Recent Posts

“What happens to Heroes ?” EPISODE #2: The Unsung Heroes of the digital world by Didier Annet

“What happens to Heroes ?” EPISODE #2: The Unsung Heroes of the digital world by Didier Annet

The Psychological Impacts of Cyberattacks This is the second episode of a story related to individuals who, in a matter of moments, transition from “employees” to “rescuers” in the immediate aftermath of a destructive cyberattack. What I will call the “Heroes” Which role within a 

Securing the Future: Innovative Cybersecurity for Agentic AI by Shantanu Bhattacharya

Agentic AI is when autonomous AI agents make decisions and execute tasks. It’s poised to revolutionize industries. But with this power comes new cybersecurity challenges. This blog explores the deployment architectures of agentic AI solutions and identifies key attack vectors, offering a glimpse into innovative 

Cyber (In)Securities – Issue 133

Information Security News

Microsoft: New RAT Malware Used for Crypto Theft, Reconnaissance

BleepingComputer by Sergiu Gatlan
Microsoft has identified a new form of RAT (Remote Access Trojan) malware that is being used for cryptocurrency theft and detailed reconnaissance of infected systems. This sophisticated malware targets digital wallets and can extract a wide array of sensitive information, paving the way for more invasive attacks. This discovery underscores the evolving nature of cyber threats, particularly those aimed at financial gain. Organisations are advised to enhance their cybersecurity protocols to defend against these stealthy, financially motivated attacks, stressing the importance of continuous monitoring and advanced threat detection systems to thwart these malicious actors effectively.
Read more

Exploit Code for Apache Tomcat RCE Vulnerability Published on Chinese Forum

SecurityWeek by Ryan Naraine
Exploit code for a critical Remote Code Execution (RCE) vulnerability in Apache Tomcat has been published on a popular Chinese forum, raising concerns about potential widespread attacks. This vulnerability allows attackers to execute arbitrary code remotely, compromising the security of any unpatched Tomcat servers. Security experts urge administrators to apply the latest patches immediately to mitigate the risk. The publication of this exploit code marks a significant escalation in the threat landscape, as it provides attackers with ready access to a powerful tool for infiltrating and taking control of affected systems.
Read more

DOGE Staffer Violated Security Policies at Treasury Department, Court Filing Shows

Cyberscoop by Tim Starks
A court filing has revealed that a staffer from the DOGE project violated several security policies at the Treasury Department. This breach involved unauthorised access to sensitive financial data, potentially compromising critical economic information. The incident has sparked significant concern over internal security protocols and the enforcement of access controls within government agencies. This case underscores the need for stringent security measures and continuous monitoring to protect sensitive governmental data from insider threats, emphasising the importance of compliance with established security policies to prevent similar incidents in the future.
Read more

RansomHub Taps FakeUpdates to Target US Government Sector

Dark Reading by Elizabeth Montalbano
RansomHub, a notorious cybercrime group, has started leveraging FakeUpdates, a deceptive tactic involving fake software update alerts, to infiltrate US government networks. This sophisticated strategy targets vulnerabilities in outdated software, tricking employees into installing malicious updates that deploy ransomware. The attacks have heightened concerns about the resilience of government cybersecurity defenses and underscored the necessity for agencies to maintain software updates and educate staff on recognising phishing attempts. These developments highlight the evolving techniques of cybercriminals in bypassing traditional security measures to access highly sensitive government data.
Read more

Denmark Warns of Increased Cyber Espionage Against Telecom Sector

Dark Reading by Alexander Culafi
Denmark’s intelligence services have issued a warning about a significant increase in cyber espionage activities targeting the nation’s telecommunications sector. These espionage efforts are aimed at accessing sensitive communications and gaining strategic advantages. The alert specifies that foreign state-sponsored actors are primarily responsible, seeking to compromise critical infrastructure to disrupt services or gather intelligence. This escalation prompts a call for enhanced security measures within the telecom industry, highlighting the need for robust cybersecurity strategies to protect against sophisticated and persistent threats.
Read more

Cybercriminals Exploit CSS to Evade Spam Filters and Track Email Users’ Actions

The Hacker News by Ravie Lakshmanan
Cybercriminals are increasingly exploiting Cascading Style Sheets (CSS) to circumvent traditional spam filters and track user actions within emails. This method involves embedding malicious CSS code into emails, which not only bypasses spam detection systems but also enables attackers to gather detailed information about how recipients interact with the email content. The technique poses significant privacy and security risks, as it can be used to refine phishing campaigns and increase their effectiveness. This emerging threat highlights the need for more advanced email security solutions that can detect and mitigate such sophisticated tactics.
Read more

