Recent Posts

Deepfakes, Digital Trust, and the Urgent Case for Safety by Design

Deepfakes, Digital Trust, and the Urgent Case for Safety by Design

Last week’s ruling in Australia marks a first. Anthony Rotondo was fined $343,500 for creating and distributing deepfake pornography of prominent women. It’s a milestone case, the first of its kind under the Online Safety Act, and it sends a clear message: image-based abuse is 

The Weakest Link is Still Human: Why social engineering remains the top cyber threat and how we keep falling for it by Isobel McCaffery

The Weakest Link is Still Human: Why social engineering remains the top cyber threat and how we keep falling for it by Isobel McCaffery

If it seems too good to be true, it probably is. That was one of my mother’s favourite sayings growing up. Back then, I thought it was just her way of both avoiding doing something preventing my brother and me from arguing with her decisions. 

Week 39 – When the Postman is a Hacker: WHD’s AjaxProxy Leads to Total Compromise

22 – 28 Sept 2025 SolarWinds Web Help Desk (WHD) is a comprehensive help desk and ticketing solution designed for medium to large organizations. It supports IT support request tracking, workflow automation, asset management, and compliance monitoring in enterprise environments. Our current CVE of the 

Cyber (In)Securities – Issue 172

Cyber (In)Securities – Issue 172

AI, Botnets, and the Expanding Global Threatscape The latest edition of Cyber (In)Securities spotlights the fast-shifting cybersecurity landscape across the globe. From botnets exploiting cloud misconfigurations to AI reshaping regulatory debates, Edition 172 brings together news, analysis, and community insights to help leaders stay ahead 

Cyber (In)Securities – Issue 171

Cyber (In)Securities – Issue 171

Remote Access Exploits, Proxy Botnets, and Global Breaches This edition of Cyber (In)Securities explores how cybercriminals are scaling their operations and exploiting trusted tools to infiltrate enterprise systems. From remote monitoring and management (RMM) abuse to global supply chain breaches, this issue delivers critical insights 

Week 38 – From Chaos to Catastrophe: CVEs Shake Chaos Mesh

15 – 21 Sept 2025 What is chaos engineering? No, with this week’s CVE of the Week post, we do not want to dominate the world. Chaos engineering is a proactive testing approach to intentionally introduce failures and errors into systems to investigate their resiliency 

CyAN Mentorship: A Global Journey in Motion

CyAN Mentorship: A Global Journey in Motion

The September 2025 cohort of the CyAN Mentorship Program is in full motion, bringing together mentors and mentees from across the globe. From Sydney to Spain, from Bahrain to Budapest, from India to Morocco, and from the United Arab Emirates to the United States, this 

Is LinkedIn Becoming the New Facebook?

Is LinkedIn Becoming the New Facebook?

Somewhere along the way, LinkedIn — once a place for job hunting, industry updates, and the occasional humblebrag about promotions — started to feel… familiar. And not in the good way. If you’re getting déjà vu from the golden days of Facebook (life updates, inspirational 

Week 37 – From Carts to Carnage: SessionReaper Targets Magento

8-15 Sept 2025 Patch Tuesday’s security bulletin at Adobe has been published and it includes a serious entry with the ID CVE-2025-54236, our CVE of the Week this week. The vulnerability dubbed SessionReaper affects Adobe Commerce and Magento, Adobe’s e-commerce solutions. SessionReaper resides within Magento’s 

Cyber (In)Securities – Issue 170

Cyber (In)Securities – Issue 170

AI Copyright Theft, NPM Supply-Chain Attack, and Global Child Safety Laws his edition of Cyber (In)Securities brings together the latest cybersecurity alerts, incidents, and insights from across the world. From Australia to Brazil, the United States, South Korea, and Europe, governments and businesses are confronting