Recent Posts

Welcome New Member – Younès Felahi from Morocco

Welcome New Member – Younès Felahi from Morocco

Please welcome our newest member from Morocco, Younès Felahi 👋 Younes FELAHI, a recognized cybersecurity expert in Morocco and Africa, has over 15 years of experience in the field. He has held positions as a consultant, architect, and expert in cyber strategies, governance, risk and 

Cyber (In)Securities – Issue 140

Cyber (In)Securities – Issue 140

Information Security News Tariffs May Prompt Increase in Global CyberattacksDark Reading – Robert Lemos US Comptroller Cyber ‘Incident’ Compromises Org’s EmailsDark Reading – Kristina Beek Wyden Blocks Trump’s CISA Boss Nominee, Blames Cyber Agency for ‘Actively Hiding Info’ About Telecom InsecurityThe Register – Jessica Lyons 

Cyber (In)Securities – Issue 139

Cyber (In)Securities – Issue 139


Information Security News

  1. Autonomous, GenAI-Driven Attacker Platform Enters the Chat
    Dark Reading – Elizabeth Montalbano
  2. EncryptHub’s dual life: Cybercriminal vs Windows bug-bounty researcher
    BleepingComputer – Bill Toulas
  3. Voluntary ‘Pall Mall Process’ seeks to curb spyware abuses
    Cyberscoop – Tim Starks
  4. That massive GitHub supply chain attack? It all started with a stolen SpotBugs token
    The Register – Jessica Lyons
  5. EU wants to give encryption backdoors a try, despite pushback
    The Stack – Noah Bovenizer
  6. Google addresses 2 actively exploited vulnerabilities in security update
    Cyberscoop – Matt Kapko
  7. Scattered Spider’s ‘King Bob’ Pleads Guilty to Cyber Charges
    Dark Reading – Kristina Beek
  8. Malicious VSCode extensions infect Windows with cryptominers
    BleepingComputer – Bill Toulas
  9. NSW Electoral Commission asks for cyber security top-up
    itNews – Ry Crozier
  10. Chrome to patch decades-old flaw that let sites peek at your history
    The Register – Thomas Claburn
  11. UK’s attempt to keep details of Apple ‘backdoor’ case secret… denied
    The Register – Connor Jones
  12. EDR-as-a-Service Makes the Headlines in the Cybercrime Landscape
    Security Affairs – Pierluigi Paganini
  13. European Commission pushes for encryption ‘backdoors’
    Brussels Signal – Paddy Belton
  14. EU set to fine Elon Musk’s X up to $1 billion for breaking disinformation law
    Irish Star – Jeremiah Hassel
  15. E-ZPass toll payment texts return in massive phishing wave
    BleepingComputer – Bill Toulas
  16. Expert Used ChatGPT-4O to Create a Replica of His Passport in Just 5 Minutes Bypassing KYC
    Security Affairs – Pierluigi Paganini
  17. Microsoft Credits EncryptHub, Hacker Behind 618+ Breaches, for Disclosing Windows Flaws
    The Hacker News – Ravie Lakshmanan
  18. WinRAR flaw bypasses Windows Mark of the Web security alerts
    BleepingComputer – Ionut Ilascu
  19. Malicious Python Packages on PyPI Downloaded 39,000+ Times, Steal Sensitive Data
    The Hacker News – Ravie Lakshmanan
  20. Senators re-up bill to expand Secret Service’s financial cybercrime authorities
    Cyberscoop – Matt Bracken
  21. PoisonSeed phishing campaign behind emails with wallet seed phrases
    BleepingComputer – Bill Toulas
  22. Call Records of Millions Exposed by Verizon App Vulnerability
    SecurityWeek – Eduard Kovacs
  23. Trump fires Gen. Timothy Haugh from leadership of Cyber Command and NSA
    Cyberscoop – Mark Pomerleau
  24. Europcar GitLab breach exposes data of up to 200,000 customers
    BleepingComputer – Ionut Ilascu
  25. Rafts of Security Bugs Could Rain Out Solar Grids
    Dark Reading – Kristina Beek
  26. SpotBugs Access Token Theft Identified as Root Cause of GitHub Supply Chain Attack
    The Hacker News – Ravie Lakshmanan
  27. State Bar of Texas Says Personal Information Stolen in Ransomware Attack
    SecurityWeek – Ionut Arghire
  28. OPSEC Failure Exposes Coquettte’s Malware Campaigns on Bulletproof Hosting Servers
    The Hacker News – Ravie Lakshmanan
  29. Australian super funds compromised after data breach as hackers use stolen passwords
    The Guardian – Josh Taylor
  30. “Nudify” deepfakes stored unprotected online
    Malware Bytes – Pieter Arntz

