u03c2 \u03bc\u03b5 \u03c4\u03b5\u03c7\u03bd\u03b9\u03ba\u03ad\u03c2 \u03c0\u03bf\u03c5 \u03b2\u03b1\u03c3\u03af\u03b6\u03bf\u03bd\u03c4\u03b1\u03b9 \u03c3\u03c4\u03b7\u03bd \u03a4\u03b5\u03c7\u03bd\u03b7\u03c4\u03ae \u039d\u03bf\u03b7\u03bc\u03bf\u03c3\u03cd\u03bd\u03b7<\/h5>\n<p>\u0397 Check Point Software \u03b4\u03b7\u03bc\u03bf\u03c3\u03af\u03b5\u03c5\u03c3\u03b5 \u03c4\u03bf\u03bd\u00a0<a href=\"https:\/\/blog.checkpoint.com\/security\/january-2025s-most-wanted-malware-fakeupdates-continues-to-dominate\/\" target=\"_blank\" rel=\"noopener\">\u03a0\u03b1\u03b3\u03ba\u03cc\u03c3\u03bc\u03b9\u03bf \u0394\u03b5\u03af\u03ba\u03c4\u03b7 \u0391\u03c0\u03b5\u03b9\u03bb\u03ce\u03bd<\/a>\u00a0\u03b3\u03b9\u03b1 \u03c4\u03bf\u03bd \u0399\u03b1\u03bd\u03bf\u03c5\u03ac\u03c1\u03b9\u03bf \u03c4\u03bf\u03c5 2025, \u03bf \u03bf\u03c0\u03bf\u03af\u03bf\u03c2 \u03c5\u03c0\u03bf\u03b3\u03c1\u03b1\u03bc\u03bc\u03af\u03b6\u03b5\u03b9 \u03cc\u03c4\u03b9 \u03c4\u03bf FakeUpdates \u03b5\u03be\u03b1\u03ba\u03bf\u03bb\u03bf\u03c5\u03b8\u03b5\u03af \u03bd\u03b1 \u03b1\u03c0\u03bf\u03c4\u03b5\u03bb\u03b5\u03af\u00a0<a href=\"https:\/\/www.ot.gr\/tag\/kyvernoasfaleia\/\" target=\"_blank\" rel=\"noopener\">\u03c3\u03b7\u03bc\u03b1\u03bd\u03c4\u03b9\u03ba\u03ae \u03b1\u03c0\u03b5\u03b9\u03bb\u03ae<\/a>\u00a0\u03c3\u03c4\u03bf \u03ba\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03c7\u03ce\u03c1\u03bf, \u03b4\u03b9\u03b1\u03b4\u03c1\u03b1\u03bc\u03b1\u03c4\u03af\u03b6\u03bf\u03bd\u03c4\u03b1\u03c2 \u03ba\u03b1\u03b8\u03bf\u03c1\u03b9\u03c3\u03c4\u03b9\u03ba\u03cc \u03c1\u03cc\u03bb\u03bf \u03c3\u03c4\u03b7 \u03b4\u03b9\u03b5\u03c5\u03ba\u03cc\u03bb\u03c5\u03bd\u03c3\u03b7 \u03b5\u03c0\u03b9\u03b8\u03ad\u03c3\u03b5\u03c9\u03bd ransomware.<\/p>\n<p>\u039c\u03b9\u03b1 \u03c0\u03c1\u03cc\u03c3\u03c6\u03b1\u03c4\u03b7 \u03ad\u03c1\u03b5\u03c5\u03bd\u03b1 \u03b1\u03c0\u03cc\u00a0<a href=\"https:\/\/www.ot.gr\/2025\/01\/25\/texnologia\/kyvernoasfaleia-ayksisi-44-stis-pagkosmies-epitheseis-apo-etos-se-etos\/\" target=\"_blank\" rel=\"noopener\">\u03b5\u03c1\u03b5\u03c5\u03bd\u03b7\u03c4\u03ad\u03c2 \u03b1\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2<\/a>\u00a0\u03b1\u03c0\u03bf\u03ba\u03ac\u03bb\u03c5\u03c8\u03b5 \u03cc\u03c4\u03b9 \u03bc\u03b9\u03b1 \u03b8\u03c5\u03b3\u03b1\u03c4\u03c1\u03b9\u03ba\u03ae \u03c4\u03bf\u03c5 RansomHub \u03c7\u03c1\u03b7\u03c3\u03b9\u03bc\u03bf\u03c0\u03bf\u03b9\u03bf\u03cd\u03c3\u03b5 \u03bc\u03b9\u03b1 \u03ba\u03b5\u03c1\u03ba\u03cc\u03c0\u03bf\u03c1\u03c4\u03b1 \u03b2\u03b1\u03c3\u03b9\u03c3\u03bc\u03ad\u03bd\u03b7 \u03c3\u03c4\u03b7\u03bd Python \u03b3\u03b9\u03b1 \u03bd\u03b1 \u03b4\u03b9\u03b1\u03c4\u03b7\u03c1\u03b5\u03af \u03bc\u03cc\u03bd\u03b9\u03bc\u03b7 \u03c0\u03c1\u03cc\u03c3\u03b2\u03b1\u03c3\u03b7 \u03ba\u03b1\u03b9 \u03bd\u03b1 \u03b1\u03bd\u03b1\u03c0\u03c4\u03cd\u03c3\u03c3\u03b5\u03b9 ransomware \u03c3\u03b5 \u03b4\u03b9\u03ac\u03c6\u03bf\u03c1\u03b1 \u03b4\u03af\u03ba\u03c4\u03c5\u03b1. \u0395\u03b3\u03ba\u03b1\u03c4\u03b5\u03c3\u03c4\u03b7\u03bc\u03ad\u03bd\u03bf \u03bb\u03af\u03b3\u03bf \u03bc\u03b5\u03c4\u03ac \u03c4\u03b7\u03bd \u03b1\u03c1\u03c7\u03b9\u03ba\u03ae \u03c0\u03c1\u03cc\u03c3\u03b2\u03b1\u03c3\u03b7 \u03c0\u03bf\u03c5 \u03b1\u03c0\u03ad\u03ba\u03c4\u03b7\u03c3\u03b5 \u03c4\u03bf FakeUpdates, \u03b1\u03c5\u03c4\u03cc \u03c4\u03bf backdoor \u03b5\u03c0\u03ad\u03b4\u03b5\u03b9\u03be\u03b5 \u03c0\u03c1\u03bf\u03b7\u03b3\u03bc\u03ad\u03bd\u03b5\u03c2 \u03c4\u03b5\u03c7\u03bd\u03b9\u03ba\u03ad\u03c2 \u03c3\u03c5\u03c3\u03ba\u03cc\u03c4\u03b9\u03c3\u03b7\u03c2 \u03bc\u03b1\u03b6\u03af \u03bc\u03b5 \u03bc\u03bf\u03c4\u03af\u03b2\u03b1 \u03ba\u03c9\u03b4\u03b9\u03ba\u03bf\u03c0\u03bf\u03af\u03b7\u03c3\u03b7\u03c2 \u03c0\u03bf\u03c5 \u03c5\u03c0\u03bf\u03c3\u03c4\u03b7\u03c1\u03af\u03b6\u03bf\u03bd\u03c4\u03b1\u03b9 \u03b1\u03c0\u03cc \u03c4\u03b5\u03c7\u03bd\u03b7\u03c4\u03ae \u03bd\u03bf\u03b7\u03bc\u03bf\u03c3\u03cd\u03bd\u03b7. \u0397 \u03b5\u03c0\u03af\u03b8\u03b5\u03c3\u03b7 \u03c0\u03b5\u03c1\u03b9\u03bb\u03ac\u03bc\u03b2\u03b1\u03bd\u03b5 \u03c0\u03bb\u03b5\u03c5\u03c1\u03b9\u03ba\u03ae \u03bc\u03b5\u03c4\u03b1\u03ba\u03af\u03bd\u03b7\u03c3\u03b7 \u03bc\u03ad\u03c3\u03c9 \u03c4\u03bf\u03c5 \u03c0\u03c1\u03c9\u03c4\u03bf\u03ba\u03cc\u03bb\u03bb\u03bf\u03c5 \u03b1\u03c0\u03bf\u03bc\u03b1\u03ba\u03c1\u03c5\u03c3\u03bc\u03ad\u03bd\u03b7\u03c2 \u03b5\u03c0\u03b9\u03c6\u03ac\u03bd\u03b5\u03b9\u03b1\u03c2 \u03b5\u03c1\u03b3\u03b1\u03c3\u03af\u03b1\u03c2 (RDP) \u03ba\u03b1\u03b9 \u03ba\u03b1\u03b8\u03b9\u03ad\u03c1\u03c9\u03c3\u03b5 \u03c3\u03c5\u03bd\u03b5\u03c7\u03ae \u03c0\u03c1\u03cc\u03c3\u03b2\u03b1\u03c3\u03b7 \u03bc\u03b5 \u03c4\u03b7 \u03b4\u03b7\u03bc\u03b9\u03bf\u03c5\u03c1\u03b3\u03af\u03b1 \u03c0\u03c1\u03bf\u03b3\u03c1\u03b1\u03bc\u03bc\u03b1\u03c4\u03b9\u03c3\u03bc\u03ad\u03bd\u03c9\u03bd \u03b5\u03c1\u03b3\u03b1\u03c3\u03b9\u03ce\u03bd.