<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>HTB Blog > All Content</title>
        <link>https://www.hackthebox.gr/rss/blog/all</link>
        <description>All the latest news and insights about cybersecurity from Hack The Box. Hacking trends, insights, interviews, stories, and much more</description>
        <language>en</language>
        <atom:link href="https://www.hackthebox.gr/rss/blog/all" rel="self" type="application/rss+xml" />
        <image>
            <url>
                https://www.hackthebox.gr/images/landingv3/logo-htb-blog.svg
            </url>
            <title>HTB Blog > All Content</title>
            <link>https://www.hackthebox.gr/rss/blog/all</link>
        </image>
                    <item>
                <title>Inside Hack The Box’s contribution to Locked Shields 2026</title>
                <link>https://www.hackthebox.gr/blog/hack-the-box-locked-shields-2026</link>
                <description></description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/HzkMV2UW2nVSU7CB1RaSKB1PEsQNYNaC.webp" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Tue, 05 May 2026 14:43:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/hack-the-box-locked-shields-2026</guid>
            </item>
                    <item>
                <title>The Notebook You Trust Could Be Reading Your Secrets</title>
                <link>https://www.hackthebox.gr/blog/path-traversal-vulnerabilities-in-jupyter-nbconvert</link>
                <description>Think Jupyter notebooks are safe? This breakdown reveals how nbconvert path traversal flaws allow file reads and writes without ever executing a single cell.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/cgr1GeCqQHtyRNdOoT84eek4NtYnyBa8.webp" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Tue, 28 Apr 2026 14:23:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/path-traversal-vulnerabilities-in-jupyter-nbconvert</guid>
            </item>
                    <item>
                <title>The automation paradox: A new era of systemic risk</title>
                <link>https://www.hackthebox.gr/blog/the-automation-paradox</link>
                <description>The structural integrity of global authentication is facing a new form of pressure.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/emyzHlqTgF1xW6iDPpO0kHTkELU3Viom.webp" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Fri, 24 Apr 2026 13:59:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/the-automation-paradox</guid>
            </item>
                    <item>
                <title>Semperis names Hack The Box to its Action Partner network for Midnight in the War Room to amplify global cyber resilience efforts</title>
                <link>https://www.hackthebox.gr/blog/semperis-names-htb-action-partner</link>
                <description></description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/UU9YPjmHl6CQwT0mcootCwI5zpsyXOeB.webp" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Tue, 21 Apr 2026 09:25:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/semperis-names-htb-action-partner</guid>
            </item>
                    <item>
                <title>Make every step count with HTB XP: Our new unified progression system</title>
                <link>https://www.hackthebox.gr/blog/XP-Points</link>
                <description>Are you ready to get some XP? Check out this blog and learn how your lifetime efforts on HTB will be ranked!</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/Kl5tN8nAbKZVfOIwwfgaQ6bMk6CQYCyk.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Mon, 20 Apr 2026 12:20:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/XP-Points</guid>
            </item>
                    <item>
                <title>Hack The Box wins 2026 industry awards as it builds the future of cyber readiness</title>
                <link>https://www.hackthebox.gr/blog/htb-wins-2026-industry-awards</link>
                <description></description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/pRggg6zuoHMepDzCjsyM75TrwMiTh9SS.webp" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Thu, 16 Apr 2026 11:10:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/htb-wins-2026-industry-awards</guid>
            </item>
                    <item>
                <title>Be the human element in AI hacking with HTB COAE</title>
                <link>https://www.hackthebox.gr/blog/HTB-COAE-Announcement</link>
                <description>Join us for the launch of the HTB Certified Offensive AI Expert (HTB COAE). The future includes hackers who know how to attack AI.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/aLSycmLL4RHilXtNA1YPjEMR1xyjmS7K.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Thu, 02 Apr 2026 12:11:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/HTB-COAE-Announcement</guid>
            </item>
                    <item>
                <title>War Room: CVE-2026-27944 &amp; CVE-2026-3888</title>
                <link>https://www.hackthebox.gr/blog/CVE-2026-27944-CVE-2026-3888</link>
