UNIT 31’s cover photo
UNIT 31

UNIT 31

IT Services and IT Consulting

Lykovrysi, Attica 261 followers

Defensive cyber operations. Focused on detection, response & resilience under real-world pressure.

About us

Unit 31 – Defensive Cyber Operations Unit 31 is ThreatScene’s specialized team dedicated to defense in depth, focused on detecting, containing, and neutralizing cyber threats before they escalate. Composed of experienced incident responders, forensic analysts, and threat intelligence experts, Unit 31 operates with one core mission: to maintain stability in moments of uncertainty. Whether responding to a critical incident, uncovering persistent threats, or proactively hunting adversaries in complex environments, Unit 31 acts with speed, precision, and calm execution. Our operations span: • Digital Forensics & Incident Response (DFIR): Rapid investigation, containment, and recovery during live attacks. • Compromise Assessments: Deep environment analysis to detect unknown intrusions or lingering threats. • Threat Intelligence & Hunting: Proactive monitoring and analysis to stay ahead of adversaries. • Incident Response Retainers: Structured standby support, tailored playbooks, and readiness plans. We draw on real-world cases, tactical workflows, and proven methodologies to protect critical infrastructure, enterprise environments, and high-stakes sectors like maritime, defense, and energy. Clients who work with us don’t just get support, they get a trusted partner ready to step in when it matters most. Want to know what sets Unit 31 apart? Contact us through threatscene.com or speak with our team.

Website
www.threatscene.com
Industry
IT Services and IT Consulting
Company size
11-50 employees
Headquarters
Lykovrysi, Attica

Updates

  • 📍Greece (Hybrid) Unit 31 is growing. We are looking for an experienced Incident Responder to join our defensive operations team. Someone who thrives under pressure, understands the full incident lifecycle, and knows that speed and precision are not negotiable when it matters most. What the role involves: ↳ Host and network-based incident response investigations ↳ Forensic analysis, evidence collection, and root cause analysis ↳ Incident management planning, tabletop exercises, and response policy execution ↳ Direct engagement with clients across critical infrastructure, defence, and maritime This is not a monitoring role. This is hands-on response work in high-stakes environments. 3+ years in #IncidentResponse. Solid forensics and SIEM experience. The ability to stay calm, think clearly, and communicate effectively when everything around you is on fire. If that sounds like your environment, we want to hear from you. Apply here: https://lnkd.in/dD6zbR-5 Or send your CV directly: careers@threatscene.com Know someone who fits? Tag them below. #IncidentResponse #BlueTeam #Hiring #ThreatScene #Unit31

    • No alternative text description for this image
  • UNIT 31 reposted this

    We started with one priority. Deliver real impact where it matters. One year later, that work has been recognised with 2 GOLD awards at the BOUSSIAS Cyber Security Awards 2026. GOLD Award #1 ↳ Cyber Security Projects per Industry Sector (Maritime) Category ↳ The MARINE Framework is our contribution to Greece’s maritime sector and the wider cybersecurity community. ↳ It is offered free of any charge, providing practical and applicable guidance across vessels, ports and operations. ↳ A structured approach to strengthen resilience where it matters most. GOLD Award #2 ↳ Incident Response & Vulnerability Management Category ↳ The Deadlock case, handled by UNIT 31, involved a major ransomware attack on a large organisation. ↳ We responded with speed, contained the threat and restored operations rapidly. ↳ At the same time, we published the first global threat intelligence on the Deadlock group, supporting the wider ecosystem. Real response. Real impact. We celebrated the awards. But the mission remains the same. Protect Greece’s critical sectors and keep organisations running under pressure. Thank you to everyone at ThreatScene who contributed to this result. Thank you to BOUSSIAS for organising the event. And congratulations to all the awarded teams. Every company in this space contributes to a more resilient business environment. #ThreatScene #IncidentResponse #MaritimeSecurity #Unit31 #CyberSecurityAwards

