Recent Posts

Cyber (In)Securities – Issue 123

Information Security News: Federal Judge Tightens DOGE Leash Over Critical Treasury Payment System AccessThe Register by Brandon Vigliarolo and Jessica LyonA federal judge has mandated stricter regulatory oversight on the integration of Dogecoin (DOGE) within the U.S. Treasury’s critical payment systems, following concerns about the 

Welcome New Member – Osama Soliman from UAE

Welcome New Member – Osama Soliman from UAE

Please welcome our newest member from UAE, Osama Soliman! Osama Soliman is a seasoned GRC professional with extensive experience in risk management, internal controls, and regulatory compliance. He currently leads the Risk & Control function at a leading online food delivery platform, overseeing GRC activities 

Cyber (In)Securities – Issue 122

Information Security News:

TSA’s Airport Facial-Recog Tech Faces Audit Probe
The Register by Brandon Vigliarolo
The U.S. Transportation Security Administration’s (TSA) facial recognition program is under audit by the Government Accountability Office (GAO) due to concerns over privacy, data security, and potential biases. The audit will assess how biometric data is collected, stored, and shared, and whether passengers can meaningfully opt out. Critics warn of surveillance overreach and hacking risks, while TSA argues the technology improves security and efficiency. The findings could impact future airport screening policies and the broader use of facial recognition in public spaces.
🔗 Read More

XE Group Cybercrime Gang Moves from Credit Card Skimming to Zero-Day Exploits
SecurityWeek by Ryan Naraine
The XE Group, a long-standing cybercrime syndicate, has shifted tactics from credit card skimming to exploiting zero-day vulnerabilities, targeting unpatched software in enterprise environments. Security researchers report that the group is now leveraging undisclosed flaws to gain initial access, escalating their operations to ransomware and espionage. This move highlights a broader trend of financially motivated threat actors abandoning low-level fraud in favour of more lucrative, high-impact cyberattacks. Organisations are urged to prioritise patching, threat intelligence, and zero-trust security models to mitigate risks.
🔗 Read More

1-Click Phishing Campaign Targets High-Profile X Accounts
Dark Reading by Elizabeth Montalbano
A new phishing campaign is compromising high-profile X (formerly Twitter) accounts through a one-click attack, bypassing traditional credential theft methods. Victims, including journalists, celebrities, and corporate brands, are tricked into clicking malicious links that instantly hijack their accounts. Attackers then use these accounts for scams, misinformation, and crypto fraud. Experts warn that multi-factor authentication alone may not prevent this attack, urging users to verify all communications and scrutinise links before clicking, as social media remains a prime battleground for cyber threats.
🔗 Read More

DeepSeek AI Tools Impersonated by Infostealer Malware on PyPI
BleepingComputer by Bill Toulas
Cybercriminals are impersonating DeepSeek AI tools on the Python Package Index (PyPI) to distribute infostealer malware, targeting developers and researchers. These malicious packages, once installed, steal credentials, exfiltrate sensitive data, and install backdoors into infected systems. The attack underscores ongoing software supply chain threats, as open-source repositories remain a prime target for abuse. Security experts recommend verifying maintainers, auditing dependencies, and using automated tools to detect rogue packages before they compromise development environments.
🔗 Read More

Elon Musk’s Doge Team Granted ‘Full Access’ to Federal Payment System
The Guardian by Ed Pilkington
Concerns over centralisation and oversight are mounting after reports revealed that Elon Musk’s Doge team was given full access to the U.S. federal payment system. Critics warn that such consolidation of power could create significant security and accountability risks, particularly with Musk’s history of controversial decision-making. While the move is framed as a step toward efficiency, regulators and lawmakers are now questioning how this level of access was granted and what safeguards, if any, are in place to prevent misuse or vulnerabilities in critical government financial infrastructure.
🔗 Read More

Privacy Commissioner Warns the ‘John Smiths’ of the World Can Acquire ‘Digital Doppelgangers’
The Register by Simon Sherwood
Australia’s Privacy Commissioner has raised alarms about how easily individuals can assume false digital identities using personal data scraped from the internet. With AI-powered fraud techniques evolving, impersonation attacks are becoming more common. Criminals can now create ‘digital doppelgangers’ to bypass authentication measures, defraud businesses, or manipulate online reputation. This warning underscores the need for stronger identity verification standards, better consumer awareness, and policy changes to curb the abuse of publicly available personal data for nefarious purposes.
🔗 Read More

Crazy Evil Gang Targets Crypto with StealC, AMOS, and Angel Drainer Malware
The Hacker News by Ravie Lakshmanan
A notorious cybercriminal group dubbed ‘Crazy Evil’ is intensifying its attacks on cryptocurrency users, deploying a trifecta of malware—StealC, AMOS, and Angel Drainer. These threats work together to hijack digital wallets, steal credentials, and drain funds from unsuspecting users. The rise of these sophisticated malware strains highlights the increasing risks in the crypto space, where decentralised finance platforms and individual investors remain prime targets. Experts warn that without robust security practices and improved scam awareness, crypto holders will continue to be lucrative prey for cybercriminals.
🔗 Read More

FBI Attacks ‘The Manipulaters’ As Hackers Impact 17 Million Americans
Forbes by Davey Winder
The FBI has launched a major crackdown on a cybercriminal group known as ‘The Manipulaters,’ responsible for breaching sensitive records of 17 million Americans. This operation marks a significant step in tackling large-scale data theft, with the hackers accused of running sophisticated phishing campaigns and credential-stuffing attacks. The FBI’s intervention highlights the growing threat of mass-scale identity fraud and the urgent need for better consumer protection against cybercriminals leveraging automated attack methods to compromise vast amounts of personal data.
🔗 Read More

Gilmore Girls Fans Nabbed as Eurocops Dismantle Two Major Cybercrime Forums
The Register by Connor Jones
European law enforcement has dismantled two major cybercrime forums, leading to multiple arrests—including individuals who oddly identified as Gilmore Girls fans. The sites facilitated data breaches, malware distribution, and stolen data sales, making them prime hubs for cybercriminal activity. This operation highlights the increasing effectiveness of international law enforcement in taking down illicit online marketplaces and reinforces the importance of cross-border collaboration in tackling cyber threats.
🔗 Read More

AI Tools Used for Child Sexual Abuse Images Targeted in Home Office Crackdown
The Guardian by Michael Savage
The UK Home Office is intensifying efforts to combat AI-generated child sexual abuse images, a growing concern in the digital age. Generative AI tools now allow criminals to create illegal material at scale, evading traditional detection methods. The crackdown signals a push for tighter regulation and proactive enforcement to prevent AI from being exploited by predators. With technology evolving faster than legislation, experts warn that more comprehensive frameworks are needed to keep up with the risks AI poses in the wrong hands.
🔗 Read More