                <description>Learn all about CVE-2026-27944 and CVE-2026-3888, two high-impact vulnerabilities affecting Nginx-UI and snapd, enabling unauthenticated data exposure and local privilege escalation.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/nZElbTJEmzGTOUYYB3xsYXogXN3PtFSn.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Mon, 23 Mar 2026 13:27:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/CVE-2026-27944-CVE-2026-3888</guid>
            </item>
                    <item>
                <title>Hack The Box named a Leader in Independent Cybersecurity Skills and Training Platform Evaluation</title>
                <link>https://www.hackthebox.gr/blog/hack-the-box-named-leader-forrester-wave-cybersecurity-training-platforms-2026</link>
                <description>Cybersecurity upskilling innovator receives highest possible scores in 13 criteria, including Agentic AI readiness, gamification, competition and recognition, accessibility, and community</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/fBbYydOze7gWgVf5oocN2uIbwzGENA7S.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Wed, 11 Mar 2026 14:03:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/hack-the-box-named-leader-forrester-wave-cybersecurity-training-platforms-2026</guid>
            </item>
                    <item>
                <title>Hack The Box: A Leader in The Forrester Wave for Cybersecurity Skills and Training Platforms</title>
                <link>https://www.hackthebox.gr/blog/hack-the-box-forrester-cybersecurity-training-leader-2026</link>
                <description>Hack The Box has been named a Leader in The Forrester Wave: Cybersecurity Skills and Training Platforms. Again.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/TZKxnBYcJIRc8PKONj8gJDLSYLLRItzw.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Wed, 11 Mar 2026 14:00:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/hack-the-box-forrester-cybersecurity-training-leader-2026</guid>
            </item>
                    <item>
                <title>Stop hiring like it&#039;s 2025: AI-augmented cybersecurity performance data every CISO needs</title>
                <link>https://www.hackthebox.gr/blog/ai-vs-human-cybersecurity-benchmark</link>
                <description>Why Hack The Box’s largest AI vs. human Capture The Flag (CTF) study matters for CISOs and business leaders, and how to act now</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/gXMKX6z3HB26u51mR2OIhOuu1W1Vxjcd.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Thu, 05 Mar 2026 10:00:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/ai-vs-human-cybersecurity-benchmark</guid>
            </item>
                    <item>
                <title>Hack The Box benchmark report finds AI boosts cybersecurity productivity 3-4x for AI-augmented elite teams, but cautions on a talent pipeline risk</title>
                <link>https://www.hackthebox.gr/blog/hack-the-box-ai-cybersecurity-benchmark-report</link>
                <description>Largest AI vs. human CTF study reveals significant speed gains for elite teams, exposes inflection points for junior and mid-tier talent, and underscores the need for an AI-fluent workforce</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/gXMKX6z3HB26u51mR2OIhOuu1W1Vxjcd.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Thu, 05 Mar 2026 10:00:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/hack-the-box-ai-cybersecurity-benchmark-report</guid>
            </item>
                    <item>
                <title>Hack The Box and C3SA partner to strengthen cyber resilience across Canada</title>
                <link>https://www.hackthebox.gr/blog/htb-c3sa-partnership</link>
                <description>Partnership aims to advance Canada’s cybersecurity mission through continuous readiness, hands-on workforce development, and operational resilience.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/FffuOSHKEfuZ1KDe447a6GYMlWMV9ghR.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Mon, 02 Mar 2026 13:00:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/htb-c3sa-partnership</guid>
            </item>
                    <item>
                <title>Offensive AI security: How to hack the models before you get hacked</title>
                <link>https://www.hackthebox.gr/blog/offensive-ai-security-ctf-llm-prompt-injection-ml-backdoors</link>
                <description>Learn how offensive AI security exposes LLM, agent, and ML vulnerabilities—from prompt injection to model backdoors—and how CTF training helps teams secure before the attackers exploit them.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/MbSexFQPbeSavnvMPyU8xA322DnIliFJ.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Tue, 17 Feb 2026 10:00:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/offensive-ai-security-ctf-llm-prompt-injection-ml-backdoors</guid>
            </item>
                    <item>
                <title>Meet the HTB Profile: all your skills, in one place</title>
                <link>https://www.hackthebox.gr/blog/introducing-htb-profile</link>
