Hi! My name is Leonidas and I’m a senior security consultant at WithSecure, where I currently head the Attack Path Mapping service. A complete CV is available here.
On this website you will find all my published work, articles previously released in other corners of the internet, as well as a few posts first released here.
Throughout my career I have discovered several vulnerabilities on software from companies like IBM, Cisco, Xiaomi and Wind Hellas, details of which you can also find in this space.
![]() |
![]() |
Despite consulting full-time, I enjoy a bit of research every now and then, which I’ve been given the opportunity to present at security conferences around the world:
![]() |
Building and Validating Kubernetes Detection Capability with Leonidas | Video |
![]() |
Kubernetes Attack Simulation: The Definitive Guide | Video |
![]() Adversary Village |
Kubernetes Attack Simulation: The Definitive Guide | Video |
![]() |
Click Here For Free TV: Chaining Bugs to Takeover Wind Vision Accounts | Video |
![]() |
Baby, Don't Forget My Number: OSINT using your phone's address book | Video |
![]() |
Click Here For Free TV: Chaining Bugs to Takeover Wind Vision Accounts | Video |
My interests include attack detection, adversary simulation, reverse engineering, and in the past mobile security. Occasionally I try my hand at coding, which has resulted to some notable projects.
With regards to movies, music and books (aka content to try and phish me with) you can find my lists below:
/ | / |
If you’ve liked the stuff in here, spotted a mistake (noone’s perfect, not even the mighty Stig), or just feel like talking about the Premier League, feel free to ping me on socials!
Happy Browsing!