Recent Posts

No Time for Antics with Semantics: Why CVEs Are Cybersecurity’s Lifeline

No Time for Antics with Semantics: Why CVEs Are Cybersecurity’s Lifeline

The cybersecurity world runs on shared language. We don’t often talk about it in those terms—but that’s exactly what the CVE (Common Vulnerabilities and Exposures) system is. A global taxonomy of flaws. A universal index of weakness. The quiet backbone that lets defenders coordinate responses 

What happens to Heroes?” EPISODE #4: The Unsung Heroes of the Digital World by Didier Annet

What happens to Heroes?” EPISODE #4: The Unsung Heroes of the Digital World by Didier Annet

The Psychological Impacts of Cyberattacks This is the fourth episode of a story related to individuals who, in a matter of moments, transition from “employees” to “rescuers” in the immediate aftermath of a destructive cyberattack. What I will call the “Heroes”! Let’s Rewrite the Story 

La Liga:  Blocking of Cloudflare IPs in Spain

La Liga: Blocking of Cloudflare IPs in Spain

On the 26 of March 2025, the Commercial Court No. 6 of Barcelona Spain dismissed a complaint by Cloudflare and RootedCON against the Spanish La Liga football (soccer, for our American friends) league, in which the complainants attempted to overturn a previous judicial ruling allowing blocking of Cloudflare IP addresses in an attempt to combat “audiovisual piracy”.

As a result, a significant number of sites hosted by Cloudflare are not reachable from within Spain. This includes users’ private data stored on Cloudflare R2. More details are available on a blog post on swhosting.com. El Economista has further details (Spanish link) on the court’s decision.

Screenshot of the error message received by a reddit user:

The link in the screenshot: https://www.laliga.com/noticias/nota-informativa-en-relacion-con-el-bloqueo-de-ips-durante-las-ultimas-jornadas-de-laliga-ea-sports-vinculadas-a-las-practicas-ilegales-de-cloudflare

This should be of exceptional concern to organizations using cloud storage. Without entering into a discussion of intellectual property laws and their enforcement, or how realistic La Liga’s claims about losses from unlicensed viewing of football matches are, the league’s moves and the subsequent court decisions display a stunning ignorance of how IP addressing and cloud services work.

By allowing the block to stand, the court has created significant operational risk to companies relying on cloud hosted content and services, and completely fails to take into account other organizations’ right to exist online. All that matters is enforcement of one entity’s claimed IP rights.

The potential chilling effects on anyone operating legitimately on the Internet with absolutely zero involvement or interest in La Liga or other rights holders’ activities and content is shocking. While most cloud service providers will take action against reports of hosted content that violates specific laws, there is not a single cloud service provider that does not host any such material from at least one user.

Taking this decision to its extreme, intellectual property rights holders could knock huge swathes of the Internet offline. If its claims of lost profits from copyright violation are taken into account, then La Liga should also be held responsible for reimbursing companies caught up in this block for their lost profitability. A far more reasonable approach would be to force Cloudflare to confirm removal of specific reported content confirmed to violate IP rules.

The decision prevents further appeals via Spanish courts, but it remains to be seen whether Cloudflare will pursue recourse at a European level – let’s hope so.

Welcome New Member – Younès Felahi from Morocco

Welcome New Member – Younès Felahi from Morocco

Please welcome our newest member from Morocco, Younès Felahi 👋 Younes FELAHI, a recognized cybersecurity expert in Morocco and Africa, has over 15 years of experience in the field. He has held positions as a consultant, architect, and expert in cyber strategies, governance, risk and 

Cyber (In)Securities – Issue 140

Cyber (In)Securities – Issue 140

Information Security News Tariffs May Prompt Increase in Global CyberattacksDark Reading – Robert Lemos US Comptroller Cyber ‘Incident’ Compromises Org’s EmailsDark Reading – Kristina Beek Wyden Blocks Trump’s CISA Boss Nominee, Blames Cyber Agency for ‘Actively Hiding Info’ About Telecom InsecurityThe Register – Jessica Lyons 