                <description>The HTB Profile is now live, bringing your skills, progress, and achievements into one clean view. Show the world where you stand and what you’ve mastered.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/pGjlaysy1EToeeuW2FTr2G4RGG8caHre.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Thu, 12 Feb 2026 06:24:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/introducing-htb-profile</guid>
            </item>
                    <item>
                <title>Benchmarking LLMs for cybersecurity: Inside HTB AI Range’s first evaluation</title>
                <link>https://www.hackthebox.gr/blog/ai-range-llm-security-benchmark</link>
                <description>Discover how Hack The Box AI Range benchmarks LLMs in realistic cyber scenarios. Explore the methodology, key findings, and why it sets a new standard for AI security performance.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/18OiTQGyf8gxqp1WTSOpkxupxrRoovQC.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Thu, 12 Feb 2026 04:03:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/ai-range-llm-security-benchmark</guid>
            </item>
                    <item>
                <title>Enterprise Wi-Fi: The most trusted attack surface you’re NOT testing (and how to fix that)</title>
                <link>https://www.hackthebox.gr/blog/enterprise-wifi-pentesting-risk-cwpe</link>
                <description>Enterprise Wi-Fi is a high-risk but under-tested attack surface. Learn how modern wireless attacks work and how HTB CWPE builds real-world Wi-Fi pentesting skills.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/6ryCkxYwto6DzQgcJeVtdSb3l19F8hmu.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Tue, 10 Feb 2026 11:35:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/enterprise-wifi-pentesting-risk-cwpe</guid>
            </item>
                    <item>
                <title>Continuous AI evaluations: Why every sector needs to test and trust AI models</title>
                <link>https://www.hackthebox.gr/blog/ai-range-use-cases</link>
                <description>AI model evaluation is now essential for secure AI in cybersecurity. See how teams use HTB AI Range to test, validate safety, and harden models against evolving threats.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/VQfqLsW9BE9PxpfJQcSF7xQKnkYNVy2O.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Tue, 10 Feb 2026 02:48:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/ai-range-use-cases</guid>
            </item>
                    <item>
                <title>How AI is changing cybersecurity: 8 takeaways from our expert webinar</title>
                <link>https://www.hackthebox.gr/blog/ai-security-key-takeaways-webinar-cybersecurity</link>
                <description>AI security in 2026 is redefining cybersecurity. Discover 8 key takeaways from our expert webinar on AI-driven threats, autonomous systems, and how security teams must adapt.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/vCnaItAqdZzWbrNQCEYNksmkz9oMS2eI.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Mon, 09 Feb 2026 11:15:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/ai-security-key-takeaways-webinar-cybersecurity</guid>
            </item>
                    <item>
                <title>Detecting and investigating Command-and-Control (C2) Communication: A quick guide for security teams</title>
                <link>https://www.hackthebox.gr/blog/detecting-investigating-c2-communication</link>
                <description>Learn how to detect and investigate command-and-control (C2) communication using log analysis, network traffic monitoring, EDR, and threat intelligence.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/qRdoVfNvAr4Pr8xNx0pSoxViWNrqSrBi.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Thu, 05 Feb 2026 14:18:42 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/detecting-investigating-c2-communication</guid>
            </item>
                    <item>
                <title>Netpoleon and Hack The Box partner to strengthen cybersecurity skills across Australia and New Zealand</title>
                <link>https://www.hackthebox.gr/blog/netpoleon-hack-the-box-partnership-anz-cybersecurity-skills</link>
                <description>Netpoleon partners with Hack The Box to bring hands-on, AI-driven cybersecurity training to Australia and New Zealand, helping organisations build real-world cyber skills.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/Et2OqrtHajxFTIJOy5VvGKN0ITYOGrxz.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Tue, 03 Feb 2026 08:05:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/netpoleon-hack-the-box-partnership-anz-cybersecurity-skills</guid>
            </item>
                    <item>
                <title>NetworkMiner on Linux: Where traditional packet analysis still fits in modern incident response</title>
                <link>https://www.hackthebox.gr/blog/networkminer-linux-packet-analysis-incident-response</link>