Critical RCE Flaw in Apache Tomcat Actively Exploited in Attacks

BleepingComputer by Bill Toulas
A critical Remote Code Execution (RCE) flaw in Apache Tomcat is currently being exploited in the wild, posing serious risks to systems running unpatched versions of the server software. This vulnerability allows attackers to remotely execute malicious code, potentially gaining full control over affected systems. The urgency for administrators to apply security patches cannot be overstated as exploitation of this flaw could lead to significant data breaches and system takeovers. This situation underscores the continuous threat landscape facing web servers and the importance of timely updates and vigilance in cybersecurity practices.
Read more

Telegram Founder Returns to Dubai as French Inquiry Continues

The Guardian by Dan Milmo
The founder of Telegram, Pavel Durov, has returned to Dubai amid ongoing inquiries in France concerning the platform’s compliance with data protection laws and its role in spreading misinformation. This move comes as French authorities intensify their scrutiny of social media platforms, focusing on how they manage user data and content. Durov’s return to Dubai, where Telegram has significant operations, highlights the challenges tech companies face in balancing user privacy with governmental demands for greater transparency and control over digital content.
Read more

Nvidia Patches Vulnerabilities That Could Let Hackers Exploit AI Services

SecurityWeek by Eduard Kovacs
Nvidia has issued patches for several vulnerabilities in its software that could allow hackers to exploit its AI services. These vulnerabilities were identified in various components of Nvidia’s platforms, which are widely used for AI processing and deep learning tasks. If exploited, these flaws could lead to unauthorised access to sensitive data, disruption of AI operations, or manipulation of AI functionalities. The prompt release of these security patches underscores Nvidia’s commitment to safeguarding its technologies against emerging cyber threats and maintaining the integrity of its AI ecosystems.
Read more

Malicious Adobe, DocuSign OAuth Apps Target Microsoft 365 Accounts

BleepingComputer by Bill Toulas
Cybercriminals are targeting Microsoft 365 users by creating malicious OAuth applications disguised as legitimate Adobe and DocuSign services. These deceptive apps trick users into granting them access to their Microsoft 365 accounts, enabling attackers to obtain sensitive data and potentially launch further malicious activities. The sophistication of these scams highlights the importance of vigilance when authorising third-party applications, emphasising the need for users to verify app authenticity before granting any permissions. This tactic reflects a growing trend in using OAuth apps for phishing and data breaches.
Read more

Ransomware Attack Hits the Micronesian State of Yap, Causing Health System Network Outage

Security Affairs by Pierluigi Paganini
The Micronesian state of Yap has been severely impacted by a ransomware attack that brought down its health system network. This cyberattack has disrupted medical services and access to crucial patient data, highlighting the vulnerability of critical infrastructure to such threats. The incident underscores the need for enhanced cybersecurity measures in healthcare systems, particularly in regions that may lack the resources to adequately defend against sophisticated cyber threats. The focus is now on recovery and strengthening defenses to prevent future disruptions.
Read more

Back to Cash: Life Without Money in Your Pocket Is Not the Utopia Sweden Hoped

The Observer by Miranda Bryant
In a surprising shift, Sweden, once at the forefront of the cashless movement, is reconsidering the role of cash in daily transactions. This reflection arises as citizens encounter challenges and limitations with digital-only payments, such as technical failures, exclusion of non-digital natives, and privacy concerns. The move back towards cash underscores a growing recognition of the need for a balanced approach to payment methods that ensures accessibility and security for all segments of society, highlighting the practical realities of a digital economy that may not fully cater to everyone’s needs.
Read more

New Akira Ransomware Decryptor Cracks Encryption Keys Using GPUs

BleepingComputer by Bill Toulas
A breakthrough has been achieved with the development of a new decryptor for Akira ransomware, utilizing GPUs to crack encryption keys rapidly. This tool offers hope to victims by significantly speeding up the decryption process, potentially restoring access to encrypted files faster than ever before. The introduction of this GPU-powered decryptor represents a critical advancement in the fight against ransomware, providing an effective countermeasure that can mitigate the impact of these devastating cyber attacks. It also underscores the ongoing arms race between cybercriminals and cybersecurity professionals striving to protect user data.
Read more