Analysis

  1. PCI DSS 4.0.1: A Cybersecurity Blueprint by the Industry, for the Industry
    SecurityWeek – Kevin Townsend
  2. Intergenerational Mentoring: Key to Cybersecurity’s AI Future
    Dark Reading – Han Cho
  3. State-Sponsored AI Attacks: How Nations Are Using AI to Wage Digital War – The Weaponisation of AI in Cyber Warfare – Part 2
    PrivID (Substack)
  4. Australia’s social media ban is attracting global praise – but we’re no closer to knowing how it would work
    The Guardian – Josh Taylor
  5. Secure Communications Evolve Beyond End-to-End Encryption
    Dark Reading – Robert Lemos

CyAN Members: Op Eds, Articles, etc.

  1. Protecting the Power of AI: Strategies Against Emerging Security Risks
    RSAC Conference – Shantanu Bhattacharya
  2. Antivirus, Firewalls, and VPNs: What Do They Actually Do?
    Fel Gayanilo

🗓️ Upcoming CyAN (and CyAN Partner) Global Events:

SCCS Logo

📍 Lisbon, Portugal

Supply Chain Cyber Security Summit (SCCS)
April 9–11

Read more
GITEX AFRICA Logo

📍 Marrakesh, Morocco

GITEX AFRICA
April 14–16

Read more
GITEX ASIA Logo

📍 Singapore

GITEX ASIA
April 23–25

Read more
GISEC Logo

📍 Dubai, UAE

GISEC
May 6–8

Read more
Cyber OSPAs Logo

📍 London, UK

Cyber OSPAs
May 8

Read more
CSG Awards Logo

📍 Dubai, UAE

CSG Awards 2025
May 7

Read more
World AI Expo Logo

📍 Dubai, UAE

World AI Technology Expo
May 14–15

Read more

🎉 Celebration

CyAN 10th Anniversary
(Details TBA)

GITEX Europe Logo

📍 Berlin, Germany

GITEX Europe Messe
May 21–23

Read more
MaTeCC Logo

📍 Rabat, Morocco

MaTeCC
June 7–9

Read more

🌐 Online

CyAN Q2 Call (APAC + Gulf)
June 11 – 12:00 GST / 16:00 SGT / 18:00 AEST

🌐 Online

CyAN Q2 Call (EMEA + Americas)
June 11 – 20:00 GST / 18:00 CET / 17:00 UTC / 12:00 EDT

Behind the Keys: Women Who Secure the Future – Fatema Fardan

Behind the Keys: Women Who Secure the Future – Fatema Fardan

📄 Download Feature PDF Want to connect? Here is Fatema Fardan’s professional profile. Feel free to say hello and show your support. 🔗 Connect on LinkedIn About the Author Saba Bagheri, PhD Cyber Threat Intelligence Manager at Bupa APAC Director at the Cybersecurity Advisors Network 

Behind the Keys: Women Who Secure the Future – Edna Conway

Behind the Keys: Women Who Secure the Future – Edna Conway

📄 Download Feature PDF Want to connect? Here is Edna Conway’s professional profile. Feel free to say hello and show your support. 🔗 Connect on LinkedIn About the Author Saba Bagheri, PhD Cyber Threat Intelligence Manager at Bupa APAC Director at the Cybersecurity Advisors Network 