                <description>NetworkMiner remains a practical network forensics tool for Linux-based incident response. Learn where packet analysis still delivers value in modern security operations.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/fLHc9xGCSqra11Iw0xpsV55znWGey0iK.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Mon, 02 Feb 2026 12:05:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/networkminer-linux-packet-analysis-incident-response</guid>
            </item>
                    <item>
                <title>Federal judiciary cyber breach: How SolarWinds and Legacy Systems left US courts exposed</title>
                <link>https://www.hackthebox.gr/blog/us-federal-judiciary-cyberattacks-solarwinds-pacer</link>
                <description>A technical breakdown of the 2020 and 2025 cyberattacks on US federal judiciary systems, including SolarWinds, PACER vulnerabilities, and key defensive lessons.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/QniNTyrJyxqVYSS7s2DMlldQ7mxgvIwr.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Fri, 30 Jan 2026 13:57:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/us-federal-judiciary-cyberattacks-solarwinds-pacer</guid>
            </item>
                    <item>
                <title>Bring your attack surface to the air with the HTB Certified Wi-Fi Pentesting Expert (HTB CWPE)</title>
                <link>https://www.hackthebox.gr/blog/HTB-CWPE-announcement-blog</link>
                <description>Crack open the HTB CWPE&#039;s network exam and add Wi-Fi pentesting skills to your arsenal of corporate level attacks</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/a5GGtyxLlkkVJ4Apy7Ccj4dBIH5pmQGs.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Thu, 29 Jan 2026 09:58:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/HTB-CWPE-announcement-blog</guid>
            </item>
                    <item>
                <title>Beyond demos: How can enterprises evaluate AI SOC capabilities?</title>
                <link>https://www.hackthebox.gr/blog/evaluate-ai-soc-agents-htb-ai-range</link>
                <description>AI SOC agents are transforming security operations. Learn how to evaluate their real impact, and how Hack The Box AI Range helps benchmark their performance.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/U787pWwv6W08D5Ippg17on0wnX5gLJln.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Thu, 29 Jan 2026 02:25:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/evaluate-ai-soc-agents-htb-ai-range</guid>
            </item>
                    <item>
                <title>Ni8mare fuel: Chaining n8n CVEs for full compromise in automated workflows</title>
                <link>https://www.hackthebox.gr/blog/n8n-ni8mare-cve-2026-21858-cve-2025-68613</link>
                <description>Dive into Ni8mare (CVE-2026-21858) and CVE-2025-68613—two critical n8n bugs that chain into unauthenticated RCE. See the exploit in action and practice on our new BloodFlow machine.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/BQThGNZAXky2b7XCNCJvPERAFHKs87uR.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Wed, 28 Jan 2026 16:08:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/n8n-ni8mare-cve-2026-21858-cve-2025-68613</guid>
            </item>
                    <item>
                <title>The reality of cybersecurity careers: Benefits, challenges, career paths</title>
                <link>https://www.hackthebox.gr/blog/cybersecurity-careers-pros-cons-salaries</link>
                <description>Explore the real pros and cons of cybersecurity careers in 2025, including salaries, job security, career paths, and workplace realities.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/oGs8hCk1oXBwmnNugMSRd5dw4132Tghh.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Tue, 27 Jan 2026 11:11:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/cybersecurity-careers-pros-cons-salaries</guid>
            </item>
                    <item>
                <title>A global community of hackers battle it out for a top spot in Season 10: Underground</title>
                <link>https://www.hackthebox.gr/blog/HTB-Season-10-Underground</link>
                <description>Our 10th Seasonal competition focuses on you! Underground is a celebration of hackers that make each Season shine.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/uDEZZAJrQXztpYnK5RDstgbtPHhwwgB7.webp" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Fri, 23 Jan 2026 18:24:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/HTB-Season-10-Underground</guid>
            </item>
                    <item>
                <title>How to learn hacking: The (step-by-step) beginner&#039;s bible for 2026</title>
                <link>https://www.hackthebox.gr/blog/learn-to-hack-beginners-bible</link>
                <description>The truth behind learning the wonderful wizardry of hacking. Here&#039;s what it takes to learn hacking from scratch and the necessary steps to get started!</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/xiVI1tfThbk6min6LJesRzDNvF2ofKFN.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Mon, 19 Jan 2026 02:23:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/learn-to-hack-beginners-bible</guid>
