Recent Posts
Breaking Into Tech: What No One Tells You as a New Grad by Efe Zindanci
I just graduated from Isik University with a Bachelor of Computer Science and Engineering, and like many recent graduates, I am working on finding my place in the tech world. It feels exciting because it opens new possibilities, but it is also stressful at times …
Week 48 – FortiWeb Pulls OS Commands Out of a Hat
14 – 30 Nov 2025 A newly disclosed and actively exploited FortiWeb vulnerability (CVE-2025-58034) allows authenticated attackers to execute arbitrary OS commands, posing a serious risk to organizations relying on the platform for critical web application protection. Despite its medium-severity vulnerability (CVSS score of 6.7), …
Week 47 – Puppet Master on the Web: Chrome’s V8 Flaw Pulled by Attackers
17 – 23 Nov 2025 On Monday Google released security updates for its Chrome browser to address two security flaws, including one that has come under active exploitation in the wild. Our CVE of the Week is about CVE-2025-13223 vulnerability with a CVSS score of …
Cyber (In)Securities – Issue 180
You can download this edition by clicking the three dots icon on the far right and selecting Download PDF File. For the best reading experience, we recommend enlarging it by clicking the fullscreen icon, which is the third icon from the right. All article titles …
Please welcome our newest member from the United States, Prasad Shinde
Director, Automation and Cybersecurity OT Practitioner With over sixteen years of experience in industrial automation and cybersecurity, Prasad specialises in architecting secure and resilient systems across Oil and Gas, Cement, and Power sectors. As a PMP certified project leader and Agile practitioner, he brings extensive …
Week 46 – The Antivirus That Opened the Door: Triofox Under Active Attack
10 – 16 Nov 2025 Mandiant has confirmed that threat actors are actively exploiting a critical flaw (CVE-2025-12480) in Triofox by Gladinet — a remote access and file-sharing platform.The vulnerability allows authentication bypass, letting attackers create admin accounts and execute arbitrary code by abusing the …
Cyber (In)Securities – Issue 179
Quantum Breakthroughs, Major Breaches, and Machine-Speed Threats You can download this edition by clicking the three dots icon on the far right and selecting Download PDF File. For the best reading experience, we recommend enlarging it by clicking the fullscreen icon, which is the third …
When Minds Meet Machines: Cybersecurity and the Coming Age of Neurotechnology
From Data to Thought For decades, cybersecurity has been concerned with protecting what we know — our data, our systems, our networks. Neurotechnology, by contrast, is beginning to probe something even more intimate: what we think. As the boundaries between biological systems and digital networks …