New MassJacker Clipper Targets Pirated Software Seekers

Security Affairs by Pierluigi Paganini
The newly identified “MassJacker” clipper malware is targeting individuals seeking pirated software, exploiting their quest for free content to steal cryptocurrency. This malicious software modifies clipboard data to redirect crypto transactions to attacker-controlled wallets, seamlessly replacing intended recipient addresses. This method underscores the risks associated with downloading unofficial software, as users inadvertently expose themselves to sophisticated cyber threats. The emergence of MassJacker highlights the need for heightened awareness and preventive measures against the malware threats that lurk in pirated software.
Read more

Malicious PyPI Packages Stole Cloud Tokens – Over 14,100 Downloads Before Removal

The Hacker News by Ravie Lakshmanan
Over 14,100 instances of malicious packages downloaded from Python’s package index, PyPI, have led to widespread theft of cloud tokens. These packages, cleverly disguised as legitimate software, siphoned off cloud credentials from unsuspecting developers, compromising numerous cloud environments. This incident highlights the vulnerability of software supply chains and emphasizes the critical need for developers to verify the integrity and source of third-party libraries. It also underscores the importance of robust security practices in managing and safeguarding cloud-based resources from such deceptive attacks.
Read more

Ransomware Gang Creates Tool to Automate VPN Brute-Force Attacks

BleepingComputer by Bill Toulas
A notorious ransomware gang has developed a new tool that automates brute-force attacks on VPNs, increasing the efficiency of their attacks on corporate networks. This tool targets VPN accounts with weak or default passwords, enabling rapid unauthorized access and subsequent deployment of ransomware. This development poses a significant threat to businesses, stressing the urgent need for robust password policies and enhanced VPN security measures. Companies are advised to enforce strong authentication practices and monitor network traffic to mitigate the risks of such sophisticated attacks.
Read more

California’s Legal Push on Geolocation Data Collection Must Target the Right Issues, Privacy Experts Say

Cyberscoop by Derek B. Johnson
California is advancing legislation aimed at tightening controls on geolocation data collection, prompting discussions among privacy experts about the precision and effectiveness of these legal measures. The experts advocate for legislation that accurately targets harmful practices without stifling innovation or overburdening businesses with compliance challenges. This legal push reflects growing concerns over privacy rights and the potential misuse of sensitive location data, underscoring the need for laws that balance protection with practicality in the rapidly evolving digital landscape.
Read more

Ransomware Developer Extradited, Admits Working for LockBit

Dark Reading by Kristina Beek
A key developer of the LockBit ransomware group has been extradited and has admitted involvement with the notorious ransomware operations. This significant legal development marks a pivotal moment in the global fight against cybercrime, as the individual in question was responsible for creating and refining the ransomware used in numerous high-profile attacks worldwide. The extradition and confession are part of a broader international effort to dismantle cybercriminal networks that have caused extensive financial and data losses across various sectors. This case highlights the increasing effectiveness of international cooperation in cybersecurity enforcement and the growing legal repercussions for cybercriminals.
Read more

GSMA Confirms End-to-End Encryption for RCS, Enabling Secure Cross-Platform Messaging

The Hacker News by Ravie Lakshmanan
The GSMA (Global System for Mobile Communications Association) has officially confirmed the implementation of end-to-end encryption for Rich Communication Services (RCS), marking a significant advancement in secure messaging across platforms. This move aims to enhance privacy and security for users by protecting messages from interception and unauthorized access. The adoption of encryption for RCS addresses longstanding security concerns and positions it as a more secure alternative to traditional SMS and other messaging services. This development is expected to bolster user confidence in RCS, encouraging wider adoption and integration across communication networks.
Read more

Remote Access Infrastructure Remains the Riskiest Corporate Attack Surface

Dark Reading by Robert Lemos
Remote access infrastructure continues to be the riskiest attack surface for corporations, as highlighted in recent cybersecurity reports. The surge in remote work has expanded the attack vectors available to cybercriminals, who exploit vulnerabilities in remote systems to gain unauthorized access to corporate networks. This vulnerability emphasizes the need for companies to strengthen their remote access protocols, implement multi-factor authentication, and conduct regular security audits. By prioritizing the security of remote access points, businesses can significantly mitigate the risk of data breaches and cyberattacks.
Read more

ClickFix Widely Adopted by Cybercriminals, APT Groups

SecurityWeek by Ionut Arghire
The malicious software toolkit ClickFix is being increasingly adopted by cybercriminals and Advanced Persistent Threat (APT) groups, facilitating a range of cyber attacks. This toolkit enables attackers to exploit vulnerabilities in commonly used applications and software, effectively automating the delivery of malware through seemingly benign interactions. The widespread use of ClickFix highlights a growing trend in the cybercriminal ecosystem, where sophisticated tools are shared and enhanced collaboratively, increasing the efficiency and reach of cyber attacks. This development calls for enhanced vigilance and updated defensive measures from organizations to protect against these advanced threats.
Read more