Cyber (In)Securities – Issue 138

Cyber (In)Securities – Issue 138


Information Security News

  1. Disclosure Drama Clouds CrushFTP Vulnerability Exploitation
    Dark Reading – Rob Wright
  2. CISA warns of Fast Flux DNS evasion used by cybercrime gangs
    BleepingComputer – Bill Toulas
  3. Google Quick Share Bug Bypasses Allow Zero-Click File Transfer
    Dark Reading – Tara Seals
  4. China-Linked Threat Group Exploits Ivanti Bug
    Dark Reading – Jai Vijayan
  5. International intelligence agencies raise the alarm on fast flux
    Cyberscoop – Greg Otto
  6. Oracle privately confirms Cloud breach to customers
    BleepingComputer – Sergiu Gatlan
  7. T-Mobile Bug Reveals Names, Images, and Locations of Random Children
    Gizmodo – Lucas Ropek
  8. Cybersecurity professor targeted by FBI has not been detained, lawyer says
    Reuters – A.J. Vicens
  9. X (Twitter) data leak exposes 2.8 billion users in supposed “inside job”
    Proactive – Phoebe Shields
  10. New Advanced FIN7’s Anubis Backdoor Allows To Gain Full System Control On Windows
    Security Affairs – Pierluigi Paganini
  11. Genetic data site openSNP to close and delete data over privacy concerns
    BleepingComputer – Bill Toulas
  12. Crimelords at Hunters International tell lackeys ransomware too ‘risky’
    The Register – Connor Jones
  13. Royal Mail investigates data leak claims, no impact on operations
    BleepingComputer – Sergiu Gatlan
  14. Police shuts down KidFlix child sexual exploitation platform
    BleepingComputer – Sergiu Gatlan
  15. Google DeepMind Unveils Framework to Exploit AI’s Cyber Weaknesses
    SecurityWeek – Kevin Townsend
  16. Cisco warns of CSLU backdoor admin account used in attacks
    BleepingComputer – Sergiu Gatlan
  17. Hackers Could Unleash Chaos Through Backdoor in China-Made Robot Dogs
    SecurityWeek – Ryan Naraine
  18. Cybercom discovered Chinese malware in South American nations
    Defensescoop – Mark Pomerleau
  19. Data protection bill leaves room for governmental abuse, campaigners warn
    The Guardian – Rachel Hall
  20. Japan Bolsters Cybersecurity Safeguards With Cyber Defense Bill
    Dark Reading – Kristina Beek
  21. North Korean IT worker army expands operations in Europe
    BleepingComputer – Sergiu Gatlan
  22. We Smell a (DC)Rat: Revealing a Sophisticated Malware Delivery Chain
    BleepingComputer / Acronis
  23. Apple fined €150 million over App Tracking Transparency issues
    BleepingComputer – Sergiu Gatlan
  24. 81% of Australian IT leaders want more government intervention to help them manage cybersecurity
    itWire – Gordon Peters
  25. Signal downloads skyrocket in Yemen, US after leak
    Semafor – Rachyl Jones
  26. CISA spots spawn of Spawn malware targeting Ivanti flaw
    The Register – Iain Thomson

Analysis

  1. End-to-End Encryption Under Fire: The Trojan Horse of “Public Safety”
    PrivID (Substack)
  2. Oracle’s masterclass in breach comms: Deny, deflect, repeat
    The Register – Connor Jones
  3. AI Giving Rise of the ‘Zero-Knowledge’ Threat Actor
    SecurityWeek – Etay Maor
  4. How an Interdiction Mindset Can Help Win War on Cyberattack
    Dark Reading – Mike McNerney
  5. Independent tests show why orgs should use third-party cloud security services
    Cyberscoop – Matt Kapko
  6. FDA’s Critical Role in Keeping Medical Devices Secure
    Dark Reading – Morey J. Haber
  7. Lock Your Digital Doors: Why SMEs Must Get Better At Cybersecurity
    Forbes – Peter Boolkah
  8. ENISA NIS360 2024 Cybersecurity Maturity & Criticality Assessment
    ENISA
  9. Game-Changing Predictions for Cybersecurity in 2025
    Via Satellite – Annamarie Nyirady

CyAN Members: Op-Eds & Articles

  1. Backdoors, Robot Dogs, and Why Trust Must Be Built In—Not Bolted On
    Kim Chandler McDonald
  2. “What happens to Heroes?” EPISODE #3 – The Psychological Impacts of Cyberattacks
    Didier Annet (CyAN Member)
  3. CyAN Signs 3 Open Letters Against Surveillance Laws
    CyAN Blog – CyAN Staff
  4. Strengthening Global Security: Data Protection as National Imperative
    Kim Chandler McDonald

Online Safety for Kids and Teens

  1. Highlights from the latest Vys ‘Online Safety for Kids and Teens’ Biweekly Brief
    Vaishnavi J – Vyanams Strategies (CyAN Member)