Google Says Hackers Abuse Gemini AI to Empower Their Attacks
BleepingComputer by Bill Toulas
Threat actors linked to China and Iran are leveraging Google’s Gemini AI to improve their hacking techniques, generating malicious scripts and refining phishing campaigns. This revelation amplifies concerns about AI being weaponised to enhance cyber threats, raising difficult questions about restricting access to advanced AI models. With cybersecurity experts calling for stronger guardrails, tech companies face growing pressure to develop AI tools that balance innovation with security, preventing them from becoming tools of cyber warfare.
🔗 Read More

A Man Stalked a Professor for Six Years. Then He Used AI Chatbots to Lure Strangers to Her Home
The Guardian by Katie McQue
A man who stalked a professor for six years escalated his harassment by using AI chatbots to impersonate her online and lure strangers to her home. The case illustrates how AI can be weaponised for harassment, fraud, and identity theft, pushing the need for legal protections and AI safeguards. While chatbots offer convenience and efficiency, their potential for abuse remains a serious concern, raising ethical questions about responsibility when AI is misused in harmful ways. Stronger AI governance is needed to prevent similar incidents.
🔗 Read More

DeepSeek Jailbreak Reveals Its Entire System Prompt
Dark Reading by Nate Nelson
A jailbreak of China’s DeepSeek AI has revealed its internal system prompt, exposing operational secrets and potential security gaps. This discovery raises concerns about AI transparency, adversarial exploitation, and the ease with which these models can be manipulated. As governments and companies race to develop more powerful AI, security vulnerabilities like this highlight the risks of inadequate safeguards. The leak also underscores the challenges of maintaining AI integrity, as unauthorised modifications could be used to manipulate outputs for malicious purposes.
🔗 Read More

Bill Requiring Federal Contractors to Have Vulnerability Disclosure Policies Gets House Redo
Cyber Scoop by Matt Bracken
The Strengthening Cybersecurity for the [US] Federal Government Act is back on the table, mandating that all federal contractors implement vulnerability disclosure policies (VDPs). These policies ensure that security flaws are reported and addressed before they can be exploited by attackers. With rising cyber threats targeting government suppliers, lawmakers argue that the bill will close critical security gaps and enforce consistent standards across agencies. The legislation aligns with broader federal efforts to tighten cybersecurity compliance, reducing risks in sectors handling sensitive data and critical infrastructure. If passed, contractors will need to proactively identify and mitigate vulnerabilities to retain government contracts.
🔗 Read More

Even the US Government Can Fall Victim to Cryptojacking
FedScoop by Rebecca Heilweil & Tim Starks
A new report reveals that even US government networks have been compromised by cryptojacking—where hackers hijack computing resources to mine cryptocurrency. These attacks exploit vulnerabilities in cloud infrastructure, slowing operations and increasing costs. The incidents demonstrate how financially motivated cybercriminals are shifting tactics, using low-profile attacks to generate passive income. Experts warn that cryptojacking is an underreported but growing concern, urging organisations to monitor for unusual CPU usage and unauthorised mining scripts.
🔗 Read More

Indian Tech Giant Tata Technologies Hit by Ransomware Attack
BleepingComputer by Bill Toulas
Indian IT giant Tata Technologies was hit by a ransomware attack, disrupting operations across multiple regions. The breach underscores the persistent threat of ransomware to enterprises, particularly those in critical supply chains. Cybercriminals continue to target major corporations with financially motivated extortion schemes, demanding hefty ransoms for decryption keys. This incident reinforces the need for robust incident response plans, improved cybersecurity training, and resilient backup strategies to mitigate operational disruptions and financial losses.
🔗 Read More

Italy Blocks Access to the Chinese AI Application DeepSeek to Protect Users’ Data
SecurityWeek via Associated Press
Citing data protection concerns, Italy has blocked access to China’s DeepSeek AI, joining a growing list of nations scrutinising AI-powered services over potential privacy violations. The decision underscores global apprehension about how AI applications handle and store user data, with fears of mass surveillance and regulatory breaches fueling stricter policies. As AI continues to evolve, more governments are expected to implement preemptive bans and security reviews to protect citizens from opaque AI-driven data collection.
🔗 Read More

US, Dutch Authorities Disrupt Pakistani Hacking Shop Network
SecurityWeek by Ionut Arghire
Authorities in the US and the Netherlands have taken down a Pakistani cybercriminal network involved in hacking and online fraud. The operation marks a significant victory in the fight against transnational cybercrime, demonstrating the importance of intelligence-sharing in dismantling illicit digital operations. With cybercriminal networks operating across borders, these joint efforts are becoming increasingly essential in tackling sophisticated cyber threats that impact governments, businesses, and individuals worldwide.
🔗 Read More

US Healthcare Provider Data Breach Impacts 1 Million Patients
BleepingComputer by Sergiu Gatlan
A major healthcare provider in the US has suffered a data breach affecting over one million patients. The breach exposed sensitive medical records, putting personal and financial information at risk. Healthcare remains a prime target for cybercriminals due to the high value of patient data on the black market. This latest attack underscores the urgent need for stronger cybersecurity measures in the sector, as well as better regulatory enforcement to ensure patient data is properly protected from increasingly sophisticated cyber threats.
🔗 Read More

Once-Secret Treasury Memos Detail Agency Response to SolarWinds Hack
Bloomberg by Jason Leopold
Recently declassified Treasury Department memos reveal internal discussions and responses to the SolarWinds cyberattack, one of the largest espionage campaigns in history. The documents show how officials scrambled to assess the damage and mitigate risks after discovering that Russian hackers had infiltrated multiple federal agencies. The memos highlight gaps in federal cybersecurity preparedness and the challenges of responding to nation-state attacks at scale. This insight into government decision-making underscores the ongoing need for improved threat detection and rapid response frameworks.
🔗 Read More

FDA, CISA Warn About Vulnerabilities in Patient Health Monitors
Cybersecurity Dive by Nick Paul Taylor
The FDA and CISA have issued a joint advisory about security flaws in several widely used patient monitoring devices. These vulnerabilities could allow attackers to access or disrupt medical devices, potentially putting patients’ lives at risk. As healthcare technology becomes increasingly connected, the risk of cyberattacks targeting medical devices grows. The advisory urges manufacturers to address security gaps proactively and stresses the importance of regulatory oversight in ensuring patient safety in an era of digital health transformation.
🔗 Read More

