Recent Posts

New Podcast – Shantanu Bhattacharya:  What do File Security and LLM Optimisation Have in Common?

New Podcast – Shantanu Bhattacharya: What do File Security and LLM Optimisation Have in Common?

CyAN member Shantanu Bhattacharya discusses file security and LLM performance

Please welcome our newest member from France, Liliane UWIZEYE

Please welcome our newest member from France, Liliane UWIZEYE

Liliane supports CISOs and SOC/VOC/CERT Managers in driving and optimizing their cyber defense capabilities by aligning detection and response with priority threats, business risks, and real exposure, to accelerate their maturity. Her expertise includes Security Operations, risk management, vulnerability management, and audit readiness (ISO27001, GDPR, 

Week 14 – Cracked Open: A Critical F5 Flaw Hiding Inside the Easter Egg

30 Mar – 05 Apr 2026 Our CVE of the Week is about BigIP APM which consolidates remote, mobile, network, virtual, and web access. With BIG-IP APM, you can create, enforce, and centralize simple, dynamic, intelligent application access policies for all of your apps, regardless 

Python Didn’t Bite, the Supply Chain Did by Michael T. McDonald

Python Didn’t Bite, the Supply Chain Did by Michael T. McDonald

There’s a particular kind of failure in modern software that doesn’t announce itself with alarms or outages. No flashing dashboards, no immediate disruption. Everything appears to be working exactly as expected. Until, quietly and without ceremony, it isn’t. A widely used Python package, pulled in 

Signals Over Substance: Navigating the Attention Economy

Signals Over Substance: Navigating the Attention Economy

In a recent article (see link in the comments below), I revisited a framework I developed more than a decade ago while writing Flat World Navigation, Collaboration and Networking. At the time, I was trying to make sense of what felt like a shifting economic 

Cyber (In)Securities – Issue 195

Cyber (In)Securities – Issue 195

You can download this edition by clicking the three dots icon on the far right and selecting Download PDF File. For the best reading experience, we recommend enlarging it by clicking the fullscreen icon, which is the third icon from the right. All article titles 

Livre Blanc CyAN – Loi 05-20, ISO27001 et Résilience Cyber – Mars 2026 by Gilles Chevillon and Aymane Nasser

Livre Blanc CyAN – Loi 05-20, ISO27001 et Résilience Cyber – Mars 2026 by Gilles Chevillon and Aymane Nasser

You can download this PDF by clicking the three dots icon on the far right and selecting Download PDF File. For the best reading experience, we recommend enlarging it by clicking the fullscreen icon, which is the third icon from the right. Loi 05-20 et 

Week 13 – When a Video Hacks Your Phone

23 – 29 Mar 2026 In this week’s CVE of the Week we’ll be looking at remote code execution flaw in Android 16 system component. Several locations of the component’s Media Codecs Mainline module exhibit potential out-of-bounds read and write operations caused by a heap 

Parents and companies need to act against social media harms by Shireen Vakil

Parents and companies need to act against social media harms by Shireen Vakil

Platforms often introduce safeguards only after problems emerge rather than building protections into their systems from the start. This places an unreasonable burden on children and parents Parents and companies need to act against social media harms Source: The Indian Express Read the full article 

Cyber (In)Securities – Issue 194

Cyber (In)Securities – Issue 194

You can download this edition by clicking the three dots icon on the far right and selecting Download PDF File. For the best reading experience, we recommend enlarging it by clicking the fullscreen icon, which is the third icon from the right. All article titles