Women in Tech Feature Articles

  1. How might reduced DEI measures impact women in tech?
    Silicon Republic – Laura Varley
  2. Survey Says Women Are Finding New Paths to Cybersecurity
    GovTech Today
  3. Women in tech an untapped $6.5bn opportunity
    InnovationAus – Joseph Brookes
  4. The Case for More Women in Cybersecurity: Strengthening the Industry With Diverse Talent
    Security Brief – Zoya Schaller
  5. Full Women in Tech Feature – Interviews
    CyAN

🗓️ Upcoming CyAN (and CyAN Partner) Global Events:

📍 Lisbon, Portugal

Supply Chain Cyber Security Summit (SCCS)
April 9–11

Read more

📍 Marrakesh, Morocco

GITEX AFRICA
April 14–16

Read more

📍 Singapore

GITEX ASIA
April 23–25

Read more

📍 Dubai, UAE

GISEC
May 6–8

Read more

📍 London, UK

Cyber OSPAs
May 8

Read more

📍 Dubai, UAE

CSG Awards 2025
May 7

Read more

📍 Dubai, UAE

World AI Technology Expo
May 14–15

Read more

🎉 Celebration

CyAN 10th Anniversary
(Details TBA)

📍 Berlin, Germany

GITEX Europe Messe
May 21–23

Read more

📍 Rabat, Morocco

MaTeCC
June 7–9

Read more

🌐 Online

CyAN Q2 Call (APAC + Gulf)
June 11 – 12:00 GST / 16:00 SGT / 18:00 AEST

🌐 Online

CyAN Q2 Call (EMEA + Americas)
June 11 – 20:00 GST / 18:00 CET / 17:00 UTC / 12:00 EDT

Behind The Keys: Women Who Secure the Future

Behind The Keys: Women Who Secure the Future

(In)Securities Special Edition (In)Securities Special Edition Celebrating International Women in Tech Day Editor-in-Chief Kim Chandler McDonald Co-Founder and CEO of 3 Steps Data Global VP at CyAN An award-winning author and advocate for cybersecurity, compliance, and digital sovereignty. Kim drives global conversations on data governance 

Behind the Keys: Women Who Secure the Future – Roxanne Pashaei

Behind the Keys: Women Who Secure the Future – Roxanne Pashaei

📄 Download Feature PDF Want to connect? Here is Roxanne Pashaei’s professional profile. Feel free to say hello and show your support. 🔗 Connect on LinkedIn About the Author Saba Bagheri, PhD Cyber Threat Intelligence Manager at Bupa APAC Director at the Cybersecurity Advisors Network 

Strengthening Global Security: Data Protection as National Imperative

Strengthening Global Security: Data Protection as National Imperative

In my previous article, Unraveling Digital Sovereignty: The Delicate Balance of Digital Sovereignty: Insights and Imperatives, we explored the intricate balance between protecting national interests and promoting global digital cooperation.

Building on that foundation, Part 2 of our series dives deeper into how nations can fortify their cybersecurity initiatives without hindering the international flow of information. We’ll also examine how varying levels of digital maturity across countries influence these strategies and introduce forward-thinking models for international agreements.


Data Security as National Security: Expanding the Framework

Let’s be clear: data security isn’t just another item on a national security agenda—it’s absolutely central to it. In our tightly interconnected world, a single data breach can set off a chain reaction, risking economic and political stability across the globe. Crafting robust national and international frameworks that prioritise security while still encouraging innovation is absolutely essential.


Implementing Robust Data Protection Measures

  • National Strategies: Without doubt, it is crucial for countries to develop all-encompassing national cybersecurity strategies. These should include not just governmental bodies but also engage the private sector actively. These strategies need to have tight security protocols, responsive incident handling, and regular checks and balances.

  • Cyber Hygiene Education: Additionally, boosting cyber hygiene universally is non-negotiable. We need to empower everyone with the knowledge to defend against cyber threats through regular education and proactive awareness campaigns.

Challenges of Balancing Sovereignty and Global Cooperation

Navigating the fine line between maintaining digital sovereignty and engaging in fruitful international cooperation presents its unique set of challenges, made all the more complex by differing levels of digital maturity across nations.


Specific International Agreements and Their Impact

  • The Budapest Convention on Cybercrime: This treaty is a shining example of how countries can come together to fight cybercrime, respecting each other’s legal boundaries while working toward a common goal.

  • The General Data Protection Regulation (GDPR): GDPR not only reshapes data protection within the EU but also influences global standards, showcasing how regional policies can inspire broader international data privacy standards.