            </item>
                    <item>
                <title>Hack The Box appointed to deliver mission-aligned cyber readiness training to the FBI</title>
                <link>https://www.hackthebox.gr/blog/hack-the-box-supports-fbi-cyber-training-idiq-with-solutions3</link>
                <description>Hands-on, threat-realistic cyber labs will support operational readiness across structured FBI learning pathways, in partnership with Solutions³ LLC.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/rf7f6yqW1HpQXhNh5CViUvmDJEgynymP.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Wed, 14 Jan 2026 17:08:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/hack-the-box-supports-fbi-cyber-training-idiq-with-solutions3</guid>
            </item>
                    <item>
                <title>Inclusivity, opportunity, impact: CodeFest 2025 powered by NAB + HTB</title>
                <link>https://www.hackthebox.gr/blog/codefest-ctf-2025-htb-nab</link>
                <description>Discover how NAB and Hack The Box brought CodeFest 2025 to life with an inclusive, hands-on CTF that’s shaping Australia’s next generation of cybersecurity talent.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/KnnfJDoZWg3tElpo5c4Z2AjD0yniRvbm.png" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Wed, 14 Jan 2026 11:28:10 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/codefest-ctf-2025-htb-nab</guid>
            </item>
                    <item>
                <title>Dedispawn for all! The future of HTB Labs is a smoother hacking experience and more content releases</title>
                <link>https://www.hackthebox.gr/blog/quality-hacking-labs-experience-with-dedispawn</link>
                <description>Discover how our dedicated Machine instances will deliver a much smoother hacking experience on HTB Labs.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/URH4oqFuIy2z0I8Ytgchv6PC8uCKb43A.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Tue, 13 Jan 2026 08:30:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/quality-hacking-labs-experience-with-dedispawn</guid>
            </item>
                    <item>
                <title>More than badges: What Hack The Box’s G2 Winter 2026 leadership says about real-world cyber skills</title>
                <link>https://www.hackthebox.gr/blog/g2-winter-2026-badges-cybersecurity-skills-leadership</link>
                <description>HTB wins nine G2 Winter 2026 badges, recognizing leadership in cybersecurity training, technical skills development, and global workforce upskilling based on real customer reviews.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/fXfOnZTWIyH9eoufJpHj94NjeMvLWm5a.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Mon, 12 Jan 2026 12:37:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/g2-winter-2026-badges-cybersecurity-skills-leadership</guid>
            </item>
                    <item>
                <title>War Room: CVE-2025-14847—Mongobleed explained</title>
                <link>https://www.hackthebox.gr/blog/war-room-mongobleed-cve-2025-14847-mongodb-memory-leak-vulnerability</link>
                <description>Learn all about CVE-2025-14847, the High Vulnerability MongoDB memory leak vulnerability allowing unauthenticated memory disclosure.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/UHhmu7zgdw3iTiU7R2u3QJCXQ06b4SPp.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Wed, 07 Jan 2026 12:30:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/war-room-mongobleed-cve-2025-14847-mongodb-memory-leak-vulnerability</guid>
            </item>
                    <item>
                <title>Cybersecurity blue team jobs in 2026: Roles, salaries, skills, and where to start</title>
                <link>https://www.hackthebox.gr/blog/cybersecurity-blue-team-jobs-roles-salaries-skills</link>
                <description>Explore top blue team cybersecurity jobs in 2026, including SOC, IR, threat intel, and security engineering roles. Learn skills, career paths, and salaries.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/PV9yXUvxb8eOJje4JgXLsKQzORklK3fZ.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Fri, 02 Jan 2026 18:47:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/cybersecurity-blue-team-jobs-roles-salaries-skills</guid>
            </item>
                    <item>
                <title>Adversarial AI meets its match: The complete AI Red Teamer Path from HTB and Google</title>
                <link>https://www.hackthebox.gr/blog/ai-red-teamer-path-complete-offense-defense-privacy</link>
                <description>Our AI Red Teamer Path is complete, with hands-on AI Defense and AI Privacy modules, helping security teams harden models, prevent data leakage, and stay ahead of emerging AI threats.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/52wfWIGisXcjSjpJEOCG9UTQVqBp9WTg.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Tue, 23 Dec 2025 04:17:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/ai-red-teamer-path-complete-offense-defense-privacy</guid>