WhatsApp Says It Disrupted Spyware Campaign Aimed at Reporters, Civil Society
CyberScoop by Tim Starks
WhatsApp has disrupted a sophisticated spyware campaign targeting journalists and civil society members, reportedly linked to the Israeli firm Paragon. The attackers used zero-click exploits, meaning victims could be infected without taking any action. This case highlights the ongoing threat of commercial spyware and the risks posed to activists and reporters. While WhatsApp has bolstered its security, the persistence of these attacks underscores the need for broader legislative action against spyware vendors and stronger international cooperation to combat digital surveillance abuses.
🔗 Read More

Analysis

Cyber Insights 2025: Quantum and the Threat to Encryption
SecurityWeek by Kevin Townsend
Quantum computing is advancing faster than anticipated, posing a serious threat to modern encryption standards. Experts warn that once quantum systems reach a certain threshold, they could break widely used cryptographic protections, exposing sensitive data across industries. Governments and cybersecurity researchers are racing to develop quantum-resistant encryption, but adoption lags behind the technology’s rapid development. Organisations must begin assessing their cryptographic resilience now to avoid a future where quantum-powered cyberattacks render current security frameworks obsolete.
🔗 Read More

What Does It Mean to Build in Security from the Ground Up?
The Register by Larry Peterson
Despite years of warnings, many organisations still treat security as an afterthought, bolting it on at the end rather than integrating it from the start. This reactive approach leaves systems vulnerable and increases costs when security flaws must be patched later. The article explores why businesses continue to prioritise convenience, speed, and usability over cybersecurity and the risks this poses. With increasing cyber threats, regulatory demands, and consumer expectations, companies must shift towards proactive security strategies to build resilient, trustworthy digital ecosystems.
🔗 Read More

5 Risk Factors from Supply Chain Interdependencies in a Complex Cybersecurity Landscape
World Economic Forum by Akhilesh Tuteja
Cybercriminals are increasingly exploiting supply chain vulnerabilities to infiltrate organisations, making third-party risks a major security concern. From compromised software dependencies to unvetted suppliers, businesses are often unaware of weak links in their supply chains. This article breaks down the top five risk factors contributing to supply chain insecurity and offers practical strategies to mitigate them. As cybercriminal tactics grow more sophisticated, companies must implement stronger security assessments, enforce compliance standards, and build resilience into their vendor ecosystems to prevent costly breaches.
🔗 Read More

CISO Stature Gains Traction as Global Cyber Risk Escalates
Cybersecurity Dive by David Jones
Once relegated to back-office IT roles, Chief Information Security Officers (CISOs) are now gaining prominence in boardrooms as cyber threats escalate. The rise in ransomware attacks, regulatory scrutiny, and the increasing financial stakes of breaches have made cybersecurity a core business concern. But with increased influence comes heightened expectations—CISOs must now balance risk management, compliance, and business strategy while justifying security investments to executives. This article explores how the CISO role is evolving, the challenges they face, and what businesses must do to support them in protecting their digital assets.
🔗 Read More

Can AI & the Cyber Trust Mark Rebuild Endpoint Confidence?
Dark Reading by Chris “CT” Thomas
AI-driven cybersecurity solutions are becoming essential in the fight against increasingly complex cyber threats. However, concerns around transparency, reliability, and adversarial manipulation of AI models remain. This analysis examines whether initiatives like the Cyber Trust Mark can provide the assurances needed to rebuild confidence in endpoint security. As cybercriminals experiment with AI-powered attacks, security teams must evaluate whether AI defences can keep up. The piece explores the potential of AI in securing enterprise environments while addressing the challenges of bias, explainability, and resistance to adversarial manipulation.
🔗 Read More

Third-Party Delegation: Striking the Balance Between Risk, Trust, and Control
IT Security Guru by Kirsten Doyle
Delegating access to third parties is essential in modern business operations, but it comes with significant risks. Unauthorised access, poor security hygiene, and lack of oversight can lead to devastating breaches. This article explores how companies can establish strong third-party risk management frameworks to mitigate threats while maintaining operational efficiency. By striking the right balance between trust and control, organisations can ensure secure collaborations without exposing themselves to unnecessary vulnerabilities.
🔗 Read More

State Data Privacy Regulators Are Coming. What Story Will You Tell Them?
Dark Reading by Becky Bracken
As data privacy regulators increase enforcement actions, businesses need to be ready to justify how they collect, store, and use customer data. This article explores the evolving regulatory landscape and the steps companies must take to align with new compliance expectations. Transparency, accountability, and ethical data management are now non-negotiable, with organisations expected to demonstrate responsible data stewardship. The ability to articulate a strong compliance narrative can mean the difference between building consumer trust and facing regulatory penalties. With governments worldwide strengthening privacy laws, companies that fail to prepare risk costly fines, reputational damage, and legal battles.
🔗 Read More

CyAN Members Op Eds, Articles, etc:

The Hidden Cyber Risks Lurking in Supply Chains: What Every Business Leader Needs to Know
Kim Chandler McDonald
CyAN Global VP Kim Chandler McDonald examines the increasing dangers of AI-driven harassment, including deepfake manipulation, cyberstalking, and automated abuse. Highlighting real-world cases where AI tools have been weaponised, disproportionately targeting women and vulnerable groups, her article calls for urgent regulatory action and proactive industry collaboration to mitigate these risks. Kim stresses that AI developers must embed protective measures from the outset rather than attempting to address harm retroactively.
🔗 Read More

AI Global Everything, Dubai, UAE: February 4-6
🔗 Event Details

Upcoming CyAN Global Events

Breaking the Cycle: Combating Online IBSA for a Safer Digital Experience Webinar, March 6
(EST 6AM, CET 12PM, AEST 10PM)
🔗 Event Details

CyAN APAC: The Geopolitical Impacts of Cyber Threats: From Espionage to Influence Keynote by Dan Elliot, March 12
Location: Peoplebank, Sydney (Save the date, general release tickets available soon!)