<\/p>\n<p><strong><a href=\"https:\/\/www.ot.gr\/2025\/02\/08\/texnologia\/kyvernoasfaleia-oi-6-syxnes-apates-online-stoiximatos-kai-pos-na-tis-apofygete\/\" target=\"_blank\" rel=\"noopener\">\u039f\u03b9 6 \u03c3\u03c5\u03c7\u03bd\u03ad\u03c2 \u03b1\u03c0\u03ac\u03c4\u03b5\u03c2 online \u03c3\u03c4\u03bf\u03b9\u03c7\u03ae\u03bc\u03b1\u03c4\u03bf\u03c2 \u03ba\u03b1\u03b9 \u03c0\u03ce\u03c2 \u03bd\u03b1 \u03c4\u03b9\u03c2 \u03b1\u03c0\u03bf\u03c6\u03cd\u03b3\u03b5\u03c4\u03b5<\/a><\/strong><\/p>\n<p>\u0397 \u039c\u03ac\u03b3\u03b9\u03b1 \u03a7\u03cc\u03c1\u03bf\u03b2\u03b9\u03c4\u03c2, VP of Research \u03c3\u03c4\u03b7\u03bd Check Point Software, \u03c3\u03c7\u03bf\u03bb\u03af\u03b1\u03c3\u03b5: \u00ab\u0397 \u03c4\u03b5\u03c7\u03bd\u03b7\u03c4\u03ae \u03bd\u03bf\u03b7\u03bc\u03bf\u03c3\u03cd\u03bd\u03b7 \u03bc\u03b5\u03c4\u03b1\u03bc\u03bf\u03c1\u03c6\u03ce\u03bd\u03b5\u03b9 \u03c4\u03bf \u03c4\u03bf\u03c0\u03af\u03bf \u03c4\u03c9\u03bd \u03ba\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03b1\u03c0\u03b5\u03b9\u03bb\u03ce\u03bd, \u03bc\u03b5 \u03c4\u03bf\u03c5\u03c2 \u03b5\u03b3\u03ba\u03bb\u03b7\u03bc\u03b1\u03c4\u03af\u03b5\u03c2 \u03c4\u03bf\u03c5 \u03ba\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03c7\u03ce\u03c1\u03bf\u03c5 \u03bd\u03b1 \u03b5\u03be\u03b5\u03bb\u03af\u03c3\u03c3\u03bf\u03c5\u03bd \u03c4\u03b1\u03c7\u03cd\u03c4\u03b1\u03c4\u03b1 \u03c4\u03b9\u03c2 \u03bc\u03b5\u03b8\u03cc\u03b4\u03bf\u03c5\u03c2 \u03c4\u03bf\u03c5\u03c2, \u03b1\u03be\u03b9\u03bf\u03c0\u03bf\u03b9\u03ce\u03bd\u03c4\u03b1\u03c2 \u03c4\u03b7 \u03b3\u03b9\u03b1 \u03bd\u03b1 \u03b1\u03c5\u03c4\u03bf\u03bc\u03b1\u03c4\u03bf\u03c0\u03bf\u03b9\u03ae\u03c3\u03bf\u03c5\u03bd \u03ba\u03b1\u03b9 \u03bd\u03b1 \u03ba\u03bb\u03b9\u03bc\u03b1\u03ba\u03ce\u03c3\u03bf\u03c5\u03bd \u03c4\u03b9\u03c2 \u03c4\u03b1\u03ba\u03c4\u03b9\u03ba\u03ad\u03c2 \u03c4\u03bf\u03c5\u03c2 \u03ba\u03b1\u03b9 \u03bd\u03b1 \u03b5\u03bd\u03b9\u03c3\u03c7\u03cd\u03c3\u03bf\u03c5\u03bd \u03c4\u03b9\u03c2 \u03b4\u03c5\u03bd\u03b1\u03c4\u03cc\u03c4\u03b7\u03c4\u03ad\u03c2 \u03c4\u03bf\u03c5\u03c2. \u0393\u03b9\u03b1 \u03bd\u03b1 \u03ba\u03b1\u03c4\u03b1\u03c0\u03bf\u03bb\u03b5\u03bc\u03ae\u03c3\u03bf\u03c5\u03bd \u03b1\u03c0\u03bf\u03c4\u03b5\u03bb\u03b5\u03c3\u03bc\u03b1\u03c4\u03b9\u03ba\u03ac \u03b1\u03c5\u03c4\u03ad\u03c2 \u03c4\u03b9\u03c2 \u03b1\u03c0\u03b5\u03b9\u03bb\u03ad\u03c2, \u03bf\u03b9 \u03bf\u03c1\u03b3\u03b1\u03bd\u03b9\u03c3\u03bc\u03bf\u03af \u03c0\u03c1\u03ad\u03c0\u03b5\u03b9 \u03bd\u03b1 \u03c0\u03c1\u03bf\u03c7\u03c9\u03c1\u03ae\u03c3\u03bf\u03c5\u03bd \u03c0\u03ad\u03c1\u03b1 \u03b1\u03c0\u03cc \u03c4\u03b9\u03c2 \u03c0\u03b1\u03c1\u03b1\u03b4\u03bf\u03c3\u03b9\u03b1\u03ba\u03ad\u03c2 \u03ac\u03bc\u03c5\u03bd\u03b5\u03c2 \u03ba\u03b1\u03b9 \u03bd\u03b1 \u03c5\u03b9\u03bf\u03b8\u03b5\u03c4\u03ae\u03c3\u03bf\u03c5\u03bd \u03c0\u03c1\u03bf\u03bb\u03b7\u03c0\u03c4\u03b9\u03ba\u03ac, \u03c0\u03c1\u03bf\u03c3\u03b1\u03c1\u03bc\u03bf\u03c3\u03c4\u03b9\u03ba\u03ac \u03bc\u03ad\u03c4\u03c1\u03b1 \u03b1\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2 \u03bc\u03b5 \u03b2\u03ac\u03c3\u03b7 \u03c4\u03b7\u03bd \u03c4\u03b5\u03c7\u03bd\u03b7\u03c4\u03ae \u03bd\u03bf\u03b7\u03bc\u03bf\u03c3\u03cd\u03bd\u03b7 \u03c0\u03bf\u03c5 \u03c0\u03c1\u03bf\u03b2\u03bb\u03ad\u03c0\u03bf\u03c5\u03bd \u03c4\u03bf\u03c5\u03c2 \u03b1\u03bd\u03b1\u03b4\u03c5\u03cc\u03bc\u03b5\u03bd\u03bf\u03c5\u03c2 \u03ba\u03b9\u03bd\u03b4\u03cd\u03bd\u03bf\u03c5\u03c2\u00bb.<\/p>\n<h2>Top Malware Families<\/h2>\n<p>\u03a4\u03b1 \u03b2\u03ad\u03bb\u03b7 \u03b1\u03c6\u03bf\u03c1\u03bf\u03cd\u03bd \u03c4\u03b7\u03bd \u03b1\u03bb\u03bb\u03b1\u03b3\u03ae \u03c3\u03c4\u03b7\u03bd \u03ba\u03b1\u03c4\u03ac\u03c4\u03b1\u03be\u03b7 \u03c3\u03b5 \u03c3\u03c7\u03ad\u03c3\u03b7 \u03bc\u03b5 \u03c4\u03bf\u03bd \u03c0\u03c1\u03bf\u03b7\u03b3\u03bf\u03cd\u03bc\u03b5\u03bd\u03bf \u03bc\u03ae\u03bd\u03b1.<\/p>\n<ol>\n<li><strong>\u00a0\u2194 FakeUpdates \u2013<\/strong>\u00a0\u03a4\u03bf FakeUpdates (AKA SocGholish) \u03b5\u03af\u03bd\u03b1\u03b9 \u03ba\u03b1\u03ba\u03cc\u03b2\u03bf\u03c5\u03bb\u03bf \u03bb\u03bf\u03b3\u03b9\u03c3\u03bc\u03b9\u03ba\u03cc \u03bb\u03ae\u03c8\u03b7\u03c2 \u03c0\u03bf\u03c5 \u03b1\u03bd\u03b1\u03ba\u03b1\u03bb\u03cd\u03c6\u03b8\u03b7\u03ba\u03b5 \u03b1\u03c1\u03c7\u03b9\u03ba\u03ac \u03c4\u03bf 2018. \u0394\u03b9\u03b1\u03b4\u03af\u03b4\u03b5\u03c4\u03b1\u03b9 \u03bc\u03ad\u03c3\u03c9 drive-by \u03bb\u03ae\u03c8\u03b5\u03c9\u03bd \u03c3\u03b5 \u03c3\u03c5\u03bc\u03b2\u03b9\u03b2\u03b1\u03c3\u03bc\u03ad\u03bd\u03bf\u03c5\u03c2 \u03ae \u03ba\u03b1\u03ba\u03cc\u03b2\u03bf\u03c5\u03bb\u03bf\u03c5\u03c2 \u03b9\u03c3\u03c4\u03cc\u03c4\u03bf\u03c0\u03bf\u03c5\u03c2, \u03c0\u03c1\u03bf\u03c4\u03c1\u03ad\u03c0\u03bf\u03bd\u03c4\u03b1\u03c2 \u03c4\u03bf\u03c5\u03c2 \u03c7\u03c1\u03ae\u03c3\u03c4\u03b5\u03c2 \u03bd\u03b1 \u03b5\u03b3\u03ba\u03b1\u03c4\u03b1\u03c3\u03c4\u03ae\u03c3\u03bf\u03c5\u03bd \u03bc\u03b9\u03b1 \u03c8\u03b5\u03cd\u03c4\u03b9\u03ba\u03b7 \u03b5\u03bd\u03b7\u03bc\u03ad\u03c1\u03c9\u03c3\u03b7 \u03c4\u03bf\u03c5 \u03c0\u03c1\u03bf\u03b3\u03c1\u03ac\u03bc\u03bc\u03b1\u03c4\u03bf\u03c2 \u03c0\u03b5\u03c1\u03b9\u03ae\u03b3\u03b7\u03c3\u03b7\u03c2. \u03a4\u03bf \u03ba\u03b1\u03ba\u03cc\u03b2\u03bf\u03c5\u03bb\u03bf \u03bb\u03bf\u03b3\u03b9\u03c3\u03bc\u03b9\u03ba\u03cc FakeUpdates \u03c3\u03c5\u03bd\u03b4\u03ad\u03b5\u03c4\u03b1\u03b9 \u03bc\u03b5 \u03c4\u03b7 \u03c1\u03c9\u03c3\u03b9\u03ba\u03ae \u03bf\u03bc\u03ac\u03b4\u03b1 hacking, Evil Corp \u03ba\u03b1\u03b9 \u03c7\u03c1\u03b7\u03c3\u03b9\u03bc\u03bf\u03c0\u03bf\u03b9\u03b5\u03af\u03c4\u03b1\u03b9 \u03b3\u03b9\u03b1 \u03c4\u03b7\u03bd \u03c0\u03b1\u03c1\u03ac\u03b4\u03bf\u03c3\u03b7 \u03b4\u03b5\u03c5\u03c4\u03b5\u03c1\u03b5\u03c5\u03cc\u03bd\u03c4\u03c9\u03bd \u03c9\u03c6\u03ad\u03bb\u03b9\u03bc\u03c9\u03bd \u03c6\u03bf\u03c1\u03c4\u03af\u03c9\u03bd \u03bc\u03b5\u03c4\u03ac \u03c4\u03b7\u03bd \u03b1\u03c1\u03c7\u03b9\u03ba\u03ae \u03bc\u03cc\u03bb\u03c5\u03bd\u03c3\u03b7.