Recent Posts

Python Didn’t Bite, the Supply Chain Did by Michael T. McDonald

Python Didn’t Bite, the Supply Chain Did by Michael T. McDonald

There’s a particular kind of failure in modern software that doesn’t announce itself with alarms or outages. No flashing dashboards, no immediate disruption. Everything appears to be working exactly as expected. Until, quietly and without ceremony, it isn’t. A widely used Python package, pulled in 

Signals Over Substance: Navigating the Attention Economy

Signals Over Substance: Navigating the Attention Economy

In a recent article (see link in the comments below), I revisited a framework I developed more than a decade ago while writing Flat World Navigation, Collaboration and Networking. At the time, I was trying to make sense of what felt like a shifting economic 

Cyber (In)Securities – Issue 195

Cyber (In)Securities – Issue 195

You can download this edition by clicking the three dots icon on the far right and selecting Download PDF File. For the best reading experience, we recommend enlarging it by clicking the fullscreen icon, which is the third icon from the right. All article titles 

Livre Blanc CyAN – Loi 05-20, ISO27001 et Résilience Cyber – Mars 2026 by Gilles Chevillon and Aymane Nasser

Livre Blanc CyAN – Loi 05-20, ISO27001 et Résilience Cyber – Mars 2026 by Gilles Chevillon and Aymane Nasser

You can download this PDF by clicking the three dots icon on the far right and selecting Download PDF File. For the best reading experience, we recommend enlarging it by clicking the fullscreen icon, which is the third icon from the right. Loi 05-20 et 

Week 13 – When a Video Hacks Your Phone

23 – 29 Mar 2026 In this week’s CVE of the Week we’ll be looking at remote code execution flaw in Android 16 system component. Several locations of the component’s Media Codecs Mainline module exhibit potential out-of-bounds read and write operations caused by a heap 

Parents and companies need to act against social media harms by Shireen Vakil

Parents and companies need to act against social media harms by Shireen Vakil

Platforms often introduce safeguards only after problems emerge rather than building protections into their systems from the start. This places an unreasonable burden on children and parents Parents and companies need to act against social media harms Source: The Indian Express Read the full article 

Cyber (In)Securities – Issue 194

Cyber (In)Securities – Issue 194

You can download this edition by clicking the three dots icon on the far right and selecting Download PDF File. For the best reading experience, we recommend enlarging it by clicking the fullscreen icon, which is the third icon from the right. All article titles 

Partnership signed with National Law University, Jodhpur, India 

Partnership signed with National Law University, Jodhpur, India 

Cybersecurity Advisors Network (CyAN) signed on 23 March 2026 a Memorandum of Understanding with National Law University, Jodhpur, which is consistently ranked among the top 5 National Law Universities in India. This partnership marks the first institutional collaboration of its kind between a National Law 

Week 12 – 10-30 Days to Root

16 – 22 Mar 2026 This week’s CVE of the Week is about a Local Privilege Escalation (LPE) vulnerability in default installations of Ubuntu Desktop 24.04 and later versions. CVE-2026-3888 (CVSS score: 7.8), identified by the Qualys Threat Research Unit, could allow an unprivileged local 

Cyber (In)Securities – Issue 193

Cyber (In)Securities – Issue 193

You can download this edition by clicking the three dots icon on the far right and selecting Download PDF File. For the best reading experience, we recommend enlarging it by clicking the fullscreen icon, which is the third icon from the right. All article titles