Recent Posts

Welcome New Member – Caroline Humer from US

Welcome New Member – Caroline Humer from US

Please welcome our newest member from the United States, Caroline Humer As an international digital safety advocate, Caroline Humer is dynamic and motivated, with a track record of successfully fostering cross-industry engagement. Growing up in numerous global settings has honed her ability to lead global 

Week-19 – A critical security vulnerability in the OpenCTI Platform

05 – 11 May 2025 A critical security vulnerability has been identified in the OpenCTI Platform which is designed to structure, store, organize and visualize technical and non-technical information about cyber threats. This vulnerability, tracked as CVE-2025-24977 is our new CVEofTheWeek with an assigned CVSS 

Cyber (In)Securities – Issue 146

Cyber (In)Securities – Issue 146

CyAN Voices: Growing Careers Through Mentorship

CyAN Voices: Growing Careers Through Mentorship

In this mentorship story of 2025, Sumandeep Kaur shares her experience as a Web Developer and Cybersecurity Intern under the guidance of her CyAN mentor, Shantanu Bhattacharya. Empowering Early-Career Web Developer & Cybersecurity Professionals: My Journey with the CyAN Mentorship Program By Sumandeep Kaur Acknowledging 

CyAN Voices: Growing Careers Through Mentorship

CyAN Voices: Growing Careers Through Mentorship

In this first mentorship story of 2025, Kuljit Kaur (Australia) shares her experience under the guidance of her CyAN mentor, Shakil Khan (UAE).

My Mentoring Experience with CyAN Mentorship Program and Mr. Shakil Khan

By Kuljit Kaur

Starting a career journey in cybersecurity can be both exciting and challenging. Thanks to the mentorship program offered by CyAN mentorship program and the guidance of Mr. Shakil Khan, I have gained clarity, confidence, and a practical roadmap to transition into the cybersecurity industry.

Setting the Stage: My Mentorship Goals

In our first mentoring session, I outlined my expectations from the program:

  • Career Guidance: Gaining insights into cybersecurity pathways, skills, and certifications aligned with industry demands.
  • Practical Knowledge: Learning about real-world cybersecurity challenges, SOC operations, risk management, and security compliance best practices.
  • Personalized Advice: Receiving guidance on areas for improvement and clear, practical steps for breaking into the cybersecurity field.
  • Career Readiness: Strengthening my resume, improving job applications, and preparing effectively for interviews.
  • Networking and Resources: Expanding my professional network and accessing valuable learning platforms and communities.

I also discussed my career goals, including:

  • Short-Term (6–12 Months): Secure a cybersecurity role in SOC operations, security monitoring, or IT support, using my skills in Microsoft Sentinel, Splunk, and SIEM tools.
  • Mid-Term (1–3 Years): Progress into a Cybersecurity Analyst or Risk & Compliance role, focusing on threat detection, incident response, and risk management.
  • Long-Term (Beyond 3 Years): Grow into a Cybersecurity Consultant or Security Engineer, contributing to security architecture, cloud security, and governance frameworks.

Resume Enhancement and Career Planning

One of the first areas Mr. Shakil Khan helped me with was improving my resume. He guided me on how to highlight my technical competencies, real-world experiences, and certifications in a way that directly speaks to cybersecurity recruiters. His feedback helped me present my SOC, SIEM, and security monitoring experience more effectively.

We also discussed the Three Lines of Defence model, deepening my understanding of how cybersecurity operations fit into broader risk and governance structures:

  • First Line: Operational management (security teams executing controls and monitoring)
  • Second Line: Risk management and compliance oversight
  • Third Line: Internal audit providing independent assurance

Additionally, we reviewed concepts related to Governance, Risk, and Compliance (GRC), helping me connect technical roles with broader organizational risk and policy frameworks.

SOC Operations Understanding

In our discussion about SOC operations, Mr. Shakil Khan encouraged me to share my practical understanding of threat detection, incident triage, escalation processes, and documentation. He emphasized the importance of not only technical skill but also clear communication, teamwork, and continuous learning to thrive in a SOC environment.

Workplace Success: Tips and KPIs

Mr. Shakil Khan also shared valuable tips on how to work successfully in a professional cybersecurity environment:

  • Time Management: Prioritize tasks and manage time effectively to meet deadlines.
  • Professional Communication: Always communicate clearly, whether writing incident reports, sending emails, or giving verbal updates.
  • Accountability: Own your work, be responsible for tasks assigned to you, and show initiative.
  • Adaptability: Be open to learning new tools, technologies, and adapting to fast-paced environments.
  • Attention to Detail: Accuracy in investigation, reporting, and documentation is critical in cybersecurity roles.