<\/li>\n<li><strong>\u00a0\u2191 Formbook \u2013<\/strong>\u00a0\u03a4\u03bf Formbook, \u03c0\u03bf\u03c5 \u03b5\u03bd\u03c4\u03bf\u03c0\u03af\u03c3\u03c4\u03b7\u03ba\u03b5 \u03b3\u03b9\u03b1 \u03c0\u03c1\u03ce\u03c4\u03b7 \u03c6\u03bf\u03c1\u03ac \u03c4\u03bf 2016, \u03b5\u03af\u03bd\u03b1\u03b9 \u03ad\u03bd\u03b1 \u03ba\u03b1\u03ba\u03cc\u03b2\u03bf\u03c5\u03bb\u03bf \u03bb\u03bf\u03b3\u03b9\u03c3\u03bc\u03b9\u03ba\u03cc infostealer \u03c0\u03bf\u03c5 \u03c3\u03c4\u03bf\u03c7\u03b5\u03cd\u03b5\u03b9 \u03ba\u03c5\u03c1\u03af\u03c9\u03c2 \u03c3\u03c5\u03c3\u03c4\u03ae\u03bc\u03b1\u03c4\u03b1 Windows. \u03a4\u03bf \u03ba\u03b1\u03ba\u03cc\u03b2\u03bf\u03c5\u03bb\u03bf \u03bb\u03bf\u03b3\u03b9\u03c3\u03bc\u03b9\u03ba\u03cc \u03c3\u03c5\u03bb\u03bb\u03ad\u03b3\u03b5\u03b9 \u03b4\u03b9\u03b1\u03c0\u03b9\u03c3\u03c4\u03b5\u03c5\u03c4\u03ae\u03c1\u03b9\u03b1 \u03b1\u03c0\u03cc \u03b4\u03b9\u03ac\u03c6\u03bf\u03c1\u03b1 \u03c0\u03c1\u03bf\u03b3\u03c1\u03ac\u03bc\u03bc\u03b1\u03c4\u03b1 \u03c0\u03b5\u03c1\u03b9\u03ae\u03b3\u03b7\u03c3\u03b7\u03c2 \u03c3\u03c4\u03bf \u03b4\u03b9\u03b1\u03b4\u03af\u03ba\u03c4\u03c5\u03bf, \u03c3\u03c5\u03bb\u03bb\u03ad\u03b3\u03b5\u03b9 \u03c3\u03c4\u03b9\u03b3\u03bc\u03b9\u03cc\u03c4\u03c5\u03c0\u03b1 \u03bf\u03b8\u03cc\u03bd\u03b7\u03c2, \u03c0\u03b1\u03c1\u03b1\u03ba\u03bf\u03bb\u03bf\u03c5\u03b8\u03b5\u03af \u03ba\u03b1\u03b9 \u03ba\u03b1\u03c4\u03b1\u03b3\u03c1\u03ac\u03c6\u03b5\u03b9 \u03c4\u03b9\u03c2 \u03c0\u03bb\u03b7\u03ba\u03c4\u03c1\u03bf\u03bb\u03bf\u03b3\u03ae\u03c3\u03b5\u03b9\u03c2 \u03ba\u03b1\u03b9 \u03bc\u03c0\u03bf\u03c1\u03b5\u03af \u03bd\u03b1 \u03ba\u03b1\u03c4\u03b5\u03b2\u03ac\u03c3\u03b5\u03b9 \u03ba\u03b1\u03b9 \u03bd\u03b1 \u03b5\u03ba\u03c4\u03b5\u03bb\u03ad\u03c3\u03b5\u03b9 \u03c0\u03c1\u03cc\u03c3\u03b8\u03b5\u03c4\u03b1 \u03c9\u03c6\u03ad\u03bb\u03b9\u03bc\u03b1 \u03c6\u03bf\u03c1\u03c4\u03af\u03b1. \u0395\u03be\u03b1\u03c0\u03bb\u03ce\u03bd\u03b5\u03c4\u03b1\u03b9 \u03bc\u03ad\u03c3\u03c9 \u03b5\u03ba\u03c3\u03c4\u03c1\u03b1\u03c4\u03b5\u03b9\u03ce\u03bd phishing, \u03ba\u03b1\u03ba\u03cc\u03b2\u03bf\u03c5\u03bb\u03c9\u03bd \u03c3\u03c5\u03bd\u03b7\u03bc\u03bc\u03ad\u03bd\u03c9\u03bd email \u03ba\u03b1\u03b9 \u03b5\u03ba\u03c4\u03b5\u03b8\u03b5\u03b9\u03bc\u03ad\u03bd\u03c9\u03bd \u03b9\u03c3\u03c4\u03cc\u03c4\u03bf\u03c0\u03c9\u03bd, \u03c3\u03c5\u03c7\u03bd\u03ac \u03bc\u03b5\u03c4\u03b1\u03bc\u03c6\u03b9\u03b5\u03c3\u03bc\u03ad\u03bd\u03c9\u03bd \u03c9\u03c2 \u03bd\u03cc\u03bc\u03b9\u03bc\u03b1 \u03b1\u03c1\u03c7\u03b5\u03af\u03b1.<\/li>\n<li><strong>\u00a0\u2191 Remcos \u2013<\/strong>\u00a0\u03a4\u03bf Remcos \u03b5\u03af\u03bd\u03b1\u03b9 \u03ad\u03bd\u03b1 Trojan \u03b1\u03c0\u03bf\u03bc\u03b1\u03ba\u03c1\u03c5\u03c3\u03bc\u03ad\u03bd\u03b7\u03c2 \u03c0\u03c1\u03cc\u03c3\u03b2\u03b1\u03c3\u03b7\u03c2 (RAT) \u03c0\u03bf\u03c5 \u03c0\u03b1\u03c1\u03b1\u03c4\u03b7\u03c1\u03ae\u03b8\u03b7\u03ba\u03b5 \u03b3\u03b9\u03b1 \u03c0\u03c1\u03ce\u03c4\u03b7 \u03c6\u03bf\u03c1\u03ac \u03c4\u03bf 2016. \u0394\u03b9\u03b1\u03b4\u03af\u03b4\u03b5\u03c4\u03b1\u03b9 \u03c3\u03c5\u03c7\u03bd\u03ac \u03bc\u03ad\u03c3\u03c9 \u03ba\u03b1\u03ba\u03cc\u03b2\u03bf\u03c5\u03bb\u03c9\u03bd \u03b5\u03b3\u03b3\u03c1\u03ac\u03c6\u03c9\u03bd \u03c3\u03b5 \u03b5\u03ba\u03c3\u03c4\u03c1\u03b1\u03c4\u03b5\u03af\u03b5\u03c2 phishing. \u03a0\u03b1\u03c1\u03b1\u03ba\u03ac\u03bc\u03c0\u03c4\u03b5\u03b9 \u03c4\u03bf\u03c5\u03c2 \u03bc\u03b7\u03c7\u03b1\u03bd\u03b9\u03c3\u03bc\u03bf\u03cd\u03c2 \u03b1\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2 \u03c4\u03c9\u03bd Windows, \u03cc\u03c0\u03c9\u03c2 \u03c4\u03bf UAC, \u03ba\u03b1\u03b9 \u03b5\u03ba\u03c4\u03b5\u03bb\u03b5\u03af \u03ba\u03b1\u03ba\u03cc\u03b2\u03bf\u03c5\u03bb\u03bf \u03bb\u03bf\u03b3\u03b9\u03c3\u03bc\u03b9\u03ba\u03cc \u03bc\u03b5 \u03b1\u03c5\u03be\u03b7\u03bc\u03ad\u03bd\u03b1 \u03c0\u03c1\u03bf\u03bd\u03cc\u03bc\u03b9\u03b1, \u03ba\u03b1\u03b8\u03b9\u03c3\u03c4\u03ce\u03bd\u03c4\u03b1\u03c2 \u03c4\u03bf \u03ad\u03bd\u03b1 \u03b5\u03c5\u03ad\u03bb\u03b9\u03ba\u03c4\u03bf \u03b5\u03c1\u03b3\u03b1\u03bb\u03b5\u03af\u03bf \u03b3\u03b9\u03b1 \u03c4\u03bf\u03c5\u03c2 \u03c6\u03bf\u03c1\u03b5\u03af\u03c2 \u03b1\u03c0\u03b5\u03b9\u03bb\u03ce\u03bd.<\/li>\n<\/ol>\n<h2>Top Mobile Malware<\/h2>\n<ol>\n<li><strong>\u00a0\u2194 Anubis \u2013<\/strong>\u03a4\u03bf Anubis \u03b5\u03af\u03bd\u03b1\u03b9 \u03ad\u03bd\u03b1 \u03b5\u03c5\u03ad\u03bb\u03b9\u03ba\u03c4\u03bf \u03c4\u03c1\u03b1\u03c0\u03b5\u03b6\u03b9\u03ba\u03cc trojan \u03c0\u03bf\u03c5 \u03c0\u03c1\u03bf\u03ad\u03c1\u03c7\u03b5\u03c4\u03b1\u03b9 \u03b1\u03c0\u03cc \u03c3\u03c5\u03c3\u03ba\u03b5\u03c5\u03ad\u03c2 Android, \u03bc\u03b5 \u03b4\u03c5\u03bd\u03b1\u03c4\u03cc\u03c4\u03b7\u03c4\u03b5\u03c2 \u03cc\u03c0\u03c9\u03c2 \u03c0\u03b1\u03c1\u03ac\u03ba\u03b1\u03bc\u03c8\u03b7 \u03c4\u03bf\u03c5 \u03b5\u03bb\u03ad\u03b3\u03c7\u03bf\u03c5 \u03c4\u03b1\u03c5\u03c4\u03cc\u03c4\u03b7\u03c4\u03b1\u03c2 \u03c0\u03bf\u03bb\u03bb\u03b1\u03c0\u03bb\u03ce\u03bd \u03c0\u03b1\u03c1\u03b1\u03b3\u03cc\u03bd\u03c4\u03c9\u03bd (MFA), keylogging, \u03b7\u03c7\u03bf\u03b3\u03c1\u03ac\u03c6\u03b7\u03c3\u03b7 \u03ae\u03c7\u03bf\u03c5 \u03ba\u03b1\u03b9 \u03bb\u03b5\u03b9\u03c4\u03bf\u03c5\u03c1\u03b3\u03af\u03b5\u03c2 ransomware.