Cyber (In)Securities – Issue 139

Cyber (In)Securities – Issue 139


Information Security News

  1. Autonomous, GenAI-Driven Attacker Platform Enters the Chat
    Dark Reading – Elizabeth Montalbano
  2. EncryptHub’s dual life: Cybercriminal vs Windows bug-bounty researcher
    BleepingComputer – Bill Toulas
  3. Voluntary ‘Pall Mall Process’ seeks to curb spyware abuses
    Cyberscoop – Tim Starks
  4. That massive GitHub supply chain attack? It all started with a stolen SpotBugs token
    The Register – Jessica Lyons
  5. EU wants to give encryption backdoors a try, despite pushback
    The Stack – Noah Bovenizer
  6. Google addresses 2 actively exploited vulnerabilities in security update
    Cyberscoop – Matt Kapko
  7. Scattered Spider’s ‘King Bob’ Pleads Guilty to Cyber Charges
    Dark Reading – Kristina Beek
  8. Malicious VSCode extensions infect Windows with cryptominers
    BleepingComputer – Bill Toulas
  9. NSW Electoral Commission asks for cyber security top-up
    itNews – Ry Crozier
  10. Chrome to patch decades-old flaw that let sites peek at your history
    The Register – Thomas Claburn
  11. UK’s attempt to keep details of Apple ‘backdoor’ case secret… denied
    The Register – Connor Jones
  12. EDR-as-a-Service Makes the Headlines in the Cybercrime Landscape
    Security Affairs – Pierluigi Paganini
  13. European Commission pushes for encryption ‘backdoors’
    Brussels Signal – Paddy Belton
  14. EU set to fine Elon Musk’s X up to $1 billion for breaking disinformation law
    Irish Star – Jeremiah Hassel
  15. E-ZPass toll payment texts return in massive phishing wave
    BleepingComputer – Bill Toulas
  16. Expert Used ChatGPT-4O to Create a Replica of His Passport in Just 5 Minutes Bypassing KYC
    Security Affairs – Pierluigi Paganini
  17. Microsoft Credits EncryptHub, Hacker Behind 618+ Breaches, for Disclosing Windows Flaws
    The Hacker News – Ravie Lakshmanan
  18. WinRAR flaw bypasses Windows Mark of the Web security alerts
    BleepingComputer – Ionut Ilascu
  19. Malicious Python Packages on PyPI Downloaded 39,000+ Times, Steal Sensitive Data
    The Hacker News – Ravie Lakshmanan
  20. Senators re-up bill to expand Secret Service’s financial cybercrime authorities
    Cyberscoop – Matt Bracken
  21. PoisonSeed phishing campaign behind emails with wallet seed phrases
    BleepingComputer – Bill Toulas
  22. Call Records of Millions Exposed by Verizon App Vulnerability
    SecurityWeek – Eduard Kovacs
  23. Trump fires Gen. Timothy Haugh from leadership of Cyber Command and NSA
    Cyberscoop – Mark Pomerleau
  24. Europcar GitLab breach exposes data of up to 200,000 customers
    BleepingComputer – Ionut Ilascu
  25. Rafts of Security Bugs Could Rain Out Solar Grids
    Dark Reading – Kristina Beek
  26. SpotBugs Access Token Theft Identified as Root Cause of GitHub Supply Chain Attack
    The Hacker News – Ravie Lakshmanan
  27. State Bar of Texas Says Personal Information Stolen in Ransomware Attack
    SecurityWeek – Ionut Arghire
  28. OPSEC Failure Exposes Coquettte’s Malware Campaigns on Bulletproof Hosting Servers
    The Hacker News – Ravie Lakshmanan
  29. Australian super funds compromised after data breach as hackers use stolen passwords
    The Guardian – Josh Taylor
  30. “Nudify” deepfakes stored unprotected online
    Malware Bytes – Pieter Arntz

Analysis

  1. PCI DSS 4.0.1: A Cybersecurity Blueprint by the Industry, for the Industry
    SecurityWeek – Kevin Townsend
  2. Intergenerational Mentoring: Key to Cybersecurity’s AI Future
    Dark Reading – Han Cho
  3. State-Sponsored AI Attacks: How Nations Are Using AI to Wage Digital War – The Weaponisation of AI in Cyber Warfare – Part 2
    PrivID (Substack)
  4. Australia’s social media ban is attracting global praise – but we’re no closer to knowing how it would work
    The Guardian – Josh Taylor
  5. Secure Communications Evolve Beyond End-to-End Encryption
    Dark Reading – Robert Lemos

CyAN Members: Op Eds, Articles, etc.