He also explained the importance of understanding Key Performance Indicators (KPIs):

  • Responding to incidents within the agreed SLA (Service Level Agreement) timeframe
  • Accuracy in incident classification and escalation
  • Timely completion of threat analysis and reporting tasks
  • Contribution to team goals and knowledge sharing

KPIs are not just performance metrics — they directly link to building trust with your team and showing your reliability to leadership.

The Importance of Networking

Another crucial part of the discussion was professional networking:

  • Why Networking Matters: In cybersecurity, many job opportunities are found through connections rather than job boards. Networking also exposes you to emerging industry trends, mentorship opportunities, and communities of practice.
  • How to Network Effectively:
    • Attend cybersecurity webinars, meetups, and conferences (even virtual ones).
    • Be active on LinkedIn — share your learnings, comment on cybersecurity posts, and connect with professionals in the field.
    • Join cybersecurity communities (e.g., ISACA, (ISC)², OWASP, or even informal Slack/Discord groups).
    • Always approach networking with a mindset of mutual learning — offer help, ask for advice, and stay genuinely curious.

Mr. Shakil Khan highlighted that networking is not just about finding a job; it’s about building long-term relationships that support continuous growth and development in your career.

Conclusion

This mentorship session with Mr. Shakil Khan through the CyAN mentorship program has been a transformational experience for me. His guidance has provided me with a strategic career roadmap, real-world advice, and a strong foundation for professional growth.

I feel more confident, better equipped, and motivated to achieve my career goals in cybersecurity. I am grateful for the time, effort, and insights shared by Mr. Shakil Khan and look forward to continuing to work on the action items we discussed — from enhancing my technical skills and workplace readiness to building a strong professional network.


About the Mentor

Mohammed Shakil Khan

LinkedIn

25+ years of diversified senior management experience in governance and transformation specializing in Risk management, Internal Audit, Cybersecurity, Business & Digital Transformation, Data Governance and sustainability implementation.

About the Mentee

Kuljit Kaur

LinkedIn

Kuljit Kaur is a recent Master of Cyber Security graduate from Edith Cowan University with hands-on experience in SOC operations, SIEM tools like Microsoft Sentinel and Splunk, and real-time threat investigations. Passionate about continuous learning, she is currently interning in a SOC role and actively building her career in the cybersecurity industry.

Week 18 – SAP NetWeaver’s Visual Composer component

Week 18 – SAP NetWeaver’s Visual Composer component

White Hat IT Security’s CVE Of The Week, CVE-2025-31324, is a critical zero-day vulnerability affecting SAP NetWeaver’s Visual Composer component

Cyber (In)Securities – Issue 144

News Quantum computer threat spurring quiet overhaul of internet securityCyberscoop – Greg Otto Pro-Russia hacktivists bombard Dutch public orgs with DDoS attacksBleepingComputer – Bill Toulas Dems look to close the barn door after top DOGE dog has boltedThe Register – Brandon Vigliarolo Canadian Electric Utility 