<\/li>\n<li><strong>\u00a0\u2191 AhMyth \u2013<\/strong>\u03a4\u03bf AhMyth \u03b5\u03af\u03bd\u03b1\u03b9 \u03ad\u03bd\u03b1 trojan \u03b1\u03c0\u03bf\u03bc\u03b1\u03ba\u03c1\u03c5\u03c3\u03bc\u03ad\u03bd\u03b7\u03c2 \u03c0\u03c1\u03cc\u03c3\u03b2\u03b1\u03c3\u03b7\u03c2 (RAT) \u03c0\u03bf\u03c5 \u03c3\u03c4\u03bf\u03c7\u03b5\u03cd\u03b5\u03b9 \u03c3\u03b5 \u03c3\u03c5\u03c3\u03ba\u03b5\u03c5\u03ad\u03c2 Android, \u03bc\u03b5\u03c4\u03b1\u03bc\u03c6\u03b9\u03b5\u03c3\u03bc\u03ad\u03bd\u03bf \u03c3\u03b5 \u03bd\u03cc\u03bc\u03b9\u03bc\u03b5\u03c2 \u03b5\u03c6\u03b1\u03c1\u03bc\u03bf\u03b3\u03ad\u03c2. \u0391\u03c0\u03bf\u03ba\u03c4\u03ac \u03b5\u03ba\u03c4\u03b5\u03c4\u03b1\u03bc\u03ad\u03bd\u03b1 \u03b4\u03b9\u03ba\u03b1\u03b9\u03ce\u03bc\u03b1\u03c4\u03b1 \u03b3\u03b9\u03b1 \u03bd\u03b1 \u03b1\u03c0\u03bf\u03ba\u03c1\u03cd\u03c0\u03c4\u03b5\u03b9 \u03b5\u03c5\u03b1\u03af\u03c3\u03b8\u03b7\u03c4\u03b5\u03c2 \u03c0\u03bb\u03b7\u03c1\u03bf\u03c6\u03bf\u03c1\u03af\u03b5\u03c2, \u03cc\u03c0\u03c9\u03c2 \u03c4\u03c1\u03b1\u03c0\u03b5\u03b6\u03b9\u03ba\u03ac \u03b4\u03b9\u03b1\u03c0\u03b9\u03c3\u03c4\u03b5\u03c5\u03c4\u03ae\u03c1\u03b9\u03b1 \u03ba\u03b1\u03b9 \u03ba\u03c9\u03b4\u03b9\u03ba\u03bf\u03cd\u03c2 MFA.<\/li>\n<li><strong>\u00a0\u2193 Necro \u2013<\/strong>\u03a4\u03bf Necro \u03b5\u03af\u03bd\u03b1\u03b9 \u03ad\u03bd\u03b1 \u03ba\u03b1\u03ba\u03cc\u03b2\u03bf\u03c5\u03bb\u03bf \u03c0\u03c1\u03cc\u03b3\u03c1\u03b1\u03bc\u03bc\u03b1 \u03bb\u03ae\u03c8\u03b7\u03c2 Android \u03c0\u03bf\u03c5 \u03b1\u03bd\u03b1\u03ba\u03c4\u03ac \u03ba\u03b1\u03b9 \u03b5\u03ba\u03c4\u03b5\u03bb\u03b5\u03af \u03b5\u03c0\u03b9\u03b2\u03bb\u03b1\u03b2\u03ae \u03c3\u03c5\u03c3\u03c4\u03b1\u03c4\u03b9\u03ba\u03ac \u03bc\u03b5 \u03b2\u03ac\u03c3\u03b7 \u03c4\u03b9\u03c2 \u03b5\u03bd\u03c4\u03bf\u03bb\u03ad\u03c2 \u03c4\u03c9\u03bd \u03b4\u03b7\u03bc\u03b9\u03bf\u03c5\u03c1\u03b3\u03ce\u03bd \u03c4\u03bf\u03c5.<\/li>\n<\/ol>\n<h2>Top-Attacked Industries Globally<\/h2>\n<ol>\n<li>\u00a0\u0395\u03ba\u03c0\u03b1\u03af\u03b4\u03b5\u03c5\u03c3\u03b7<\/li>\n<li>\u00a0\u039a\u03c5\u03b2\u03ad\u03c1\u03bd\u03b7\u03c3\u03b7<\/li>\n<li>\u00a0\u03a4\u03b7\u03bb\u03b5\u03c0\u03b9\u03ba\u03bf\u03b9\u03bd\u03c9\u03bd\u03af\u03b5\u03c2<\/li>\n<\/ol>\n<h2>Top Ransomware Groups<\/h2>\n<p>\u0392\u03ac\u03c3\u03b5\u03b9 \u03c4\u03c9\u03bd \u03c3\u03c4\u03bf\u03b9\u03c7\u03b5\u03af\u03c9\u03bd \u03b1\u03c0\u03cc \u03b9\u03c3\u03c4\u03cc\u03c4\u03bf\u03c0\u03bf\u03c5\u03c2 \u00ab\u03bd\u03c4\u03c1\u03bf\u03c0\u03ae\u03c2\u00bb ransomware, \u03b7 Clop \u03b5\u03af\u03bd\u03b1\u03b9 \u03b7 \u03c0\u03b9\u03bf \u03b4\u03b9\u03b1\u03b4\u03b5\u03b4\u03bf\u03bc\u03ad\u03bd\u03b7 \u03bf\u03bc\u03ac\u03b4\u03b1 ransomware, \u03c5\u03c0\u03b5\u03cd\u03b8\u03c5\u03bd\u03b7 \u03b3\u03b9\u03b1 \u03c4\u03bf 10% \u03c4\u03c9\u03bd \u03b4\u03b7\u03bc\u03bf\u03c3\u03b9\u03b5\u03c5\u03bc\u03ad\u03bd\u03c9\u03bd \u03b5\u03c0\u03b9\u03b8\u03ad\u03c3\u03b5\u03c9\u03bd, \u03b1\u03ba\u03bf\u03bb\u03bf\u03c5\u03b8\u03bf\u03cd\u03bc\u03b5\u03bd\u03b7 \u03b1\u03c0\u03cc \u03c4\u03b7 FunkSec \u03bc\u03b5 8% \u03ba\u03b1\u03b9 \u03c4\u03b7 RansomHub \u03bc\u03b5 7%.<\/p>\n<ol>\n<li><strong>\u00a0Clop \u2013<\/strong>\u03a4\u03bf Clop \u03b5\u03af\u03bd\u03b1\u03b9 \u03ad\u03bd\u03b1 \u03c3\u03c4\u03ad\u03bb\u03b5\u03c7\u03bf\u03c2 ransomware, \u03b5\u03bd\u03b5\u03c1\u03b3\u03cc \u03b1\u03c0\u03cc \u03c4\u03bf 2019, \u03c0\u03bf\u03c5 \u03c3\u03c4\u03bf\u03c7\u03b5\u03cd\u03b5\u03b9 \u03b2\u03b9\u03bf\u03bc\u03b7\u03c7\u03b1\u03bd\u03af\u03b5\u03c2 \u03c0\u03b1\u03b3\u03ba\u03bf\u03c3\u03bc\u03af\u03c9\u03c2. \u03a7\u03c1\u03b7\u03c3\u03b9\u03bc\u03bf\u03c0\u03bf\u03b9\u03b5\u03af \u00ab\u03b4\u03b9\u03c0\u03bb\u03cc \u03b5\u03ba\u03b2\u03b9\u03b1\u03c3\u03bc\u03cc\u00bb, \u03b1\u03c0\u03b5\u03b9\u03bb\u03ce\u03bd\u03c4\u03b1\u03c2 \u03bc\u03b5 \u03b4\u03b9\u03b1\u03c1\u03c1\u03bf\u03ae \u03ba\u03bb\u03b5\u03bc\u03bc\u03ad\u03bd\u03c9\u03bd \u03b4\u03b5\u03b4\u03bf\u03bc\u03ad\u03bd\u03c9\u03bd, \u03b5\u03ba\u03c4\u03cc\u03c2 \u03b1\u03bd \u03ba\u03b1\u03c4\u03b1\u03b2\u03bb\u03b7\u03b8\u03bf\u03cd\u03bd \u03bb\u03cd\u03c4\u03c1\u03b1.<\/li>\n<li><strong>\u00a0FunkSec \u2013<\/strong>\u03a4\u03bf FunkSec \u03b5\u03af\u03bd\u03b1\u03b9 \u03bc\u03b9\u03b1 \u03b1\u03bd\u03b1\u03b4\u03c5\u03cc\u03bc\u03b5\u03bd\u03b7 \u03bf\u03bc\u03ac\u03b4\u03b1 ransomware \u03c0\u03bf\u03c5 \u03b5\u03bc\u03c6\u03b1\u03bd\u03af\u03c3\u03c4\u03b7\u03ba\u03b5 \u03c4\u03bf\u03bd \u0394\u03b5\u03ba\u03ad\u03bc\u03b2\u03c1\u03b9\u03bf \u03c4\u03bf\u03c5 2024, \u03bc\u03b5 \u03ad\u03bd\u03b1\u03bd \u03b9\u03c3\u03c4\u03cc\u03c4\u03bf\u03c0\u03bf \u03b4\u03b9\u03b1\u03c1\u03c1\u03bf\u03ae\u03c2 \u03b4\u03b5\u03b4\u03bf\u03bc\u03ad\u03bd\u03c9\u03bd \u03c0\u03bf\u03c5 \u03c3\u03c5\u03bd\u03b4\u03c5\u03ac\u03b6\u03b5\u03b9 \u03c0\u03b5\u03c1\u03b9\u03c3\u03c4\u03b1\u03c4\u03b9\u03ba\u03ac ransomware \u03bc\u03b5 \u03c0\u03b1\u03c1\u03b1\u03b2\u03b9\u03ac\u03c3\u03b5\u03b9\u03c2 \u03b4\u03b5\u03b4\u03bf\u03bc\u03ad\u03bd\u03c9\u03bd.