Recent Posts

When “Just a Tool” Stops Being a Defence

When “Just a Tool” Stops Being a Defence

Over the past three days, a pattern has emerged that is difficult to dismiss as coincidence, mischief, or edge-case misuse. Investigations reported by reputable outlets, including The Guardian, reveal that Grok, an AI image generation tool, has been used to produce sexualised fake images of 

Software Supply Chain Failures: The Emerging Priority in Application Security by Karthikeyan Ramdass

Software Supply Chain Failures: The Emerging Priority in Application Security by Karthikeyan Ramdass

As modern software ecosystems become increasingly interconnected, software supply chain security has emerged as one of the most critical challenges in application security today. In this article, CyAN member Karthikeyan Ramdass examines why Software Supply Chain Failures, ranked as A03 in the OWASP Top 10:2025, 

Welcome New Members 2025

Welcome New Members 2025

As we begin 2026, we want to start by thanking everyone across the CyAN community for the trust, time, and energy you continue to invest in this network. We would also like to take a moment to spotlight the individuals who joined CyAN and our 

Week 51 – TOP10 CVE of the Week 2025

15 – 21 Dec 2025 As we reached the end of 2025 we have looked back to see the most impactful vulnerabilities of the year. Come and go through the TOP 10 CVEs of the year selected by our experts! A critical CVSS 9.1 flaw 

Navigating EU Compliance for AI-Enabled Wearable Medical Devices: MDR, AI Act, GDPR and Data Act Interplay

Navigating EU Compliance for AI-Enabled Wearable Medical Devices: MDR, AI Act, GDPR and Data Act Interplay

You can download this edition by clicking the three dots icon on the far right and selecting Download PDF File. For the best reading experience, we recommend enlarging it by clicking the fullscreen icon, which is the third icon from the right. All article titles 

Please welcome our newest member from Australia, Sanchay Joshi

Please welcome our newest member from Australia, Sanchay Joshi

Sanchay is a techno legal cybersecurity professional with over eight years of experience across Deloitte in the United States offices in India, KPMG India, and PwC India. He is currently pursuing a Master of Cyber Security in Cyber Defence at The University of Queensland. He 

Reflections on Day Two of the 2025 Neurotechnology Summit: Capability, Governance and the Questions We Must Answer

Reflections on Day Two of the 2025 Neurotechnology Summit: Capability, Governance and the Questions We Must Answer

If Day One explored what neurotechnology means for individual minds, Day Two confronted what it will mean for societies, states and the systems that govern them. The conversations shifted from personal rights, clinical ethics and emerging applications to national capability, infrastructure, defence, public policy and 

Cyber (In)Securities – Issue 183

Cyber (In)Securities – Issue 183

You can download this edition by clicking the three dots icon on the far right and selecting Download PDF File. For the best reading experience, we recommend enlarging it by clicking the fullscreen icon, which is the third icon from the right. All article titles 

Denmark:  Don’t Ban VPNs to Protect Rights Holders

Denmark: Don’t Ban VPNs to Protect Rights Holders

The Danish government wants to ban VPN access to “illegal streams”. This is dangerous and unnecessary.

Week 50 – React or not React: that is the question

8 – 14 Dec 2025 A remote code execution vulnerability was found in React Server Components: CVE-2025-55182 – React2Shell. This week’s CVE of the Week is about the recent pre-authentication remote code execution vulnerability in Meta’s React Server Components. React is a free and open-source