Cyber (In)Securities – Issue 143

Cyber (In)Securities – Issue 143


News

  1. Cybersecurity CEO accused of running malware on hospital PC blabs about it on LinkedIn
    The Register – Brandon Vigliarolo
  2. Cybersecurity experts issue response to Trump order targeting Chris Krebs, SentinelOne
    Cyberscoop – Greg Otto
  3. Marks & Spencer breach linked to Scattered Spider ransomware attack
    BleepingComputer – Lawrence Abrams
  4. House passes bill to study routers’ national security risks
    Cyberscoop – Matt Braken
  5. Hitachi Vantara takes servers offline after Akira ransomware attack
    BleepingComputer – Sergiu Gatlan
  6. Over 1,200 SAP NetWeaver servers vulnerable to actively exploited flaw
    BleepingComputer – Bill Toulas
  7. Cybersecurity vendors are themselves under attack by hackers, SentinelOne says
    Cyberscoop – Tim Starks
  8. VeriSource now says February data breach impacts 4 million people
    BleepingComputer – Bill Toulas
  9. DragonForce expands ransomware model with white-label branding scheme
    BleepingComputer – Ionut Ilascu
  10. WooCommerce admins targeted by fake security patches that hijack sites
    BleepingComputer – Bill Toulas
  11. Amid CVE funding fumble, ‘we were mushrooms, kept in the dark,’ says board member
    The Register – Jessica Lyons
  12. More Ivanti attacks may be on horizon, say experts who are seeing 9x surge in endpoint scans
    The Register – Connor Jones
  13. Mobile provider MTN says cyberattack compromised customer data
    BleepingComputer – Bill Toulas
  14. Vehicles Face 45% More Attacks, 4 Times More Hackers
    Dark Reading – Nate Nelson
  15. Gig-Work Platforms at Risk for Data Breaches, Fraud, Account Takeovers
    Dark Reading – Tatiana Walk-Morris
  16. All Major Gen-AI Models Vulnerable to ‘Policy Puppetry’ Prompt Injection Attack
    SecurityWeek – Ionut Arghire
  17. Researchers Identify Rack::Static Vulnerability Enabling Data Breaches in Ruby Servers
    The Hacker News – Ravie Lakshmanan
  18. Anthropic finds alarming ’emerging trends’ in Claude misuse report
    ZDNet – Radhika Rajkumar
  19. Darcula adds AI to its DIY phishing kits to help would-be vampires bleed victims dry
    The Register – Jessica Lyons
  20. ‘SessionShark’ ToolKit Evades Microsoft Office 365 MFA
    Dark Reading – Kristina Beek
  21. Assassin’s Creed maker faces GDPR complaint for forcing single-player gamers online
    The Register – Brandon Vigliarolo
  22. Interlock ransomware claims DaVita attack, leaks stolen data
    BleepingComputer – Bill Toulas
  23. Verizon DBIR Flags Major Patch Delays on VPNs, Edge Appliances
    SecurityWeek – Ryan Naraine
  24. ‘Warning sign’: Espionage driving APAC cyber surge
    InnovationAus – Trish Everingham

Analysis

  1. The Trouble with AI in Cybersecurity – Part 5: Ethics on Autopilot
    PrivID (Substack)
  2. Mobile Applications: A Cesspool of Security Issues
    Dark Reading – Robert Lemos
  3. M-Trends 2025: State-Sponsored IT Workers Emerge as Global Threat
    Dark Reading – Kevin Townsend
  4. Inside the Verizon 2025 DBIR: Five Trends That Signal a Shift in the Cyber Threat Economy
    SecurityWeek – Danelle Au
  5. Why NHIs Are Security’s Most Dangerous Blind Spot
    The Hacker News
  6. Navigating Regulatory Shifts & AI Risks
    Dark Reading – Arnaud Treps

CyAN Members: News

  1. Comment instaurer une relation de confiance entre le DPO et le Hacker Éthique ?
    Cybersecurity Advisors Network
  2. CyAN Global Vice President Kim Chandler McDonald judges Australian Space Awards
    Space Connect
  3. Michael do Rozario Named Finalist for Lawyers Weekly Partner of the Year Awards 2025
    Lawyers Weekly

🗓️ Upcoming CyAN (and CyAN Partner) Global Events:

GISEC Logo

📍 Dubai, UAE

GISEC
May 6–8

Read more
Cyber OSPAs Logo

📍 London, UK

Cyber OSPAs
May 8

Read more
CSG Awards Logo

📍 Dubai, UAE

CSG Awards 2025
May 7

Read more
World AI Expo Logo

📍 Dubai, UAE

World AI Technology Expo
May 14–15

Read more

🎉 Celebration

CyAN 10th Anniversary
(Details TBA)

GITEX Europe Logo

📍 Berlin, Germany

GITEX Europe Messe
May 21–23

Read more
MaTeCC Logo

📍 Rabat, Morocco

MaTeCC
June 7–9

Read more

🌐 Online

CyAN Q2 Call (APAC + Gulf)
June 11 – 12:00 GST / 16:00 SGT / 18:00 AEST

🌐 Online

CyAN Q2 Call (EMEA + Americas)
June 11 – 20:00 GST / 18:00 CET / 17:00 UTC / 12:00 EDT

DPO & Hacker Éthique : Une synergie stratégique au cœur de la cybersécurité

DPO & Hacker Éthique : Une synergie stratégique au cœur de la cybersécurité

Retour sur le webinaire organisé par l’initiative Black Is Ethical – 26 mars 2025