Recent Posts

Partnership signed with ESP’ Info, Brazzaville, Republic of the Congo

Partnership signed with ESP’ Info, Brazzaville, Republic of the Congo

Cybersecurity Advisors Network (CyAN) signed on 02 April 2026 a Memorandum of Understanding with ESP’ Info, a training institute on cybersecurity Brazzaville, Republic of the Congo. The signature took place in Lille, at InCyber Forum. This partnership marks the second collaboration between a training institute 

Please welcome our newest member from Switzerland, Stéphane Duguin

Please welcome our newest member from Switzerland, Stéphane Duguin

Stéphane Duguin is the CEO of the CyberPeace Institute. From senior positions in law enforcement to executive leadership in civil society, he spent three decades tracking how nations states, criminals groups and terrorists organization weaponize disruptive technologies, such as Al, against vulnerable communities. He previously 

Cyber (In)Securities – Issue 197

Cyber (In)Securities – Issue 197

You can download this edition by clicking the three dots icon on the far right and selecting Download PDF File. For the best reading experience, we recommend enlarging it by clicking the fullscreen icon, which is the third icon from the right. All article titles 

CyAN Global Mentorship Programme – 1 Month Update

CyAN Global Mentorship Programme – 1 Month Update

We are now one month into the CyAN Global Mentorship Programme, and it is already clear that the initiative is delivering meaningful value across a truly international community. From the outset, the programme was designed to connect aspiring cybersecurity professionals with experienced mentors worldwide. In 

Week 15 – One Text Away: The Samsung Exynos Zero-Click Threat

06 -12 Apr 2026 A newly disclosed Samsung Exynos vulnerability allows attackers to compromise a device with nothing more than a malicious SMS. No clicks. No user interaction. Just one message. Critical vulnerability has been found with the CVSS score of 10 in CVE-2025-543284. An 

Cyber (In)Securities – Issue 196

Cyber (In)Securities – Issue 196

You can download this edition by clicking the three dots icon on the far right and selecting Download PDF File. For the best reading experience, we recommend enlarging it by clicking the fullscreen icon, which is the third icon from the right. All article titles 

When “Compliance” Becomes a Proxy for Trust

When “Compliance” Becomes a Proxy for Trust

Over the past few days, a story has been doing the rounds about a fast-growing compliance startup and its sudden parting of ways with a major backer. It’s easy to get pulled into the specifics, the allegations, the responses, and the inevitable back-and-forth. But I 

It Installed Cleanly, That Was the Problem by Michael T. McDonald

It Installed Cleanly, That Was the Problem by Michael T. McDonald

There’s a persistent assumption in software security that something has to visibly fail before a system is compromised. A vulnerability is exploited, a control is bypassed, or a configuration is misapplied. In most post-incident narratives, there is a clear point where things go wrong. This 

New Podcast – Shantanu Bhattacharya:  What do File Security and LLM Optimisation Have in Common?

New Podcast – Shantanu Bhattacharya: What do File Security and LLM Optimisation Have in Common?

CyAN member Shantanu Bhattacharya discusses file security and LLM performance

Please welcome our newest member from France, Liliane UWIZEYE

Please welcome our newest member from France, Liliane UWIZEYE

Liliane supports CISOs and SOC/VOC/CERT Managers in driving and optimizing their cyber defense capabilities by aligning detection and response with priority threats, business risks, and real exposure, to accelerate their maturity. Her expertise includes Security Operations, risk management, vulnerability management, and audit readiness (ISO27001, GDPR,