Recent Posts
Cyber (In)Securities – Issue 188
You can download this edition by clicking the three dots icon on the far right and selecting Download PDF File. For the best reading experience, we recommend enlarging it by clicking the fullscreen icon, which is the third icon from the right. All article titles …
Introducing the mentors of the CyAN Global Mentorship Programme | March–May 2026
We are proud to welcome an outstanding group of mentors who will be supporting the March 2026 intake of the CyAN Global Mentorship Programme. This mentor cohort represents deep, real-world experience across cybersecurity, privacy, risk, governance, law, artificial intelligence, and trust and safety. Based across …
Week 6 – When ++ Turns into a Minus
2 – 8 Feb 2026 Earlier this week, a security advisory reported a high-severity vulnerability in Notepad++, rated CVSS 7.7. But first of all, what is Notepad++? For those who may not be familiar with it, Notepad++ is a free, open-source text and source code …
Please welcome our newest member from Barcelona, Spain, Ahmet Can Kan
Ahmet Can Kan is a cybersecurity professional with hands-on experience across offensive security, digital forensics, and threat intelligence. His work focuses on understanding adversary behaviour end to end, from initial access through to impact, and translating real-world attack techniques into practical defensive improvements. Ahmet is …
Strengthening cybersecurity in Ivory Coast with a partnership with ANSSI-CI
Cybersecurity Advisors Network (CyAN) signed on 5 February 2026 a Memorandum of Understanding with ANSSI-CI, the National Cybersecurity Agency of Ivory Coast. On Thursday 5 February 2026, the National Agency for the Security of Information Systems of Ivory Coast (ANSSI-CI) and CyAN (Cybersecurity Advisors Network) …
Cyber (In)Securities – Issue 187
You can download this edition by clicking the three dots icon on the far right and selecting Download PDF File. For the best reading experience, we recommend enlarging it by clicking the fullscreen icon, which is the third icon from the right. All article titles …
Week 5 – Trusted by Default: Why Microsoft Office Remains a Prime Target
26 Jan – 1 Feb 2026 This week’s CVE of the Week highlights an actively exploited security feature bypass vulnerability in Microsoft Office. Microsoft Office is an office suite and a family of client software, server software, and services developed by Microsoft.It’s one of the …
Cyber (In)Securities – Issue 186
You can download this edition by clicking the three dots icon on the far right and selecting Download PDF File. For the best reading experience, we recommend enlarging it by clicking the fullscreen icon, which is the third icon from the right. All article titles …