GITEX AFRICA, Marrakesh, Morocco: April 14-16
🔗 Event Details

GITEX ASIA: Singapore (Marina Bay Sands) April 23-25
🔗 Event Details

GISEC: Dubai World Trade Center, Dubai, UAE: May 6-8
🔗 Event Details

The Cyber Outstanding Security Performance Awards (Cyber OSPAs), May 8, London, UK
🔗 Event Details

MaTeCC: Rabat, Morocco, June 7-9, 2025
(The third annual North Africa and beyond cybersecurity event, hosted by CyAN partner organisation École High-Tech.)
🔗 Event Details

An Opportunity For the EU to Support Digital Freedom

An Opportunity For the EU to Support Digital Freedom

The EU has a great opportunity to fill the gap left by US withdrawal of funding for digital privacy and rights initiatives worldwide

Beyond Data Protection Day: Safeguarding Our Digital Lives Every Day

Beyond Data Protection Day: Safeguarding Our Digital Lives Every Day

January 28th was Data Protection Day—a global reminder that privacy isn’t just a legal formality or an operational headache. It’s a fundamental pillar of trust. If your business handles client or customer data (and let’s be honest, that includes almost every business these days), you 

Cyber (In)Securities – Issue 121

Information Security News:

US Cyber Agency’s Future Role in Elections Remains Murky Under the Trump Administration

Security Week via Associated Press
The role of the US Cybersecurity and Infrastructure Security Agency (CISA) in safeguarding elections is increasingly uncertain under the Trump administration. While CISA played a key role in securing previous elections, its future involvement remains in question as officials reassess its authority and focus. Critics argue that sidelining the agency could weaken national election security at a time of rising cyber threats. With the 2026 midterms approaching, the debate over CISA’s role underscores the challenges of maintaining trust and resilience in the electoral process.
🔗 Read More

GitHub suffers major outage, “OH MY GOD”

Cyber News by Niamh Ancell
Developers worldwide were left in disarray as GitHub suffered a major outage, prompting frustration and memes across social media. The disruption lasted for hours, affecting repositories, pull requests, and CI/CD pipelines. While GitHub has restored services, the incident highlights the growing reliance on centralised development platforms and the ripple effects of downtime. Some industry voices are calling for greater decentralisation in software version control to prevent future disruptions on this scale.
🔗 Read More

Google: Over 57 Nation-State Threat Groups Using AI for Cyber Operations

The Hacker News by Ravie Lakshmanan
Google’s Threat Analysis Group has identified more than 57 nation-state threat groups leveraging AI to enhance their cyber operations. From automating phishing campaigns to generating more convincing deepfake content, adversaries are increasingly using AI to scale and refine attacks. While AI-powered security measures are advancing, this arms race presents new challenges for defenders. Google calls for stronger AI governance and real-time threat intelligence sharing to counter this emerging cyber battlefield.
🔗 Read More

Trump Admin’s Purge of US Cyber Advisory Boards was ‘Foolish,’ Says Ex-Navy Admiral

The Register by Jessica Lyons
A former US Navy admiral has criticised the Trump administration’s decision to dissolve several cyber advisory boards, calling it a “foolish” move that undermines national security. The boards, which provided strategic cyber guidance, were disbanded as part of a broader government shake-up. Critics argue that this leaves the US more vulnerable to cyber threats, especially at a time of increasing global tensions. Supporters of the move contend that the administration is streamlining cybersecurity efforts, but experts warn that sidelining key advisory voices could have long-term consequences.
🔗 Read More

Ransomware Attack at New York Blood Services Provider – Donors Turned Away During Shortage Crisis

The Register by Connor Jones
A ransomware attack on a major New York blood services provider has disrupted operations, forcing donation centres to turn donors away during a critical blood shortage. The attack encrypted key systems, delaying blood processing and distribution efforts. With hospitals already struggling to maintain supplies, the breach has sparked concerns about the vulnerability of healthcare-related infrastructure. The provider is working with cybersecurity experts to restore access, but this incident highlights the real-world consequences of cyberattacks beyond financial losses.
🔗 Read More

New Syncjacking Attack Hijacks Devices Using Chrome Extensions

BleepingComputer by Bill Toulas
Security researchers have uncovered a novel attack method called “Syncjacking,” which exploits Chrome’s sync feature to hijack user sessions across devices. By tricking users into installing malicious extensions, attackers can access synced data, including passwords, browsing history, and authentication tokens. Google has been alerted to the issue, but no patches have been released yet. Users are advised to scrutinise extensions carefully and enable multi-factor authentication to mitigate risks. This attack serves as a reminder that even convenience features can be turned against users when security is compromised.
🔗 Read More

Nulled, Other Cybercrime Websites Seized by Law Enforcement

Security Week by Eduard Kovacs
International law enforcement agencies have taken down multiple cybercrime marketplaces, including Nulled, a well-known forum for trading stolen credentials, malware, and hacking tools. The coordinated effort, led by Europol and US authorities, resulted in arrests and server seizures. While cybercriminals often regroup on new platforms, the disruption deals a significant blow to underground operations. Experts say this is part of a broader strategy to dismantle cybercrime ecosystems by targeting both the tools and the communities that sustain them.
🔗 Read More

DARPA Wants to Create ‘Self-Healing’ Firmware That Can Respond and Recover from Cyberattacks

Cyberscoop by Derek B. Johnson
The US military’s research arm, DARPA, is working on a groundbreaking project to develop “self-healing” firmware capable of detecting, responding to, and recovering from cyberattacks in real-time. The initiative aims to strengthen the resilience of embedded systems, particularly in military and critical infrastructure environments. If successful, this technology could drastically reduce downtime and neutralise threats before they cause significant damage. However, experts caution that developing truly autonomous cyber defences will require overcoming complex engineering and security challenges.
🔗 Read More

DeepSeek Accidentally Exposed Sensitive Data Including User Prompts, Cyber Firm Reports

Cryptopolitan News by Noor Bazmi
A cybersecurity firm has revealed that DeepSeek, a Chinese AI chatbot platform, inadvertently exposed user prompts and sensitive data due to misconfigured security settings. The leak raises concerns about data privacy in AI-powered applications, particularly regarding how user inputs are stored and accessed. While DeepSeek has addressed the issue, this incident underscores the risks of inadequate security controls in AI-driven platforms. Users are advised to exercise caution when interacting with AI tools that handle personal or proprietary information.
🔗 Read More

Apple Chips Vulnerability Exposes Credit Cards & Location History to Hackers

Cybersecurity News by Guru Baran
A newly discovered vulnerability in Apple’s chips could allow attackers to extract sensitive information, including credit card data and location history. Researchers warn that the flaw, which affects devices using Apple’s secure enclave technology, could be exploited through side-channel attacks. While Apple has yet to release a full mitigation, security experts recommend users keep their devices updated and avoid using public Wi-Fi when accessing sensitive information. This discovery highlights ongoing concerns about hardware security in consumer devices.
🔗 Read More

You Probably Have More CIO Experience Than the Incoming White House CIO

The Register by Brandon Vigliarolo
The Trump administration’s appointment of a new White House CIO has raised eyebrows due to the nominee’s limited experience in IT leadership. Critics argue that overseeing federal cybersecurity initiatives requires a deep technical background, especially as cyber threats to government infrastructure intensify. However, supporters suggest that strong leadership and policy expertise may outweigh hands-on IT knowledge. With federal agencies increasingly targeted by cybercriminals, all eyes will be on how the new CIO handles evolving security challenges.
🔗 Read More