<\/li>\n<li><strong>\u00a0RansomHub \u2013<\/strong>\u03a4\u03bf RansomHub \u03b5\u03af\u03bd\u03b1\u03b9 \u03bc\u03b9\u03b1 \u03b5\u03c0\u03b9\u03c7\u03b5\u03af\u03c1\u03b7\u03c3\u03b7 Ransomware-as-a-Service (RaaS) \u03c0\u03bf\u03c5 \u03b5\u03bc\u03c6\u03b1\u03bd\u03af\u03c3\u03c4\u03b7\u03ba\u03b5 \u03c9\u03c2 \u03bc\u03b9\u03b1 \u03b1\u03bd\u03b1\u03b2\u03b1\u03b8\u03bc\u03b9\u03c3\u03bc\u03ad\u03bd\u03b7 \u03ad\u03ba\u03b4\u03bf\u03c3\u03b7 \u03c4\u03bf\u03c5 ransomware Knight. \u0388\u03c7\u03b5\u03b9 \u03b1\u03c0\u03bf\u03ba\u03c4\u03ae\u03c3\u03b5\u03b9 \u03c6\u03ae\u03bc\u03b7 \u03b3\u03b9\u03b1 \u03c4\u03b7 \u03c3\u03c4\u03cc\u03c7\u03b5\u03c5\u03c3\u03b7 \u03c0\u03b5\u03c1\u03b9\u03b2\u03b1\u03bb\u03bb\u03cc\u03bd\u03c4\u03c9\u03bd Windows, macOS, Linux \u03ba\u03b1\u03b9 VMware ESXi.\u00a0<\/li>\n<\/ol>\n<p>\u00a0 \u00a0 \u00a0 \u03a0\u03c5\u03b3\u03ae: <a href=\"https:\/\/www.ot.gr\/2025\/02\/16\/texnologia\/kyvernoasfaleia-to-pio-diadomeno-kakovoulo-logismiko-gia-ton-ianouario-2025\/\">https:\/\/www.ot.gr\/2025\/02\/16\/texnologia\/kyvernoasfaleia-to-pio-diadomeno-kakovoulo-logismiko-gia-ton-ianouario-2025\/<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\u03a4\u03bf FakeUpdates \u03c3\u03c5\u03bd\u03b5\u03c7\u03af\u03b6\u03b5\u03b9 \u03bd\u03b1 \u03b4\u03b9\u03b5\u03c5\u03ba\u03bf\u03bb\u03cd\u03bd\u03b5\u03b9 \u03c4\u03b9\u03c2 \u03b5\u03c0\u03b9\u03b8\u03ad\u03c3\u03b5\u03b9\u03c2 ransomware, \u03b5\u03bd\u03ce \u03bf\u03b9 \u03b5\u03b3\u03ba\u03bb\u03b7\u03bc\u03b1\u03c4\u03af\u03b5\u03c2 \u03c4\u03bf\u03c5 \u03ba\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03c7\u03ce\u03c1\u03bf\u03c5 \u03b5\u03bd\u03b9\u03c3\u03c7\u03cd\u03bf\u03c5\u03bd \u03c4\u03b9\u03c2 \u03b4\u03c5\u03bd\u03b1\u03c4\u03cc\u03c4\u03b7\u03c4\u03ad\u03c2 \u03c4\u03bf\u03c5\u03c2 \u03bc\u03b5 \u03c4\u03b5\u03c7\u03bd\u03b9\u03ba\u03ad\u03c2 \u03c0\u03bf\u03c5 \u03b2\u03b1\u03c3\u03af\u03b6\u03bf\u03bd\u03c4\u03b1\u03b9 \u03c3\u03c4\u03b7\u03bd \u03a4\u03b5\u03c7\u03bd\u03b7\u03c4\u03ae \u039d\u03bf\u03b7\u03bc\u03bf\u03c3\u03cd\u03bd\u03b7 \u0397 Check Point Software \u03b4\u03b7\u03bc\u03bf\u03c3\u03af\u03b5\u03c5\u03c3\u03b5 \u03c4\u03bf\u03bd\u00a0\u03a0\u03b1\u03b3\u03ba\u03cc\u03c3\u03bc\u03b9\u03bf \u0394\u03b5\u03af\u03ba\u03c4\u03b7 \u0391\u03c0\u03b5\u03b9\u03bb\u03ce\u03bd\u00a0\u03b3\u03b9\u03b1 \u03c4\u03bf\u03bd \u0399\u03b1\u03bd\u03bf\u03c5\u03ac\u03c1\u03b9\u03bf \u03c4\u03bf\u03c5 2025, \u03bf \u03bf\u03c0\u03bf\u03af\u03bf\u03c2 \u03c5\u03c0\u03bf\u03b3\u03c1\u03b1\u03bc\u03bc\u03af\u03b6\u03b5\u03b9 \u03cc\u03c4\u03b9 \u03c4\u03bf FakeUpdates \u03b5\u03be\u03b1\u03ba\u03bf\u03bb\u03bf\u03c5\u03b8\u03b5\u03af \u03bd\u03b1 \u03b1\u03c0\u03bf\u03c4\u03b5\u03bb\u03b5\u03af\u00a0\u03c3\u03b7\u03bc\u03b1\u03bd\u03c4\u03b9\u03ba\u03ae \u03b1\u03c0\u03b5\u03b9\u03bb\u03ae\u00a0\u03c3\u03c4\u03bf \u03ba\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03c7\u03ce\u03c1\u03bf, \u03b4\u03b9\u03b1\u03b4\u03c1\u03b1\u03bc\u03b1\u03c4\u03af\u03b6\u03bf\u03bd\u03c4\u03b1\u03c2 \u03ba\u03b1\u03b8\u03bf\u03c1\u03b9\u03c3\u03c4\u03b9\u03ba\u03cc \u03c1\u03cc\u03bb\u03bf \u03c3\u03c4\u03b7 \u03b4\u03b9\u03b5\u03c5\u03ba\u03cc\u03bb\u03c5\u03bd\u03c3\u03b7 \u03b5\u03c0\u03b9\u03b8\u03ad\u03c3\u03b5\u03c9\u03bd ransomware. \u039c\u03b9\u03b1&#8230;<\/p>\n","protected":false},"author":12,"featured_media":17869,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[167],"tags":[],"class_list":["post-17868","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>\u039a\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03b1\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1: \u03a4\u03bf \u03c0\u03b9\u03bf \u03b4\u03b9\u03b1\u03b4\u03bf\u03bc\u03ad\u03bd\u03bf \u03ba\u03b1\u03ba\u03cc\u03b2\u03bf\u03c5\u03bb\u03bf \u03bb\u03bf\u03b3\u03b9\u03c3\u03bc\u03b9\u03ba\u03cc \u03b3\u03b9\u03b1 \u03c4\u03bf\u03bd \u0399\u03b1\u03bd\u03bf\u03c5\u03b1\u03c1\u03af\u03bf 2025 - Powersoft365<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/powersoft365.com\/el\/blog\/news\/kyvernoasfaleia-to-pio-diadomeno-kakovoulo-logismiko-gia-ton-ianouario-2025\/\" \/>\n<meta property=\"og:locale\" content=\"el_GR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u039a\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03b1\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1: \u03a4\u03bf \u03c0\u03b9\u03bf \u03b4\u03b9\u03b1\u03b4\u03bf\u03bc\u03ad\u03bd\u03bf \u03ba\u03b1\u03ba\u03cc\u03b2\u03bf\u03c5\u03bb\u03bf \u03bb\u03bf\u03b3\u03b9\u03c3\u03bc\u03b9\u03ba\u03cc \u03b3\u03b9\u03b1 \u03c4\u03bf\u03bd \u0399\u03b1\u03bd\u03bf\u03c5\u03b1\u03c1\u03af\u03bf 2025 - Powersoft365\" \/>\n<meta property=\"og:description\" content=\"\u03a4\u03bf FakeUpdates \u03c3\u03c5\u03bd\u03b5\u03c7\u03af\u03b6\u03b5\u03b9 \u03bd\u03b1 \u03b4\u03b9\u03b5\u03c5\u03ba\u03bf\u03bb\u03cd\u03bd\u03b5\u03b9 \u03c4\u03b9\u03c2 \u03b5\u03c0\u03b9\u03b8\u03ad\u03c3\u03b5\u03b9\u03c2 ransomware, \u03b5\u03bd\u03ce \u03bf\u03b9 \u03b5\u03b3\u03ba\u03bb\u03b7\u03bc\u03b1\u03c4\u03af\u03b5\u03c2 \u03c4\u03bf\u03c5 \u03ba\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03c7\u03ce\u03c1\u03bf\u03c5 \u03b5\u03bd\u03b9\u03c3\u03c7\u03cd\u03bf\u03c5\u03bd \u03c4\u03b9\u03c2 \u03b4\u03c5\u03bd\u03b1\u03c4\u03cc\u03c4\u03b7\u03c4\u03ad\u03c2 \u03c4\u03bf\u03c5\u03c2 \u03bc\u03b5 \u03c4\u03b5\u03c7\u03bd\u03b9\u03ba\u03ad\u03c2 \u03c0\u03bf\u03c5 \u03b2\u03b1\u03c3\u03af\u03b6\u03bf\u03bd\u03c4\u03b1\u03b9 \u03c3\u03c4\u03b7\u03bd \u03a4\u03b5\u03c7\u03bd\u03b7\u03c4\u03ae \u039d\u03bf\u03b7\u03bc\u03bf\u03c3\u03cd\u03bd\u03b7 \u0397 Check Point Software \u03b4\u03b7\u03bc\u03bf\u03c3\u03af\u03b5\u03c5\u03c3\u03b5 \u03c4\u03bf\u03bd\u00a0\u03a0\u03b1\u03b3\u03ba\u03cc\u03c3\u03bc\u03b9\u03bf \u0394\u03b5\u03af\u03ba\u03c4\u03b7 \u0391\u03c0\u03b5\u03b9\u03bb\u03ce\u03bd\u00a0\u03b3\u03b9\u03b1 \u03c4\u03bf\u03bd \u0399\u03b1\u03bd\u03bf\u03c5\u03ac\u03c1\u03b9\u03bf \u03c4\u03bf\u03c5 2025, \u03bf \u03bf\u03c0\u03bf\u03af\u03bf\u03c2 \u03c5\u03c0\u03bf\u03b3\u03c1\u03b1\u03bc\u03bc\u03af\u03b6\u03b5\u03b9 \u03cc\u03c4\u03b9 \u03c4\u03bf FakeUpdates \u03b5\u03be\u03b1\u03ba\u03bf\u03bb\u03bf\u03c5\u03b8\u03b5\u03af \u03bd\u03b1 \u03b1\u03c0\u03bf\u03c4\u03b5\u03bb\u03b5\u03af\u00a0\u03c3\u03b7\u03bc\u03b1\u03bd\u03c4\u03b9\u03ba\u03ae \u03b1\u03c0\u03b5\u03b9\u03bb\u03ae\u00a0\u03c3\u03c4\u03bf \u03ba\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03c7\u03ce\u03c1\u03bf, \u03b4\u03b9\u03b1\u03b4\u03c1\u03b1\u03bc\u03b1\u03c4\u03af\u03b6\u03bf\u03bd\u03c4\u03b1\u03c2 \u03ba\u03b1\u03b8\u03bf\u03c1\u03b9\u03c3\u03c4\u03b9\u03ba\u03cc \u03c1\u03cc\u03bb\u03bf \u03c3\u03c4\u03b7 \u03b4\u03b9\u03b5\u03c5\u03ba\u03cc\u03bb\u03c5\u03bd\u03c3\u03b7 \u03b5\u03c0\u03b9\u03b8\u03ad\u03c3\u03b5\u03c9\u03bd ransomware. \u039c\u03b9\u03b1...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/powersoft365.com\/el\/blog\/news\/kyvernoasfaleia-to-pio-diadomeno-kakovoulo-logismiko-gia-ton-ianouario-2025\/\" \/>\n<meta property=\"og:site_name\" content=\"Powersoft365\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-17T13:21:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-17T13:49:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/powersoft365.com\/wp-content\/uploads\/2025\/02\/cybersecurity.png\" \/>\n\t<meta property=\"og:image:width\" content=\"922\" \/>\n\t<meta property=\"og:image:height\" content=\"553\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Powersoft Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u03a3\u03c5\u03bd\u03c4\u03ac\u03c7\u03b8\u03b7\u03ba\u03b5 \u03b1\u03c0\u03cc\" \/>\n\t<meta name=\"twitter:data1\" content=\"Powersoft Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u0395\u03ba\u03c4\u03b9\u03bc\u03ce\u03bc\u03b5\u03bd\u03bf\u03c2 \u03c7\u03c1\u03cc\u03bd\u03bf\u03c2 \u03b1\u03bd\u03ac\u03b3\u03bd\u03c9\u03c3\u03b7\u03c2\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 \u03bb\u03b5\u03c0\u03c4\u03ac\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/powersoft365.com\/el\/blog\/news\/kyvernoasfaleia-to-pio-diadomeno-kakovoulo-logismiko-gia-ton-ianouario-2025\/\",\"url\":\"https:\/\/powersoft365.com\/el\/blog\/news\/kyvernoasfaleia-to-pio-diadomeno-kakovoulo-logismiko-gia-ton-ianouario-2025\/\",\"name\":\"\u039a\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03b1\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1: \u03a4\u03bf \u03c0\u03b9\u03bf \u03b4\u03b9\u03b1\u03b4\u03bf\u03bc\u03ad\u03bd\u03bf \u03ba\u03b1\u03ba\u03cc\u03b2\u03bf\u03c5\u03bb\u03bf \u03bb\u03bf\u03b3\u03b9\u03c3\u03bc\u03b9\u03ba\u03cc \u03b3\u03b9\u03b1 \u03c4\u03bf\u03bd \u0399\u03b1\u03bd\u03bf\u03c5\u03b1\u03c1\u03af\u03bf 2025 - Powersoft365\",\"isPartOf\":{\"@id\":\"https:\/\/powersoft365.com\/el\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/powersoft365.com\/el\/blog\/news\/kyvernoasfaleia-to-pio-diadomeno-kakovoulo-logismiko-gia-ton-ianouario-2025\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/powersoft365.com\/el\/blog\/news\/kyvernoasfaleia-to-pio-diadomeno-kakovoulo-logismiko-gia-ton-ianouario-2025\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/powersoft365.com\/wp-content\/uploads\/2025\/02\/cybersecurity.png\",\"datePublished\":\"2025-02-17T13:21:43+00:00\",\"dateModified\":\"2025-02-17T13:49:27+00:00\",\"author\":{\"@id\":\"https:\/\/powersoft365.com\/el\/#\/schema\/person\/dfeb31fa4a9dd075abb7cb5ad29e2c40\"},\"breadcrumb\":{\"@id\":\"https:\/\/powersoft365.com\/el\/blog\/news\/kyvernoasfaleia-to-pio-diadomeno-kakovoulo-logismiko-gia-ton-ianouario-2025\/#breadcrumb\"},\"inLanguage\":\"el\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/powersoft365.com\/el\/blog\/news\/kyvernoasfaleia-to-pio-diadomeno-kakovoulo-logismiko-gia-ton-ianouario-2025\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"el\",\"@id\":\"https:\/\/powersoft365.com\/el\/blog\/news\/kyvernoasfaleia-to-pio-diadomeno-kakovoulo-logismiko-gia-ton-ianouario-2025\/#primaryimage\",\"url\":\"https:\/\/powersoft365.com\/wp-content\/uploads\/2025\/02\/cybersecurity.png\",\"contentUrl\":\"https:\/\/powersoft365.com\/wp-content\/uploads\/2025\/02\/cybersecurity.png\",\"width\":922,\"height\":553},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/powersoft365.com\/el\/blog\/news\/kyvernoasfaleia-to-pio-diadomeno-kakovoulo-logismiko-gia-ton-ianouario-2025\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u0391\u03c1\u03c7\u03b9\u03ba\u03ae\",\"item\":\"https:\/\/powersoft365.com\/el\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u039a\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03b1\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1: \u03a4\u03bf \u03c0\u03b9\u03bf \u03b4\u03b9\u03b1\u03b4\u03bf\u03bc\u03ad\u03bd\u03bf \u03ba\u03b1\u03ba\u03cc\u03b2\u03bf\u03c5\u03bb\u03bf \u03bb\u03bf\u03b3\u03b9\u03c3\u03bc\u03b9\u03ba\u03cc \u03b3\u03b9\u03b1 \u03c4\u03bf\u03bd \u0399\u03b1\u03bd\u03bf\u03c5\u03b1\u03c1\u03af\u03bf 2025\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/powersoft365.com\/el\/#website\",\"url\":\"https:\/\/powersoft365.com\/el\/\",\"name\":\"Powersoft365\",\"description\":\"Accounting Software in Cyprus\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/powersoft365.com\/el\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"el\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/powersoft365.com\/el\/#\/schema\/person\/dfeb31fa4a9dd075abb7cb5ad29e2c40\",\"name\":\"Powersoft Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"el\",\"@id\":\"https:\/\/powersoft365.com\/el\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/900140f36b985bc338ed65e525b2a8a40a702b12ce85d19f87240cabd8304cb6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/900140f36b985bc338ed65e525b2a8a40a702b12ce85d19f87240cabd8304cb6?s=96&d=mm&r=g\",\"caption\":\"Powersoft Admin\"},\"url\":\"https:\/\/powersoft365.com\/el\/blog\/author\/powersoft-admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u039a\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03b1\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1: \u03a4\u03bf \u03c0\u03b9\u03bf \u03b4\u03b9\u03b1\u03b4\u03bf\u03bc\u03ad\u03bd\u03bf \u03ba\u03b1\u03ba\u03cc\u03b2\u03bf\u03c5\u03bb\u03bf \u03bb\u03bf\u03b3\u03b9\u03c3\u03bc\u03b9\u03ba\u03cc \u03b3\u03b9\u03b1 \u03c4\u03bf\u03bd \u0399\u03b1\u03bd\u03bf\u03c5\u03b1\u03c1\u03af\u03bf 2025 - Powersoft365","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/powersoft365.com\/el\/blog\/news\/kyvernoasfaleia-to-pio-diadomeno-kakovoulo-logismiko-gia-ton-ianouario-2025\/","og_locale":"el_GR","og_type":"article","og_title":"\u039a\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03b1\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1: \u03a4\u03bf \u03c0\u03b9\u03bf \u03b4\u03b9\u03b1\u03b4\u03bf\u03bc\u03ad\u03bd\u03bf \u03ba\u03b1\u03ba\u03cc\u03b2\u03bf\u03c5\u03bb\u03bf \u03bb\u03bf\u03b3\u03b9\u03c3\u03bc\u03b9\u03ba\u03cc \u03b3\u03b9\u03b1 \u03c4\u03bf\u03bd \u0399\u03b1\u03bd\u03bf\u03c5\u03b1\u03c1\u03af\u03bf 2025 - Powersoft365","og_description":"\u03a4\u03bf FakeUpdates \u03c3\u03c5\u03bd\u03b5\u03c7\u03af\u03b6\u03b5\u03b9 \u03bd\u03b1 \u03b4\u03b9\u03b5\u03c5\u03ba\u03bf\u03bb\u03cd\u03bd\u03b5\u03b9 \u03c4\u03b9\u03c2 \u03b5\u03c0\u03b9\u03b8\u03ad\u03c3\u03b5\u03b9\u03c2 ransomware, \u03b5\u03bd\u03ce \u03bf\u03b9 \u03b5\u03b3\u03ba\u03bb\u03b7\u03bc\u03b1\u03c4\u03af\u03b5\u03c2 \u03c4\u03bf\u03c5 \u03ba\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03c7\u03ce\u03c1\u03bf\u03c5 \u03b5\u03bd\u03b9\u03c3\u03c7\u03cd\u03bf\u03c5\u03bd \u03c4\u03b9\u03c2 \u03b4\u03c5\u03bd\u03b1\u03c4\u03cc\u03c4\u03b7\u03c4\u03ad\u03c2 \u03c4\u03bf\u03c5\u03c2 \u03bc\u03b5 \u03c4\u03b5\u03c7\u03bd\u03b9\u03ba\u03ad\u03c2 \u03c0\u03bf\u03c5 \u03b2\u03b1\u03c3\u03af\u03b6\u03bf\u03bd\u03c4\u03b1\u03b9 \u03c3\u03c4\u03b7\u03bd \u03a4\u03b5\u03c7\u03bd\u03b7\u03c4\u03ae \u039d\u03bf\u03b7\u03bc\u03bf\u03c3\u03cd\u03bd\u03b7 \u0397 Check Point Software \u03b4\u03b7\u03bc\u03bf\u03c3\u03af\u03b5\u03c5\u03c3\u03b5 \u03c4\u03bf\u03bd\u00a0\u03a0\u03b1\u03b3\u03ba\u03cc\u03c3\u03bc\u03b9\u03bf \u0394\u03b5\u03af\u03ba\u03c4\u03b7 \u0391\u03c0\u03b5\u03b9\u03bb\u03ce\u03bd\u00a0\u03b3\u03b9\u03b1 \u03c4\u03bf\u03bd \u0399\u03b1\u03bd\u03bf\u03c5\u03ac\u03c1\u03b9\u03bf \u03c4\u03bf\u03c5 2025, \u03bf \u03bf\u03c0\u03bf\u03af\u03bf\u03c2 \u03c5\u03c0\u03bf\u03b3\u03c1\u03b1\u03bc\u03bc\u03af\u03b6\u03b5\u03b9 \u03cc\u03c4\u03b9 \u03c4\u03bf FakeUpdates \u03b5\u03be\u03b1\u03ba\u03bf\u03bb\u03bf\u03c5\u03b8\u03b5\u03af \u03bd\u03b1 \u03b1\u03c0\u03bf\u03c4\u03b5\u03bb\u03b5\u03af\u00a0\u03c3\u03b7\u03bc\u03b1\u03bd\u03c4\u03b9\u03ba\u03ae \u03b1\u03c0\u03b5\u03b9\u03bb\u03ae\u00a0\u03c3\u03c4\u03bf \u03ba\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03c7\u03ce\u03c1\u03bf, \u03b4\u03b9\u03b1\u03b4\u03c1\u03b1\u03bc\u03b1\u03c4\u03af\u03b6\u03bf\u03bd\u03c4\u03b1\u03c2 \u03ba\u03b1\u03b8\u03bf\u03c1\u03b9\u03c3\u03c4\u03b9\u03ba\u03cc \u03c1\u03cc\u03bb\u03bf \u03c3\u03c4\u03b7 \u03b4\u03b9\u03b5\u03c5\u03ba\u03cc\u03bb\u03c5\u03bd\u03c3\u03b7 \u03b5\u03c0\u03b9\u03b8\u03ad\u03c3\u03b5\u03c9\u03bd ransomware. \u039c\u03b9\u03b1...","og_url":"https:\/\/powersoft365.com\/el\/blog\/news\/kyvernoasfaleia-to-pio-diadomeno-kakovoulo-logismiko-gia-ton-ianouario-2025\/","og_site_name":"Powersoft365","article_published_time":"2025-02-17T13:21:43+00:00","article_modified_time":"2025-02-17T13:49:27+00:00","og_image":[{"width":922,"height":553,"url":"https:\/\/powersoft365.com\/wp-content\/uploads\/2025\/02\/cybersecurity.png","type":"image\/png"}],"author":"Powersoft