  1. Protecting the Power of AI: Strategies Against Emerging Security Risks
    RSAC Conference – Shantanu Bhattacharya
  2. Antivirus, Firewalls, and VPNs: What Do They Actually Do?
    Fel Gayanilo

🗓️ Upcoming CyAN (and CyAN Partner) Global Events:

SCCS Logo

📍 Lisbon, Portugal

Supply Chain Cyber Security Summit (SCCS)
April 9–11

Read more
GITEX AFRICA Logo

📍 Marrakesh, Morocco

GITEX AFRICA
April 14–16

Read more
GITEX ASIA Logo

📍 Singapore

GITEX ASIA
April 23–25

Read more
GISEC Logo

📍 Dubai, UAE

GISEC
May 6–8

Read more
Cyber OSPAs Logo

📍 London, UK

Cyber OSPAs
May 8

Read more
CSG Awards Logo

📍 Dubai, UAE

CSG Awards 2025
May 7

Read more
World AI Expo Logo

📍 Dubai, UAE

World AI Technology Expo
May 14–15

Read more

🎉 Celebration

CyAN 10th Anniversary
(Details TBA)

GITEX Europe Logo

📍 Berlin, Germany

GITEX Europe Messe
May 21–23

Read more
MaTeCC Logo

📍 Rabat, Morocco

MaTeCC
June 7–9

Read more

🌐 Online

CyAN Q2 Call (APAC + Gulf)
June 11 – 12:00 GST / 16:00 SGT / 18:00 AEST

🌐 Online

CyAN Q2 Call (EMEA + Americas)
June 11 – 20:00 GST / 18:00 CET / 17:00 UTC / 12:00 EDT

Behind the Keys: Women Who Secure the Future – Fatema Fardan

Behind the Keys: Women Who Secure the Future – Fatema Fardan

📄 Download Feature PDF Want to connect? Here is Fatema Fardan’s professional profile. Feel free to say hello and show your support. 🔗 Connect on LinkedIn About the Author Saba Bagheri, PhD Cyber Threat Intelligence Manager at Bupa APAC Director at the Cybersecurity Advisors Network 

Behind the Keys: Women Who Secure the Future – Edna Conway

Behind the Keys: Women Who Secure the Future – Edna Conway

📄 Download Feature PDF Want to connect? Here is Edna Conway’s professional profile. Feel free to say hello and show your support. 🔗 Connect on LinkedIn About the Author Saba Bagheri, PhD Cyber Threat Intelligence Manager at Bupa APAC Director at the Cybersecurity Advisors Network 

Cyber (In)Securities – Issue 138

Cyber (In)Securities – Issue 138


Information Security News

  1. Disclosure Drama Clouds CrushFTP Vulnerability Exploitation
    Dark Reading – Rob Wright
  2. CISA warns of Fast Flux DNS evasion used by cybercrime gangs
    BleepingComputer – Bill Toulas
  3. Google Quick Share Bug Bypasses Allow Zero-Click File Transfer
    Dark Reading – Tara Seals
  4. China-Linked Threat Group Exploits Ivanti Bug
    Dark Reading – Jai Vijayan
  5. International intelligence agencies raise the alarm on fast flux
    Cyberscoop – Greg Otto
  6. Oracle privately confirms Cloud breach to customers
    BleepingComputer – Sergiu Gatlan
  7. T-Mobile Bug Reveals Names, Images, and Locations of Random Children
    Gizmodo – Lucas Ropek
  8. Cybersecurity professor targeted by FBI has not been detained, lawyer says
    Reuters – A.J. Vicens
  9. X (Twitter) data leak exposes 2.8 billion users in supposed “inside job”
    Proactive – Phoebe Shields
  10. New Advanced FIN7’s Anubis Backdoor Allows To Gain Full System Control On Windows
    Security Affairs – Pierluigi Paganini
  11. Genetic data site openSNP to close and delete data over privacy concerns
    BleepingComputer – Bill Toulas
  12. Crimelords at Hunters International tell lackeys ransomware too ‘risky’
    The Register – Connor Jones
  13. Royal Mail investigates data leak claims, no impact on operations
    BleepingComputer – Sergiu Gatlan
  14. Police shuts down KidFlix child sexual exploitation platform
    BleepingComputer – Sergiu Gatlan
  15. Google DeepMind Unveils Framework to Exploit AI’s Cyber Weaknesses
    SecurityWeek – Kevin Townsend
  16. Cisco warns of CSLU backdoor admin account used in attacks
    BleepingComputer – Sergiu Gatlan
  17. Hackers Could Unleash Chaos Through Backdoor in China-Made Robot Dogs
    SecurityWeek – Ryan Naraine
  18. Cybercom discovered Chinese malware in South American nations
    Defensescoop – Mark Pomerleau
  19. Data protection bill leaves room for governmental abuse, campaigners warn
    The Guardian – Rachel Hall
  20. Japan Bolsters Cybersecurity Safeguards With Cyber Defense Bill
    Dark Reading – Kristina Beek
  21. North Korean IT worker army expands operations in Europe
    BleepingComputer – Sergiu Gatlan
  22. We Smell a (DC)Rat: Revealing a Sophisticated Malware Delivery Chain
    BleepingComputer / Acronis
  23. Apple fined €150 million over App Tracking Transparency issues
    BleepingComputer – Sergiu Gatlan
  24. 81% of Australian IT leaders want more government intervention to help them manage cybersecurity
    itWire – Gordon Peters
  25. Signal downloads skyrocket in Yemen, US after leak
    Semafor – Rachyl Jones
  26. CISA spots spawn of Spawn malware targeting Ivanti flaw
    The Register – Iain Thomson