Threat of Cyber-Attacks on Whitehall ‘Is Severe and Advancing Quickly’, NAO Says

The Guardian by Robert Booth
The UK’s National Audit Office (NAO) has issued a stark warning about the growing severity of cyber threats targeting Whitehall, stating that attacks are “advancing quickly” and government defences remain under pressure. With foreign adversaries and criminal groups increasingly focused on breaching critical government infrastructure, the report urges urgent investment in cyber resilience. The NAO highlights weaknesses in legacy systems and calls for improved incident response strategies to prevent potential large-scale breaches.
🔗 Read More

Amazon Was Sued Over Alleged ‘Backdoor Access’ to Consumer Data

Quartz by Ben Kessler
Amazon is facing a lawsuit over allegations that it provided unauthorised “backdoor access” to consumer data, raising fresh concerns about privacy and data security. The lawsuit claims that Amazon allowed third parties, including government agencies, to access user information without explicit consent. Amazon has denied the allegations, stating that it adheres to strict privacy policies. The case highlights ongoing tensions between tech companies, regulators, and privacy advocates over data access and consumer rights.
🔗 Read More

$6.4M to Combat Health Sector Cyber Threat

InnovationAus by Brandon How
The Australian government has allocated $6.4 million to bolster cybersecurity in the health sector amid rising cyber threats targeting hospitals and medical institutions. The funding will be used to enhance digital security frameworks, improve threat intelligence sharing, and support response capabilities. With the healthcare industry increasingly in the crosshairs of ransomware gangs and nation-state actors, officials stress the importance of proactive measures to safeguard patient data and ensure operational resilience.
🔗 Read More

Engineering Giant Smiths Group Discloses Security Breach

BleepingComputer by Sergiu Gatlan
Smiths Group, a global engineering firm, has confirmed a security breach affecting its corporate network. The company has not disclosed the full scope of the attack but stated that it is working with cybersecurity experts to investigate and mitigate any damage. While operational disruptions appear limited, the breach underscores the ongoing targeting of industrial and engineering firms by cybercriminals. Businesses in critical infrastructure sectors are urged to fortify their defences against increasingly sophisticated cyber threats.
🔗 Read More

OAuth Redirect Flaw in Airline Travel Integration Exposes Millions to Account Hijacking

The Hacker News by Ravie Lakshmanan
Security researchers have uncovered a vulnerability in OAuth-based authentication systems used by major airlines, potentially exposing millions of travellers to account hijacking. Attackers could exploit the flaw to redirect users to malicious websites, stealing login credentials and personal data. Affected airlines are rushing to patch the issue, but the incident raises broader concerns about the security of third-party authentication integrations. Experts recommend enabling multi-factor authentication and being cautious of unexpected login requests.
🔗 Read More

Security Pros More Confident About Fending Off Ransomware, Despite Being Battered by Attacks

The Register by Connor Jones
A new industry report reveals that while security professionals remain under relentless ransomware attacks, confidence in their ability to mitigate threats has increased. Improved detection tools, better incident response plans, and stronger employee training are credited for this shift. However, experts caution that overconfidence could lead to complacency, as ransomware tactics continue to evolve. Organisations are urged to maintain vigilance and continuously update their cybersecurity strategies.
🔗 Read More

DeepSeek Blames Disruption on Cyberattack as Vulnerabilities Emerge

Security Week by Eduard Kovacs
AI chatbot provider DeepSeek has blamed a recent service disruption on a cyberattack, raising further concerns after security researchers flagged vulnerabilities in its platform. The incident has drawn regulatory scrutiny, with officials questioning the company’s security measures and user data protection practices. While DeepSeek has implemented emergency fixes, the event underscores the growing cybersecurity risks tied to AI-driven platforms and the need for robust protections.
🔗 Read More

Ransomware Targets ESXi Systems via Stealthy SSH Tunnels for C2 Operations

The Hacker News by Ravie Lakshmanan
A newly discovered ransomware campaign is exploiting ESXi hypervisors using stealthy SSH tunnels to maintain persistent command-and-control (C2) operations. By targeting virtualisation infrastructure, attackers can maximise disruption while evading traditional security measures. The attack highlights the increasing focus on ESXi environments by ransomware groups, underscoring the need for organisations to harden hypervisor security, monitor for unusual SSH activity, and enforce strict access controls.
🔗 Read More

Origin Energy Fined $1.6M After Sharing Private Details of Family Violence Victims

The Guardian via Australian Associated Press
Origin Energy has been fined $1.6 million after it was found to have improperly disclosed the personal details of family violence survivors. The breach, which violated privacy and safety protections, has drawn sharp criticism from consumer advocacy groups. Regulators emphasise that organisations handling sensitive information must implement stricter data protection measures to prevent further harm. The case serves as a stark reminder of the real-world consequences of data mishandling, particularly for vulnerable individuals.
🔗 Read More

How Long Does It Take Hackers to Crack Modern Hashing Algorithms?

The Hacker News
A new analysis reveals how quickly hackers can crack modern hashing algorithms, with weaker hashes like MD5 and SHA-1 being compromised in mere seconds. Even stronger algorithms, like bcrypt, can be cracked given enough computing power, particularly with AI-assisted brute force techniques. The findings highlight the importance of using complex, long passwords, enabling multi-factor authentication, and adopting newer hashing standards like Argon2. Organisations must stay ahead of evolving attack methods to protect sensitive credentials.
🔗 Read More

Network Security Tool Defects Are Endemic, Eroding Enterprise Defense

Cybersecurity Dive by Matt Kapko
A new study has found that security tools meant to protect networks often contain critical vulnerabilities themselves, creating gaps in enterprise defences. Misconfigurations, outdated software, and reliance on legacy systems exacerbate these weaknesses. The report calls for organisations to conduct continuous security assessments, patch vulnerabilities promptly, and implement layered defences to reduce risk. As attackers increasingly target security tools themselves, proactive monitoring and auditing are essential to maintaining a strong security posture.
🔗 Read More

White House Evaluates China AI App DeepSeek’s Effect on National Security

itNews by Andrea Shalal and David Shepardson
The Trump administration is assessing whether China’s AI-powered chatbot, DeepSeek, poses a national security risk. Officials are concerned about potential data privacy violations and AI-driven misinformation campaigns. With growing tensions between the U.S. and China over AI dominance, this review could lead to tighter restrictions on Chinese AI technologies. The outcome may also set a precedent for how governments regulate foreign AI systems, especially those with access to large-scale user data.
🔗 Read More