    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
  • UNIT 31 reposted this

    We’re hiring: Mid/Senior Penetration Tester | Unit 13 📍Athens (Hybrid, commute required) ThreatScene is expanding UNIT 13. We are looking for a Mid to Senior Penetration Tester to deliver real offensive security work across modern environments, and help us refine how we test. You will work on: • Web, APIs, microservices, mobile, cloud, IT and OT, Wi-Fi • Phishing simulations and red teaming engagements • High-quality reporting and stakeholder briefings • Tooling, playbooks, and testing methodology improvement We’re looking for: • 3+ years of professional penetration testing experience (not entry level) • Strong application and infrastructure testing capability, including code review and thick client testing • At least one programming language (Python, C, C++, C#, or Golang) • Relevant certifications (OSCP, OSWE, OSEP, GPEN, CRTP, or similar) 📩 Send your CV to: careers@threatscene.com Know someone who fits? Tag them in the comments. #PenetrationTesting #RedTeam #OffensiveSecurity #CyberSecurityJobs #Unit13 #ThreatScene

    • No alternative text description for this image
  • Big shout-out to our brothers in UNIT 13 for this one, and especially Tasos Meletlidis for leading the discovery and turning it into a clear write-up defenders can actually use. From the Blue Team side, the point is simple. Small bugs do not stay small when they sit on safety-critical maritime systems. Patch fast, reduce exposure, and assume it will be tested in the wild. If you run SignalK Server: update to v2.19.1. Full breakdown: https://lnkd.in/digqP99U #ThreatScene #Unit31 #Unit13 #MaritimeSecurity #VulnerabilityResearch

    View organization page for UNIT 13

    322 followers

    We found a 1-click RCE chain on a ship's navigation system. We published 4 CVEs. Zero authentication required. Full control over autopilot, AIS, GPS, and engine systems. 700+ vessels exposed on the internet. Many with no authentication at all. UNIT 13 discovered this during a maritime penetration test and worked with the SignalK team on responsible disclosure. Patches are live, but the attack chain shows how quickly "minor" bugs become critical when they're on safety-critical infrastructure. This discovery and analysis were led by Unit 13’s Tasos Meletlidis, who identified the issue, validated the attack path, and turned it into a clear, technical write-up for defenders. The full technical breakdown—code analysis, 6 exploitation methods, and attack flow—is now on our blog. If you're running SignalK Server: update to v2.19.1 immediately. Read the complete research: https://lnkd.in/digqP99U #maritimesecurity #Unit13 #vulnerabilityresearch #ThreatScene

    • No alternative text description for this image
  • UNIT 31 reposted this

    How the new ransomware group Deadlock turned a ransom note into a live negotiation channel. A technical report for IR, threat intel, and detection teams monitoring decentralised C2 patterns. In this UNIT 13 report, Christos P. and Tasos Meletlidis, members of Unit 13, analysed the workflow end-to-end: ↳ an HTML ransom artefact that opens a browser-based chat client ↳ Polygon used as an on-chain configuration beacon for relay discovery ↳ deterministic identity and keys, then Ed25519, Curve25519, and NaCl for message security ↳ practical implications for investigations and detections Read the full analysis: https://lnkd.in/eSFFHRrY #ransomware #DeadLock #ThreatIntelligence #ThreatScene #DetectionEngineering #BlockchainSecurity #Unit13

    • No alternative text description for this image
  • Unit 31 supported PANOPTIS 2025 with a technically accurate scenario built to simulate a real OT intrusion inside a frigate’s operational network. Participants analysed logs, traced attacker movement, assessed impact, and restored safe function under pressure. These are the exercises that elevate national capability. And we are honoured to contribute.