Analysis

  1. End-to-End Encryption Under Fire: The Trojan Horse of “Public Safety”
    PrivID (Substack)
  2. Oracle’s masterclass in breach comms: Deny, deflect, repeat
    The Register – Connor Jones
  3. AI Giving Rise of the ‘Zero-Knowledge’ Threat Actor
    SecurityWeek – Etay Maor
  4. How an Interdiction Mindset Can Help Win War on Cyberattack
    Dark Reading – Mike McNerney
  5. Independent tests show why orgs should use third-party cloud security services
    Cyberscoop – Matt Kapko
  6. FDA’s Critical Role in Keeping Medical Devices Secure
    Dark Reading – Morey J. Haber
  7. Lock Your Digital Doors: Why SMEs Must Get Better At Cybersecurity
    Forbes – Peter Boolkah
  8. ENISA NIS360 2024 Cybersecurity Maturity & Criticality Assessment
    ENISA
  9. Game-Changing Predictions for Cybersecurity in 2025
    Via Satellite – Annamarie Nyirady

CyAN Members: Op-Eds & Articles

  1. Backdoors, Robot Dogs, and Why Trust Must Be Built In—Not Bolted On
    Kim Chandler McDonald
  2. “What happens to Heroes?” EPISODE #3 – The Psychological Impacts of Cyberattacks
    Didier Annet (CyAN Member)
  3. CyAN Signs 3 Open Letters Against Surveillance Laws
    CyAN Blog – CyAN Staff
  4. Strengthening Global Security: Data Protection as National Imperative
    Kim Chandler McDonald

Online Safety for Kids and Teens

  1. Highlights from the latest Vys ‘Online Safety for Kids and Teens’ Biweekly Brief
    Vaishnavi J – Vyanams Strategies (CyAN Member)

Women in Tech Feature Articles

  1. How might reduced DEI measures impact women in tech?
    Silicon Republic – Laura Varley
  2. Survey Says Women Are Finding New Paths to Cybersecurity
    GovTech Today
  3. Women in tech an untapped $6.5bn opportunity
    InnovationAus – Joseph Brookes
  4. The Case for More Women in Cybersecurity: Strengthening the Industry With Diverse Talent
    Security Brief – Zoya Schaller
  5. Full Women in Tech Feature – Interviews
    CyAN

🗓️ Upcoming CyAN (and CyAN Partner) Global Events:

📍 Lisbon, Portugal

Supply Chain Cyber Security Summit (SCCS)
April 9–11

Read more

📍 Marrakesh, Morocco

GITEX AFRICA
April 14–16

Read more

📍 Singapore

GITEX ASIA
April 23–25

Read more

📍 Dubai, UAE

GISEC
May 6–8

Read more

📍 London, UK

Cyber OSPAs
May 8

Read more

📍 Dubai, UAE

CSG Awards 2025
May 7

Read more

📍 Dubai, UAE

World AI Technology Expo
May 14–15

Read more

🎉 Celebration

CyAN 10th Anniversary
(Details TBA)

📍 Berlin, Germany

GITEX Europe Messe
May 21–23

Read more

📍 Rabat, Morocco

MaTeCC
June 7–9

Read more

🌐 Online

CyAN Q2 Call (APAC + Gulf)
June 11 – 12:00 GST / 16:00 SGT / 18:00 AEST

🌐 Online

CyAN Q2 Call (EMEA + Americas)
June 11 – 20:00 GST / 18:00 CET / 17:00 UTC / 12:00 EDT

Behind The Keys: Women Who Secure the Future

Behind The Keys: Women Who Secure the Future

(In)Securities Special Edition (In)Securities Special Edition Celebrating International Women in Tech Day Editor-in-Chief Kim Chandler McDonald Co-Founder and CEO of 3 Steps Data Global VP at CyAN An award-winning author and advocate for cybersecurity, compliance, and digital sovereignty. Kim drives global conversations on data governance