USPS Impersonators Tap Trust in PDFs in Smishing Attack Wave

Dark Reading by Elizabeth Montalbano
Cybercriminals are using PDF attachments in smishing campaigns that impersonate the U.S. Postal Service (USPS), tricking victims into revealing personal and financial details. The attack exploits users’ trust in official-looking documents, bypassing basic phishing detection measures. Security experts warn that PDF-based phishing is on the rise, as it can evade email security filters. Users are advised to verify sender details, avoid clicking on unsolicited links, and use multi-factor authentication to protect their accounts.
🔗 Read More

Bitwarden Makes It Harder to Hack Password Vaults Without MFA

BleepingComputer by Bill Toulas
Bitwarden has introduced new security measures to make hacking password vaults significantly more difficult for attackers who bypass or steal credentials. By requiring additional authentication checks for high-risk actions and accounts without multi-factor authentication (MFA), the update aims to reduce unauthorised access. Security experts praise the move, though they continue to stress that MFA remains essential for securing online accounts. Users are encouraged to enable MFA to maximise protection.
🔗 Read More

Someone Is Slipping a Hidden Backdoor into Juniper Routers Across the Globe, Activated by a Magic Packet

The Register by Jessica Lyons
Security researchers have discovered a covert backdoor in Juniper routers that can be remotely activated with a specially crafted “magic packet.” The backdoor, found in multiple locations worldwide, allows attackers to gain persistent access without detection. It remains unclear whether this is the work of nation-state actors or cybercriminals, but experts warn of potential espionage or large-scale cyberattacks. Network administrators are urged to apply the latest firmware updates and monitor unusual traffic patterns.
🔗 Read More

Analysis:

Cyber Insights 2025: Cyberinsurance – The Debate Continues

Security Week by Kevin Townsend
The debate over the role and sustainability of cyberinsurance is heating up as 2025 approaches. With ransomware payouts surging and insurers tightening requirements, businesses are facing higher premiums and more stringent security mandates. Some argue that cyberinsurance incentivises better security practices, while others warn it creates a false safety net. This analysis explores how the cyberinsurance market is evolving, the increasing role of regulatory pressure, and whether businesses can still rely on policies as a viable risk management strategy.
🔗 Read More

The Risks of Politicising Europe’s Tech Laws

PrivID (Substack)
As Europe’s regulatory landscape tightens, concerns are mounting over the growing politicisation of tech laws. Policymakers are increasingly using cybersecurity and data protection as geopolitical tools, creating inconsistencies in enforcement and compliance burdens for businesses. This analysis explores the long-term risks of over-regulating the sector, including stifling innovation and creating regulatory fragmentation. The piece calls for a balanced approach that prioritises security without undermining Europe’s tech competitiveness.
🔗 Read More

The Growing Complexity of Global Cybersecurity: Moving from Challenges to Action

World Economic Forum by Akshay Joshi
Cybersecurity threats are outpacing traditional defense mechanisms, and global leaders are being urged to shift from reactive to proactive security strategies. This WEF report outlines key steps businesses and governments must take, including strengthening international cyber cooperation, investing in resilience, and prioritising cyber hygiene at all levels. The report also highlights how emerging technologies like AI and quantum computing will further reshape the threat landscape. The takeaway? Cybersecurity must evolve as fast as the threats it seeks to combat.
🔗 Read More

The Cybersecurity Skills Gap Reality: We Need to Face the Challenge of Emerging Tech

CSO by Jon Oltsik
The cybersecurity skills gap is widening, and with AI, quantum computing, and new attack vectors emerging, the challenge is becoming more urgent. This analysis explores why existing training and recruitment models are failing to keep pace with technological change. Industry leaders argue that businesses must rethink hiring strategies, invest in continuous upskilling, and embrace automation to offset the shortage. Without intervention, the talent gap will continue to grow, leaving organisations vulnerable to increasingly sophisticated cyber threats.
🔗 Read More

CyAN Members Op-Eds, Articles, etc.:

Identity: The New Perimeter for Organisational Cybersecurity in the Age of Competitive AI

CyAN Blog by Joe Cozzupoli
CyAN member Joe Cozzupoli explores why identity is becoming the new frontline of cybersecurity, especially as AI-driven threats evolve. With traditional network perimeters fading, organisations must prioritise identity security to defend against credential theft, AI-powered deepfake attacks, and insider threats. Joe highlights the need for robust identity management frameworks, zero-trust principles, and continuous authentication to stay ahead of emerging risks. As AI reshapes the cyber landscape, securing identity isn’t just about access—it’s about resilience.
🔗 Read More

Beyond Data Protection Day: Safeguarding Our Digital Lives Every Day

Kim Chandler McDonald
In this insightful piece, CyAN global VP Kim Chandler McDonald argues that data privacy shouldn’t be a one-day-a-year conversation. While Data Protection Day serves as a reminder of digital rights and responsibilities, true security requires ongoing vigilance. Kim explores the increasing risks to personal and corporate data, the need for stronger privacy frameworks, and practical steps individuals and organisations can take to strengthen data sovereignty. The message is clear: cybersecurity isn’t a checkbox—it’s a continuous commitment.
🔗 Read More

Upcoming CyAN Global Events:

  • AI Global Everything, Dubai, UAE: 4-6 February
    🔗 More Info
  • CyAN APAC: The Geopolitical Impacts of Cyber Threats: From Espionage to Influence – Keynote by Dan Elliot
    📅 March 12, Peoplebank, Sydney
    (Initial tickets will be by invitation only for CyAN members, general release tickets available soon!)
  • GITEX AFRICA, Marrakesh, Morocco: 14-16 April
    🔗 More Info
  • GITEX ASIA, Singapore (Marina Bay Sands): 23-25 April
    🔗 More Info
  • GISEC, Dubai World Trade Center, Dubai, UAE: 6-8 May
    🔗 More Info
  • The Cyber Outstanding Security Performance Awards (Cyber OSPAs), London, UK: May 8
    🔗 More Info
  • MaTeCC, Rabat, Morocco: 7-9 June 2025
    (The third annual North Africa and beyond cybersecurity event, hosted by CyAN partner organisation École High-Tech.)
    🔗 More Info

Cyber (In)Securities-121

🔗 Read the original LinkedIn post

Beyond Data Protection Day: Safeguarding Our Digital Lives Every Day

Beyond Data Protection Day: Safeguarding Our Digital Lives Every Day

January 28th was Data Protection Day—a global reminder that privacy isn’t just a legal formality or an operational headache. It’s a fundamental pillar of trust. If your business handles client or customer data (and let’s be honest, that includes almost every business these days), you 

Identity: The New Perimeter for Organisational Cybersecurity in the Age of Competitive AI

