Recent Posts

Week 6 – When ++ Turns into a Minus

2 – 8 Feb 2026 Earlier this week, a security advisory reported a high-severity vulnerability in Notepad++, rated CVSS 7.7. But first of all, what is Notepad++? For those who may not be familiar with it, Notepad++ is a free, open-source text and source code 

Please welcome our newest member from Barcelona, Spain, Ahmet Can Kan

Please welcome our newest member from Barcelona, Spain, Ahmet Can Kan

Ahmet Can Kan is a cybersecurity professional with hands-on experience across offensive security, digital forensics, and threat intelligence. His work focuses on understanding adversary behaviour end to end, from initial access through to impact, and translating real-world attack techniques into practical defensive improvements. Ahmet is 

Cyber (In)Securities – Issue 187

Cyber (In)Securities – Issue 187

You can download this edition by clicking the three dots icon on the far right and selecting Download PDF File. For the best reading experience, we recommend enlarging it by clicking the fullscreen icon, which is the third icon from the right. All article titles 

Week 5 – Trusted by Default: Why Microsoft Office Remains a Prime Target

26 Jan – 1 Feb 2026 This week’s CVE of the Week highlights an actively exploited security feature bypass vulnerability in Microsoft Office. Microsoft Office is an office suite and a family of client software, server software, and services developed by Microsoft.It’s one of the 

Cyber (In)Securities – Issue 186

Cyber (In)Securities – Issue 186

You can download this edition by clicking the three dots icon on the far right and selecting Download PDF File. For the best reading experience, we recommend enlarging it by clicking the fullscreen icon, which is the third icon from the right. All article titles 

Why Stop Killing Games Matters for Information Security Professionals

Why Stop Killing Games Matters for Information Security Professionals

The Stop Killing Games initiative recently collected over 1.2m signatures supporting rules that require publishers to ensure continued access to paid-for but discontinued software. Here’s why that matters for information security and resilience professionals.

Beyond Compliance: Building Continuous Confidence in Risk, Governance, and Cybersecurity by Pathan Humam

Across industries, organizations are investing heavily in cybersecurity controls, compliance frameworks, and assurance programs. Yet many leadership teams still struggle to answer a simple but critical question with confidence: “What is our risk posture right now—and can we trust it?” As cyber threats accelerate, regulatory 

Week 4 – Actively Exploited Zero-Day RCE Hits Cisco Unified CM and Webex Calling

12 – 18 Jan 2026 This week’s CVE of the Week is about the recent remote code execution vulnerability in Cisco’s Unified Communications (CM) products and Webex Calling Dedicated Instance, that has been actively exploited as a zero-day. This vulnerability is due to improper validation 

Cyber (In)Securities – Issue 185

Cyber (In)Securities – Issue 185

You can download this edition by clicking the three dots icon on the far right and selecting Download PDF File. For the best reading experience, we recommend enlarging it by clicking the fullscreen icon, which is the third icon from the right. All article titles 

Week 3 – AI Agents Under Attack: High-Risk Vulnerability in ServiceNow

12 – 18 Jan 2026 Our CVE of the Week series continues with an AI Agent vulnerability that affected ServiceNow, one of the most popular cloud-based platforms for IT and business process automation. The CVE-2025-12420 vulnerability, assigned with a CVSS 4.0 score of 9.3, allows