Bridging the Digital Divide

  • Capacity Building: Supporting the advancement of digital capabilities in countries that are still catching up is critical. This means not just technology transfers but also focused educational programs and infrastructure enhancements.

  • Flexible Frameworks: I champion international frameworks that are adaptable enough to allow for local nuances yet robust enough to secure universal data security and cooperation goals.

Proposing a Model for International Digital Cooperation

A one-size-fits-all policy doesn’t cut it for digital governance. We need a layered, nuanced approach that respects individual national sovereignty while promoting mutual benefits and security.


Components of the Advanced Cooperation Model

  • Digital Maturity Index: Introducing a global index to gauge and respond to the digital maturity of nations could significantly streamline our cooperative efforts.

  • Adaptive Legal Frameworks: These should provide foundational protections but also adapt to meet specific national needs.

  • Anti-Tariff Digital Trade Agreements: Crafting agreements that reduce barriers to data flow and prevent data tariffs will ensure that digital trade enhances rather than hinders economic prosperity.

Expanding on Successful Regional Cooperation

The European Digital Single Market (EDSM) and the ASEAN Digital Integration Framework truly shine as beacons of how regions can synchronise their regulations to ensure digital interactions are smooth and respect personal autonomy. These initiatives don’t just streamline digital operations across various jurisdictions; they also show us how to navigate the challenges that come with differing levels of digital maturity.


European Digital Single Market (EDSM):

From the get-go, the EDSM has been pivotal in breaking down digital barriers across EU nations, paving the way for a borderless digital environment that supports free-flowing online services and e-commerce.

Recently, the focus has shifted to boosting digital competitiveness and sustainability to keep Europe at the cutting edge of digital innovation and security. A key part of this has been strengthening digital infrastructure and making digital services accessible to everyone across the Union, ensuring fair digital progress for all member states.

A standout move here has been the Interoperable Europe Act, a major stride towards a seamless Digital Single Market by enhancing how digital public services work together across EU countries.


ASEAN Digital Integration Framework:

This framework plays a crucial role in narrowing the digital gap among ASEAN nations, fostering a digital environment that includes everyone. It’s all about making digital trade and economic integration easier, which is vital for the growth of digital economies in the region.

By backing the implementation of digital standards and boosting the use of digital technologies in various sectors, this framework is enhancing connectivity and competitiveness across the ASEAN market.


Addressing Tariffs and Promoting Free Trade

The conversation around digital trade recently has brought to light the harmful impacts of tariffs on digital transactions. Tariffs can really restrict the free flow of data across borders, affecting businesses and consumers alike. To combat this, both the European and ASEAN initiatives are working to create a setting where digital trade can flourish without these barriers, supporting not only economic growth but also aligning with global efforts to keep digital markets open and competitive.


Looking Ahead:

As these frameworks evolve, they continually adapt to the demands of the digital age, ensuring their strategies stay aligned with global digital trends and needs. Their ongoing dedication to lowering barriers and boosting digital cooperation sets a standard for global digital policy.

Exploring these models gives us invaluable insights into how to build more resilient and inclusive digital economies worldwide. The success of these frameworks offers a practical blueprint for other regions looking to harmonise their digital markets while respecting local and regional differences.


Conclusion: Towards a Collaborative Future

As we look to the future, the interplay between robust digital sovereignty and dynamic international cooperation becomes increasingly crucial. By learning from successful global initiatives and adapting to the ever-evolving digital landscape, we can safeguard our national interests and contribute to a safer, more interconnected world.

Let’s embrace the challenges and opportunities ahead, forging a path toward a collaborative digital future.


About the Author:

Kim Chandler McDonald is the Co-Founder and CEO of 3 Steps Data, driving data/digital governance solutions.
She is the Global VP of CyAN, an award-winning author, storyteller, and advocate for cybersecurity, digital sovereignty, compliance, governance, and end-user empowerment.

Behind the Keys: Women Who Secure the Future – Inssata RICOURT

Behind the Keys: Women Who Secure the Future – Inssata RICOURT

📄 Download Feature PDF Want to connect? Here is Inssata RICOURT’s professional profile. Feel free to say hello and show your support. 🔗 Connect on LinkedIn About the Author Saba Bagheri, PhD Cyber Threat Intelligence Manager at Bupa APAC Director at the Cybersecurity Advisors Network