    View organization page for ThreatScene

    3,513 followers

    What does it take to defend a nation against modern cyber threats? Every year, the Hellenic National Defence General Staff (ΓΕΕΘΑ) brings that question to life through PANOPTIS, Greece’s flagship national cyber defence exercise. #PANOPTIS is not just another drill. It brings together hundreds of cybersecurity professionals from defence units, the public sector, academia, and industry to test national readiness against real attack scenarios that simulate the complexity of today’s threat landscape. This year, ThreatScene was honoured to contribute. We were invited to design and deliver a full maritime OT cyber incident scenario for the exercise. And we did it pro bono, as part of our commitment to supporting Greece’s cyber defence ecosystem with specialised knowledge and real-world expertise. Here is what our scenario challenged participants to handle: ↳ Initial compromise: A malicious USB device infected the workstation of a frigate’s control-room operator, installing malware quietly and establishing hidden access. ↳ Intrusion and escalation: Attackers used the backdoor to take control of the administrator’s machine, escalate privileges, and scan for targets inside the OT network. ↳ Targeted OT attack: The adversaries reached the ship’s pump-control systems, causing operational disruption and prompting the crew to detect anomalies under pressure. ↳ Investigation and recovery: Teams analysed logs, traced attacker movement across OT-connected systems, identified techniques and tools, assessed operational impact, and prioritised the restoration of safe function. Scenarios like this are difficult. But they are essential. They build national resilience in environments where a single compromised device can jeopardise safety, operations, and human lives. Why PANOPTIS matters, now more than ever: ↳ National exercises reveal real gaps and strengthen response capabilities. ↳ They help operators and engineers understand the true behaviour of OT-focused adversaries. ↳ They ensure that when an attack comes, Greece has trained teams ready to respond with precision. We are proud to have contributed to PANOPTIS 2025. Proud to see #ΓΕΕΘΑ lead initiatives of such scale and significance. And proud to support our country with the same dedication we bring to every critical engagement. A stronger national cyber defence requires realistic training. And ThreatScene will continue to contribute wherever we can. #CyberSecurity #OTSecurity #MaritimeSecurity #ThreatScene #NationalDefense #PANOPTIS2025

    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
  • Most breaches don’t start with code; they start with people. In 2025, social engineering is the attacker’s easiest entry point. Fake calls, MFA resets, and AI-driven voices now bypass technical defences with ease. At Unit 31, we see this daily in incident response. Detecting deception, verifying identity, and restoring order under pressure are what we do best. 👉 Read the latest Threat Brief on how social engineering really works & how to stop it. #SocialEngineering #IncidentResponse #ThreatScene #Unit31 #CyberSecurity

    View organization page for ThreatScene

    3,513 followers

    Most cyberattacks don’t start with malware. They start with a message. The latest edition of The Threat Brief dives deep into Social Engineering 2025: The Hidden Breach Behind Every Breach. We explore how attackers now use AI, human trust, and real-time manipulation to bypass even the strongest defences. Inside this issue: • How social engineering tactics have evolved in 2025 • Why AI-powered deception makes fraud harder to detect • The top human and process gaps attackers exploit • A 30-day practical action plan for leaders to strengthen controls 👉 Explore the full report and see why every major breach today starts with a conversation, not a code exploit. #CyberSecurity #ThreatScene #TheThreatBrief #SocialEngineering

  • Every incident needs leadership. Giorgos Gavriiloglou brings exactly that. With deep experience in SOC operations and crisis management, he strengthens Unit 31’s mission to restore order under pressure. Welcome aboard Giorgos, we move faster together. #Unit31 #ThreatScene #IncidentResponse #CyberSecurity #DFIR

    View organization page for ThreatScene

    3,513 followers

    Meet Giorgos Gavriiloglou When an incident strikes, minutes decide the outcome. That’s where Giorgos comes in. As our new Incident Response Manager at UNIT 31, he brings years of experience leading SOCs, managing crises, and building response playbooks that turn chaos into order. At ThreatScene, Giorgos will: - Lead and mentor our incident response team - Guide organisations through the critical first hours of an incident, from first alert to complete recovery - Bridge technical teams and executives with clear, actionable communication - Advise clients on remediation and resilience strategies - Innovate processes that raise response speed and maturity Giorgos knows what it means to face high-stakes intrusions and to guide organisations safely through them. We’re proud to strengthen Unit 31 with his expertise. Welcome to ThreatScene, Giorgo. #ThreatScene #Unit31 #IncidentResponse #CyberSecurity #Resilience #BlueTeam

    • No alternative text description for this image

Affiliated pages

Similar pages