Admin","twitter_card":"summary_large_image","twitter_misc":{"\u03a3\u03c5\u03bd\u03c4\u03ac\u03c7\u03b8\u03b7\u03ba\u03b5 \u03b1\u03c0\u03cc":"Powersoft Admin","\u0395\u03ba\u03c4\u03b9\u03bc\u03ce\u03bc\u03b5\u03bd\u03bf\u03c2 \u03c7\u03c1\u03cc\u03bd\u03bf\u03c2 \u03b1\u03bd\u03ac\u03b3\u03bd\u03c9\u03c3\u03b7\u03c2":"4 \u03bb\u03b5\u03c0\u03c4\u03ac"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/powersoft365.com\/el\/blog\/news\/kyvernoasfaleia-to-pio-diadomeno-kakovoulo-logismiko-gia-ton-ianouario-2025\/","url":"https:\/\/powersoft365.com\/el\/blog\/news\/kyvernoasfaleia-to-pio-diadomeno-kakovoulo-logismiko-gia-ton-ianouario-2025\/","name":"\u039a\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03b1\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1: \u03a4\u03bf \u03c0\u03b9\u03bf \u03b4\u03b9\u03b1\u03b4\u03bf\u03bc\u03ad\u03bd\u03bf \u03ba\u03b1\u03ba\u03cc\u03b2\u03bf\u03c5\u03bb\u03bf \u03bb\u03bf\u03b3\u03b9\u03c3\u03bc\u03b9\u03ba\u03cc \u03b3\u03b9\u03b1 \u03c4\u03bf\u03bd \u0399\u03b1\u03bd\u03bf\u03c5\u03b1\u03c1\u03af\u03bf 2025 - Powersoft365","isPartOf":{"@id":"https:\/\/powersoft365.com\/el\/#website"},"primaryImageOfPage":{"@id":"https:\/\/powersoft365.com\/el\/blog\/news\/kyvernoasfaleia-to-pio-diadomeno-kakovoulo-logismiko-gia-ton-ianouario-2025\/#primaryimage"},"image":{"@id":"https:\/\/powersoft365.com\/el\/blog\/news\/kyvernoasfaleia-to-pio-diadomeno-kakovoulo-logismiko-gia-ton-ianouario-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/powersoft365.com\/wp-content\/uploads\/2025\/02\/cybersecurity.png","datePublished":"2025-02-17T13:21:43+00:00","dateModified":"2025-02-17T13:49:27+00:00","author":{"@id":"https:\/\/powersoft365.com\/el\/#\/schema\/person\/dfeb31fa4a9dd075abb7cb5ad29e2c40"},"breadcrumb":{"@id":"https:\/\/powersoft365.com\/el\/blog\/news\/kyvernoasfaleia-to-pio-diadomeno-kakovoulo-logismiko-gia-ton-ianouario-2025\/#breadcrumb"},"inLanguage":"el","potentialAction":[{"@type":"ReadAction","target":["https:\/\/powersoft365.com\/el\/blog\/news\/kyvernoasfaleia-to-pio-diadomeno-kakovoulo-logismiko-gia-ton-ianouario-2025\/"]}]},{"@type":"ImageObject","inLanguage":"el","@id":"https:\/\/powersoft365.com\/el\/blog\/news\/kyvernoasfaleia-to-pio-diadomeno-kakovoulo-logismiko-gia-ton-ianouario-2025\/#primaryimage","url":"https:\/\/powersoft365.com\/wp-content\/uploads\/2025\/02\/cybersecurity.png","contentUrl":"https:\/\/powersoft365.com\/wp-content\/uploads\/2025\/02\/cybersecurity.png","width":922,"height":553},{"@type":"BreadcrumbList","@id":"https:\/\/powersoft365.com\/el\/blog\/news\/kyvernoasfaleia-to-pio-diadomeno-kakovoulo-logismiko-gia-ton-ianouario-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u0391\u03c1\u03c7\u03b9\u03ba\u03ae","item":"https:\/\/powersoft365.com\/el\/"},{"@type":"ListItem","position":2,"name":"\u039a\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03b1\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1: \u03a4\u03bf \u03c0\u03b9\u03bf \u03b4\u03b9\u03b1\u03b4\u03bf\u03bc\u03ad\u03bd\u03bf \u03ba\u03b1\u03ba\u03cc\u03b2\u03bf\u03c5\u03bb\u03bf \u03bb\u03bf\u03b3\u03b9\u03c3\u03bc\u03b9\u03ba\u03cc \u03b3\u03b9\u03b1 \u03c4\u03bf\u03bd \u0399\u03b1\u03bd\u03bf\u03c5\u03b1\u03c1\u03af\u03bf 2025"}]},{"@type":"WebSite","@id":"https:\/\/powersoft365.com\/el\/#website","url":"https:\/\/powersoft365.com\/el\/","name":"Powersoft365","description":"Accounting Software in Cyprus","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/powersoft365.com\/el\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"el"},{"@type":"Person","@id":"https:\/\/powersoft365.com\/el\/#\/schema\/person\/dfeb31fa4a9dd075abb7cb5ad29e2c40","name":"Powersoft Admin","image":{"@type":"ImageObject","inLanguage":"el","@id":"https:\/\/powersoft365.com\/el\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/900140f36b985bc338ed65e525b2a8a40a702b12ce85d19f87240cabd8304cb6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/900140f36b985bc338ed65e525b2a8a40a702b12ce85d19f87240cabd8304cb6?s=96&d=mm&r=g","caption":"Powersoft Admin"},"url":"https:\/\/powersoft365.com\/el\/blog\/author\/powersoft-admin\/"}]}},"_links":{"self":[{"href":"https:\/\/powersoft365.com\/el\/wp-json\/wp\/v2\/posts\/17868","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/powersoft365.com\/el\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/powersoft365.com\/el\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/powersoft365.com\/el\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/powersoft365.com\/el\/wp-json\/wp\/v2\/comments?post=17868"}],"version-history":[{"count":0,"href":"https:\/\/powersoft365.com\/el\/wp-json\/wp\/v2\/posts\/17868\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/powersoft365.com\/el\/wp-json\/wp\/v2\/media\/17869"}],"wp:attachment":[{"href":"https:\/\/powersoft365.com\/el\/wp-json\/wp\/v2\/media?parent=17868"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/powersoft365.com\/el\/wp-json\/wp\/v2\/categories?post=17868"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/powersoft365.com\/el\/wp-json\/wp\/v2\/tags?post=17868"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}