            </item>
                    <item>
                <title>Meet Windows Pwnbox: Same browser. Bigger playground. Better training.</title>
                <link>https://www.hackthebox.gr/blog/windows-pwnbox-enterprise-cyber-training</link>
                <description>Launch Windows Pwnbox for enterprise teams. Train blue and red teams in native Windows and Linux environments, fully in-browser, with no setup or infrastructure overhead.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/4ioYPTVnGziiauxEAsqJAMGxPkhIiyZv.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Tue, 23 Dec 2025 03:13:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/windows-pwnbox-enterprise-cyber-training</guid>
            </item>
                    <item>
                <title>Your SOC vs. Reality: Why attackers are winning (and how Threat Range levels the battlefield)</title>
                <link>https://www.hackthebox.gr/blog/threat-range-scenario-soc-readiness-ctem</link>
                <description>Sharpen SOC and DFIR readiness with Threat Range. See how real attacker tradecraft, CTEM alignment, and measurable performance metrics prepare teams for today’s breaches.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/pYeON28GVB7h4HgGo6g00ZdiTYy8eWLC.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Fri, 19 Dec 2025 14:21:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/threat-range-scenario-soc-readiness-ctem</guid>
            </item>
                    <item>
                <title>Eek, a GodRAT: A step-by-step breakdown of a financial sector attack</title>
                <link>https://www.hackthebox.gr/blog/godrat-financial-sector-attack-analysis</link>
                <description>A deep dive into GodRAT’s financial sector intrusion, mapping its attack chain, steganographic loaders, and RAT techniques to MITRE ATT&amp;CK and real-world defenses.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/cgN7irlBrLBnp5NStJXuPsOGr7cd0J6O.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Thu, 18 Dec 2025 17:00:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/godrat-financial-sector-attack-analysis</guid>
            </item>
                    <item>
                <title>How to turn exposure data into real-world cyber readiness: 7 key takeaways from our webinar</title>
                <link>https://www.hackthebox.gr/blog/turn-exposure-data-into-cyber-readiness-7-key-takeaways-threat-range</link>
                <description>Discover 7 key takeaways from our webinar on turning exposure data into real-world cyber readiness with Threat Range, our team-based simulation platform.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/2PCEYf4K03TjY9GEti13v6aicZsoZq1I.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Wed, 17 Dec 2025 12:01:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/turn-exposure-data-into-cyber-readiness-7-key-takeaways-threat-range</guid>
            </item>
                    <item>
                <title>HTB CPTS gains FedRAMP authorized provider status</title>
                <link>https://www.hackthebox.gr/blog/penetration-tester-fedramp</link>
                <description>HTB continues to gain traction as a go-to certification for cybersecurity professionals working in or with the U.S. government.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/lmxIVn8IKS8ghVPUU8KJYV48zSQ3YQIU.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Thu, 11 Dec 2025 05:02:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/penetration-tester-fedramp</guid>
            </item>
                    <item>
                <title>S.OLIVER GROUP accelerates cybersecurity decision-making by 30% with HTB</title>
                <link>https://www.hackthebox.gr/blog/s-oliver</link>
                <description>Learn how S.OLIVER GROUP identifies issues faster, interprets technical signals more confidently, and makes clearer, more targeted decisions during security-critical moments.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/VokfoFXvcvv2qGitvQauhKguRDQMnUbM.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Thu, 11 Dec 2025 02:16:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/s-oliver</guid>
            </item>
                    <item>
                <title>CVE-2025-55182—The React2Shell vulnerability you need to patch right now</title>
                <link>https://www.hackthebox.gr/blog/react2shell-cve-2025-55182-threat-spotlight</link>
                <description>A deep dive into React2Shell (CVE-2025-55182), the critical remote code execution vulnerability affecting React Server Components and Next.js.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/5E1tQpSQiUUhfIJ7dv0LNBJSySp38A7n.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Wed, 10 Dec 2025 12:01:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/react2shell-cve-2025-55182-threat-spotlight</guid>
            </item>
                    <item>
