Recent Posts
Please welcome our newest member from France, Liliane UWIZEYE
Liliane supports CISOs and SOC/VOC/CERT Managers in driving and optimizing their cyber defense capabilities by aligning detection and response with priority threats, business risks, and real exposure, to accelerate their maturity. Her expertise includes Security Operations, risk management, vulnerability management, and audit readiness (ISO27001, GDPR, …
Week 14 – Cracked Open: A Critical F5 Flaw Hiding Inside the Easter Egg
30 Mar – 05 Apr 2026 Our CVE of the Week is about BigIP APM which consolidates remote, mobile, network, virtual, and web access. With BIG-IP APM, you can create, enforce, and centralize simple, dynamic, intelligent application access policies for all of your apps, regardless …
Python Didn’t Bite, the Supply Chain Did by Michael T. McDonald
There’s a particular kind of failure in modern software that doesn’t announce itself with alarms or outages. No flashing dashboards, no immediate disruption. Everything appears to be working exactly as expected. Until, quietly and without ceremony, it isn’t. A widely used Python package, pulled in …
Signals Over Substance: Navigating the Attention Economy
In a recent article (see link in the comments below), I revisited a framework I developed more than a decade ago while writing Flat World Navigation, Collaboration and Networking. At the time, I was trying to make sense of what felt like a shifting economic …
Cyber (In)Securities – Issue 195
You can download this edition by clicking the three dots icon on the far right and selecting Download PDF File. For the best reading experience, we recommend enlarging it by clicking the fullscreen icon, which is the third icon from the right. All article titles …
Livre Blanc CyAN – Loi 05-20, ISO27001 et Résilience Cyber – Mars 2026 by Gilles Chevillon and Aymane Nasser
You can download this PDF by clicking the three dots icon on the far right and selecting Download PDF File. For the best reading experience, we recommend enlarging it by clicking the fullscreen icon, which is the third icon from the right. Loi 05-20 et …
Week 13 – When a Video Hacks Your Phone
23 – 29 Mar 2026 In this week’s CVE of the Week we’ll be looking at remote code execution flaw in Android 16 system component. Several locations of the component’s Media Codecs Mainline module exhibit potential out-of-bounds read and write operations caused by a heap …
Parents and companies need to act against social media harms by Shireen Vakil
Platforms often introduce safeguards only after problems emerge rather than building protections into their systems from the start. This places an unreasonable burden on children and parents Parents and companies need to act against social media harms Source: The Indian Express Read the full article …
Cyber (In)Securities – Issue 194
You can download this edition by clicking the three dots icon on the far right and selecting Download PDF File. For the best reading experience, we recommend enlarging it by clicking the fullscreen icon, which is the third icon from the right. All article titles …







