Recent Posts
Cyber (In)Securities – Issue 202
You can download this edition by clicking the three dots icon on the far right and selecting Download PDF File. For the best reading experience, we recommend enlarging it by clicking the fullscreen icon, which is the third icon from the right. All article titles …
From Compliance to Cyber Resilience: Why Dubai’s DigitalFuture Needs Strong Governance, Cloud Security, and RiskManagement By Aman Dev Sumakumar
You can download this edition by clicking the three dots icon on the far right and selecting Download PDF File. For the best reading experience, we recommend enlarging it by clicking the fullscreen icon, which is the third icon from the right. All article titles …
Week 20 – Windows Netlogon spill
11 – 17 May 2026 This week’s spotlight is on CVE‑2026‑41089, a critical stack‑based buffer overflow in the Windows Netlogon service that allows remote, unauthenticated code execution on domain controllers. The issue stems from a stack‑based buffer overflow triggered during the processing of specific Netlogon …
Cyber (In)Securities – Issue 201
You can download this edition by clicking the three dots icon on the far right and selecting Download PDF File. For the best reading experience, we recommend enlarging it by clicking the fullscreen icon, which is the third icon from the right. All article titles …
Week 19 – Shield Down: Critical PAN-OS Flaw Exposed
04 – 10 May 2026 Our CVE of the Week is about PAN-OS, which is the specialized operating system that powers all Palo Alto Networks next-generation firewalls (physical, virtual, and cloud). It provides complete visibility and control over network traffic by identifying users, applications, and …
Cybersecurity in Mongolia by Munkhzul Zorigt
About the Author Munkhzul Zorigt Information Security Consultant | ISMS | ISO/IEC 27001:2022 Munkhzul Zorigt is a cybersecurity professional from Ulaanbaatar, Mongolia, currently participating in a mentorship programme through the Cybersecurity Advisors Network, where John Salomon serves as her mentor. With six years of experience …
Cyber (In)Securities – Issue 200
You can download this edition by clicking the three dots icon on the far right and selecting Download PDF File. For the best reading experience, we recommend enlarging it by clicking the fullscreen icon, which is the third icon from the right. All article titles …
Week 18 – Behind the Mask: SharePoint Spoofing in the Wild
27 Apr – 03 May 2026 In this week’s CVE of the Week we’ll be looking CVE-2025-32201, a spoofing vulnerability in Microsoft SharePoint Server caused by improper input validation, with a CVSS score of 6.5 It allows a remote, unauthenticated attacker to impersonate trusted users …