                <title>How to operationalize the OWASP LLM top 10 and (actually) secure GenAI apps</title>
                <link>https://www.hackthebox.gr/blog/operationalizing-owasp-llm-top-10-llm-security-controls</link>
                <description>Deploying LLMs without chaos means treating the OWASP LLM Top 10 like an engineering spec. Learn how to turn each risk into real controls, harden pipelines, and secure GenAI apps.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/ziAxZtWxBxgDjBJklq3Qv5XQYEWT5Ovx.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Tue, 09 Dec 2025 16:21:46 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/operationalizing-owasp-llm-top-10-llm-security-controls</guid>
            </item>
                    <item>
                <title>Blue team resilience: The skills, simulations, and reporting SOCs actually want</title>
                <link>https://www.hackthebox.gr/blog/blue-team-readiness-skills-soc-simulations</link>
                <description>Explore emerging blue team needs shaping enterprise security, including continuous readiness, real SOC simulations, improved defensive skills training, and modern performance measurement.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/Uxe0MYzwWbQf8cz0jSZqROt6qc8AbCnd.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Tue, 09 Dec 2025 09:36:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/blue-team-readiness-skills-soc-simulations</guid>
            </item>
                    <item>
                <title>What is Zero Trust? A guide to the cybersecurity framework everyone’s talking about</title>
                <link>https://www.hackthebox.gr/blog/what-is-zero-trust-security</link>
                <description>Learn what Zero Trust really means, the challenges of implementation, key success metrics, and how cyber teams can train for Zero Trust using hands-on labs from Hack The Box.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/p6JqHOPcxeDmFrMC8S0Th7rdrmXTsBp9.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Thu, 04 Dec 2025 10:13:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/what-is-zero-trust-security</guid>
            </item>
                    <item>
                <title>Benchmarking AI security: Inside the new HTB AI Range</title>
                <link>https://www.hackthebox.gr/blog/ai-range-and-model-evaluations</link>
                <description>Continuous, real-world evaluation of autonomous cyber AI agents – benchmarked via live adversarial simulations, governed for enterprise compliance, and measured on the latest threats.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/pEtcbXIwC1ZpCVPASFkWl1p9uL3gOJz3.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Thu, 04 Dec 2025 04:16:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/ai-range-and-model-evaluations</guid>
            </item>
                    <item>
                <title>Hack The Box launches the world’s first AI cyber range to benchmark AI agents and accelerate human-AI teaming across offensive and defensive cyber operations</title>
                <link>https://www.hackthebox.gr/blog/htb-ai-range-launch</link>
                <description>Hack The Box launches HTB AI Range, the first controlled AI cyber range for testing and benchmarking autonomous security agents and hybrid human-machine defense.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/IqChpdkvt6thIF4LRYEAunQLCoQcxpfj.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Wed, 03 Dec 2025 10:00:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/htb-ai-range-launch</guid>
            </item>
                    <item>
                <title>Detecting USB-based cyber attacks: A guide</title>
                <link>https://www.hackthebox.gr/blog/detecting-usb-cyber-attacks-guide</link>
                <description>Here’s how to protect your network from USB-based attacks, from detection techniques and forensics to prevention strategies to stop malware, data theft, and unauthorized access.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/A6vMeVIPzC6aM6GIO64IdaC4JwruYbp2.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Tue, 02 Dec 2025 16:47:34 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/detecting-usb-cyber-attacks-guide</guid>
            </item>
                    <item>
                <title>The great complexity shift: Why AI agents don’t just simplify cybersecurity</title>
                <link>https://www.hackthebox.gr/blog/ai-agents-cybersecurity-complexity-shift</link>
                <description>Even as AI agents tackle cyber threats, they aren’t a security silver bullet. Explore why multi-agent systems shift complexity to new layers and what it takes to secure autonomous operations</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/XEdmvAS5cKhHwQ6o8NhBQ9QinSPUFHv0.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>All Content</category>
                <pubDate>Wed, 26 Nov 2025 12:07:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/ai-agents-cybersecurity-complexity-shift</guid>
            </item>
            </channel>
</rss>