Identity: The New Perimeter for Organisational Cybersecurity in the Age of Competitive AI

In today’s hyper-connected, rapidly evolving digital landscape, traditional cybersecurity paradigms no longer suffice. The perimeter-based approach, which relied on securing the network boundary, has become obsolete as organizations increasingly adopt cloud computing, remote work, and AI-driven tools. The competitive nature of artificial intelligence (AI) further 

Cyber (In)Securities – Issue 120

Information Security News

US freezes foreign aid, halting cybersecurity defence and policy funds for allies
The Register by Jessica Lyons
Read more here

The U.S. government has frozen foreign aid, including funds allocated to support allies’ cybersecurity defense and policy initiatives. This unexpected move could leave critical infrastructure in allied nations vulnerable, as many rely on U.S. funding for cyber resilience programs and threat intelligence sharing. The freeze has sparked concern among cybersecurity experts, who warn that delayed assistance could embolden cyber adversaries. The halt underscores the interconnected nature of global cybersecurity and the need for consistent, collaborative funding.

Apple fixes this year’s first actively exploited zero-day bug
Bleeping Computer by Sergiu Gatlan
Read more here

Apple has released emergency updates to patch the first zero-day vulnerability actively exploited in 2025. The bug, affecting iOS, iPadOS, and macOS, allowed attackers to execute arbitrary code with kernel privileges. Security experts urge users to update their devices immediately, as the exploit is reportedly being used in targeted attacks. This incident highlights the persistent risks of unpatched vulnerabilities and the importance of rapid response in securing consumer devices against emerging threats.

For $50, Cyberattackers Can Use GhostGPT to Write Malicious Code
Dark Reading by Jai Vijayan
Read more here

A new AI tool called GhostGPT is being sold on underground forums for as little as $50, offering cybercriminals an easy way to generate malicious code. Unlike ChatGPT, which has safeguards, GhostGPT allows unrestricted outputs, enabling attackers to create phishing emails, malware, and exploit scripts with minimal effort. The tool is being hailed as a “game-changer” for cybercrime, underscoring the need for stronger controls on AI misuse. Experts call for enhanced monitoring and stricter enforcement to address the growing threat posed by rogue AI tools.

EU sanctions Russian GRU hackers for cyberattacks against Estonia
By Sergiu Gatlan, Bleeping Computer
Read more

The European Union has imposed sanctions on members of Russia’s GRU military intelligence agency for their involvement in cyberattacks targeting Estonia. These attacks, which disrupted critical services and infrastructure, highlight the ongoing cyber conflict between Russia and EU member states. The sanctions aim to deter further aggression by freezing assets and imposing travel bans on the individuals responsible. EU officials stress that these measures reflect the bloc’s commitment to holding nation-state hackers accountable for their actions.

Hackers steal $85 million worth of cryptocurrency from Phemex
By Bill Toulas, Bleeping Computer
Read more

Hackers have stolen $85 million in cryptocurrency from Phemex, a major digital asset exchange, using sophisticated tactics to bypass security measures. The breach exposed vulnerabilities in Phemex’s systems, and affected users are being urged to monitor their accounts and change credentials. While Phemex is investigating the incident and collaborating with authorities, the attack highlights the persistent risks facing crypto platforms. Experts recommend enhanced authentication measures and robust threat detection tools to mitigate future breaches.

Google takes action after coder reports ‘most sophisticated attack I’ve ever seen’
By Connor Jones, The Register
Read more

Google has responded to a highly sophisticated cyberattack reported by a coder, describing it as one of the most advanced they’ve encountered. The attack involved layered exploits and advanced obfuscation techniques targeting Google’s cloud infrastructure. Google has since patched the vulnerabilities and is investigating the source. The incident underscores the increasing complexity of modern cyber threats and the critical need for proactive threat detection and mitigation strategies.

DeepSeek hit with ‘large-scale’ cyber-attack after AI chatbot tops app stores
By Dara Kerr, The Guardian
Read more

DeepSeek, an AI chatbot that recently topped app store charts, has fallen victim to a large-scale cyberattack. The breach disrupted services and potentially exposed user data, raising questions about the platform’s security measures. Analysts attribute the attack to the platform’s rapid growth, which may have outpaced its ability to implement adequate protections. DeepSeek has apologised to users and promised to enhance its security framework. This incident serves as a cautionary tale for companies scaling rapidly without prioritising cybersecurity.

‘Sputnik moment’: $1tn wiped off US stocks after Chinese firm unveils AI chatbot
By Dan Milmo, Amy Hawkins, Robert Booth & Julia Kollewe, The Guardian
Read more

The launch of a Chinese AI chatbot has been dubbed a “Sputnik moment,” wiping $1 trillion off U.S. tech stocks as investors react to the potential of China surpassing the U.S. in AI innovation. The chatbot’s unveiling has intensified global competition in AI development, highlighting concerns about technological supremacy and economic impacts. Analysts warn that this milestone could shift the AI landscape, prompting increased investment and innovation efforts in the U.S. to maintain a competitive edge.

GitHub Desktop Vulnerability Risks Credential Leaks via Malicious Remote URLs
By Ravie Lakshmanan, The Hacker News
Read more

A critical vulnerability in GitHub Desktop has been discovered, allowing attackers to exploit malicious remote URLs to steal user credentials. The flaw impacts both Windows and macOS versions of the application, posing a significant risk to developers relying on GitHub for code management. GitHub has released patches to address the issue and urges users to update immediately. This incident highlights the importance of securing developer tools, as they are increasingly targeted by cybercriminals to gain access to broader systems.

Open-source security spat leads companies to join forces for new tool
By Greg Otto, Cyberscoop
Read more

Amid growing concerns over open-source vulnerabilities, leading companies have collaborated to create a new tool designed to enhance open-source security. This initiative follows high-profile disputes over accountability in maintaining widely used libraries. The tool aims to provide real-time monitoring, automated updates, and vulnerability scanning to address gaps in open-source projects. This collaboration underscores the industry’s recognition of shared responsibility in safeguarding open-source ecosystems critical to global technology infrastructure.

Sweden seizes cargo ship after another undersea cable hit in suspected sabotage
By Jude Karabus, The Register
Read more

Swedish authorities have seized a cargo ship following another incident of undersea cable damage in what is suspected to be sabotage. The damaged cable disrupted critical communications, adding to concerns over the vulnerability of undersea infrastructure. Investigators are examining whether state-sponsored actors or criminal groups are behind the attacks. This latest incident highlights the urgent need for enhanced protection of global communication networks and international cooperation to address potential threats.

GamaCopy Mimics Gamaredon Tactics in Cyber Espionage Targeting Russian Entities
By Ravie Lakshmanan, The Hacker News
Read more

A new cyber espionage campaign dubbed “GamaCopy” is mimicking the tactics of the Gamaredon group to target Russian entities. The campaign uses phishing emails and malware-laced documents to steal sensitive information. Security experts believe the threat actors aim to obscure their identities by replicating known techniques. Organisations are advised to implement advanced threat detection systems and educate employees on phishing risks. This incident highlights the evolving strategies of cybercriminals to remain undetected while targeting high-value entities.

Change Healthcare Data Breach Exposed the Private Data of over Half the U.S.
By Pierluigi Paganini, Security Affairs
Read more

A data breach at Change Healthcare has exposed sensitive personal and medical information for over half the U.S. population. The breach impacted data stored in its systems, including health records, billing details, and insurance information. Security experts warn that this incident poses a significant risk of identity theft and fraud. Change Healthcare is working to mitigate the fallout and improve its security posture. The breach underscores the vulnerabilities in healthcare systems and the critical need for stronger data protection measures.

SonicWall warns hackers targeting critical vulnerability in SMA 1000 series appliances
By David Jones, Cybersecurity Dive
Read more

SonicWall has issued an urgent warning about a critical vulnerability in its SMA 1000 series appliances, which attackers are actively exploiting. The flaw allows remote code execution, enabling cybercriminals to gain control of affected systems. SonicWall has released patches and advises users to update immediately. This incident highlights the risks of delaying critical updates and the importance of regular vulnerability scanning in enterprise environments. Organisations are urged to prioritise patch management to prevent potential exploitation.

UnitedHealth hikes number of Change cyberattack breach victims to 190M
By Emily Olsen, Cybersecurity Dive
Read more

UnitedHealth has disclosed that 190 million individuals were affected by the cyberattack on Change Healthcare, significantly increasing the initially reported figure. This update raises concerns about the scale of the attack and its long-term impact on victims. UnitedHealth is working with regulators to address the fallout, but the incident serves as a wake-up call for better security investments in the healthcare sector.


Analysis

Cyber Insights 2025: Cybersecurity Regulatory Mayhem
Security Week by Kevin Townsend
Read more here

This analysis explores the growing complexity of global cybersecurity regulations heading into 2025. Organisations are struggling to navigate overlapping frameworks, from GDPR to the latest mandates on AI and data governance. The article highlights the importance of proactive compliance strategies, as falling behind could mean severe penalties and reputational damage. With governments introducing more sector-specific rules, businesses need to embrace agility and cross-border collaboration to stay compliant and competitive.

Post-Quantum Cryptography 2025: The Enterprise Readiness Gap
ISMG Data Breach Today by Sandhya Michu
Read more here

As post-quantum cryptography gains traction, enterprises are facing challenges in readiness and implementation. This analysis highlights a significant gap in preparation, with many organisations struggling to transition to quantum-safe encryption standards. The article urges leaders to prioritise migration strategies, invest in workforce education, and collaborate with industry groups to accelerate readiness. Early adoption of post-quantum solutions will be key to safeguarding sensitive data against future quantum computing threats.

World Economic Forum 2025: Navigating Cybersecurity in an Era of Complexity
Lohrmann on Cybersecurity by Dan Lohrmann
Read more here

At the 2025 World Economic Forum, cybersecurity took centre stage as leaders grappled with the complexities of an interconnected digital economy. Discussions focused on global collaboration, AI-driven cyber threats, and strengthening critical infrastructure resilience. The article emphasises the need for public-private partnerships to address emerging risks and foster trust across industries. With cyberattacks becoming more sophisticated, the forum highlighted the urgency of proactive strategies to ensure a secure digital future.

Navigating The Next Frontier Of Email Threats: Five Emerging Attacks Shaping Cybersecurity In 2025
Forbes by Mike Britton
Read more here

This analysis highlights five emerging email-based cyber threats poised to dominate 2025, including AI-driven phishing, business email compromise (BEC) 3.0, and deepfake-enabled scams. As attackers evolve their tactics, businesses face greater challenges in protecting communication channels. The article stresses the importance of advanced threat detection tools and employee training to counter these risks. Organisations that prioritise innovation in email security stand a better chance of staying ahead of these sophisticated attacks.


CyAN Members Op Eds, Articles, etc.


China’s Open-Source AI: The genie is out of the bottle, and the race is on
By Kim Chandler McDonald
Read more here

CyAN global VP Kim Chandler McDonald explores the transformative impact of China’s open-source AI revolution on global geopolitics, economics, and investment strategies. By leveraging open-source innovation, China is rapidly altering the balance of technological power, sparking heightened competition in AI development. The article examines how these advancements are not only disrupting global markets but also influencing international investment flows and prompting shifts in AI funding priorities. Kim calls for stakeholders worldwide to reassess their strategies in light of China’s ambitious push, framing the race as a pivotal moment for global economic and technological leadership.

Criminal hackers, QILIN Ransomware Group
By Dan Elliot
Read more here

CyAN member Dan Elliot provides an in-depth look at the QILIN ransomware group, notorious for its sophisticated double-extortion tactics. The group targets enterprises by encrypting data and threatening to leak sensitive information if ransoms aren’t paid. Dan highlights their evolving techniques, including leveraging advanced encryption and social engineering to increase their success rate. The article serves as a critical reminder of the need for strong incident response plans and robust cybersecurity measures.


CyAN Member’s News:

Shantanu Bhattacharya Nominated for Cyber Security Entrepreneur of the Year
Congratulations to CyAN member Shantanu Bhattacharya on his nomination for Cyber Security Entrepreneur of the Year.

Read more here


Upcoming CyAN Global Events

AI Global Everything, Dubai, UAE: February 4-6
Visit website

CyAN APAC: The Geopolitical Impacts of Cyber Threats: March 12, Peoplebank, Sydney (Save the date, tickets available soon!)GITEX AFRICA, Marrakesh, Morocco: April 14-16
Visit website

GITEX ASIA, Singapore (Marina Bay Sands): April 23-25
Visit website

GISEC: Dubai World Trade Center, Dubai, UAE: May 6-8
Visit website

The Cyber Outstanding Security Performance Awards (Cyber OSPAs), London, UK: May 8
Visit website

MaTeCC: Rabat, Morocco: June 7-9
Visit website

China’s Open-Source AI: The genie is out of the bottle, and the race is on

China’s AI ambitions have been making headlines for years, but recent developments have thrown a curveball into the global tech landscape. DeepSeek, a Chinese AI company, has managed to develop a top-tier AI model despite facing significant sanctions and restrictions. And here’s the kicker—it’s open