Apple’s Alleged UK Encryption Battle Sparks Political and Privacy Backlash

The Register by Connor Jones
Apple is at the center of a contentious debate in the UK over its encryption practices, which have ignited significant political and privacy backlash. Allegations suggest that Apple’s stringent encryption methods hinder law enforcement’s ability to access critical data during investigations, sparking a heated dispute about balancing privacy rights with national security needs. This controversy highlights the ongoing global tension between technology companies committed to protecting user data and government agencies advocating for backdoor access to facilitate criminal investigations. The outcome of this battle could have far-reaching implications for privacy laws and tech company operations worldwide.
Read more

Consumer Groups Push IoT Security Bill to Address End-of-Life Concerns

Dark Reading by Arielle Waldman
Consumer advocacy groups are intensifying their push for legislation that addresses security concerns with Internet of Things (IoT) devices, particularly around the end-of-life phase. The proposed IoT security bill aims to ensure that manufacturers are legally required to maintain software updates and security patches for a defined period after a product is discontinued. This legislation is seen as crucial for preventing outdated devices from becoming security liabilities within consumer networks. The bill also seeks to enhance transparency, requiring companies to clearly inform consumers about the lifespan of product support from the point of purchase, thus promoting better consumer awareness and decision-making regarding IoT devices.
Read more

ANALYSIS

How Economic Headwinds Influence the Ransomware Ecosystem

Dark Reading by Alexander Culafi
Economic fluctuations are significantly impacting the ransomware ecosystem, shifting the dynamics of how and why attacks are conducted. Recent economic headwinds have led cybercriminals to adapt their strategies, increasingly targeting sectors perceived as more vulnerable to disruption. This analysis explores how economic downturns lead to a rise in ransomware incidents, as attackers capitalize on the heightened desperation of businesses to recover data and maintain operations. It also discusses the evolving ransomware economy, where demand for quick financial returns drives the innovation of ransomware techniques, making it imperative for organizations to adapt their cybersecurity strategies to this changing landscape.
Read more

‘Kids Can Bypass Anything If They’re Clever Enough!’ – How Tech Experts Keep Their Children Safe Online

The Guardian by Amy Fleming
This article explores the challenges that tech-savvy parents face in keeping their children safe online, emphasizing the cunning and ingenuity that kids often exhibit in circumventing digital safeguards. Tech experts share personal strategies and insights on fostering a safe online environment, including open communication about internet risks, the use of advanced parental controls, and educating children about digital footprints and privacy. The piece highlights the balance between protecting children and empowering them with the skills to navigate the online world responsibly, stressing the importance of adapting safety measures as technology and online behaviors evolve.
Read more

U.S. Cybersecurity and Data Privacy Review and Outlook – 2025

Gibson Dunn
The U.S. Cybersecurity and Data Privacy Review and Outlook for 2025 provides a comprehensive analysis of the current state and future projections in cybersecurity and data privacy landscapes. This report highlights the increasing complexity of cyber threats and the evolving regulatory frameworks aimed at enhancing data protection. Key insights include the escalation of state-sponsored attacks, the rising importance of cybersecurity in corporate governance, and the challenges and opportunities posed by new technologies such as AI and IoT. The outlook underscores the necessity for businesses to integrate robust cybersecurity measures and for lawmakers to craft policies that balance security with privacy rights.
Read more

Apple vs. UK Government – The Encryption Battle Continues

PrivID (Substack)
The ongoing legal battle between Apple and the UK government centers on the contentious issue of encryption and access to digital communications. This clash is part of a broader debate over privacy and security, with the UK seeking ways to circumvent encryption to combat crime and terrorism. Apple, steadfast in its commitment to user privacy, argues that creating backdoors for government access undermines security for all users globally. This analysis delves into the implications of such legal confrontations for tech companies and consumers, emphasizing the potential global fallout of weakening encryption standards.
Read more

Biggest Cyber Threats to the Healthcare Industry Today

Dark Reading by Bhavya Jain
The healthcare industry faces unprecedented cyber threats that jeopardize patient data and critical healthcare operations. This article outlines the most significant threats, including ransomware attacks that lock access to vital records, phishing schemes targeting healthcare professionals, and breaches of sensitive patient information through insecure networks. The need for robust cybersecurity measures has never been more urgent, as these threats not only risk patient confidentiality but also can disrupt entire healthcare systems. Enhanced security protocols, staff training, and investment in advanced cybersecurity technologies are crucial for safeguarding against these evolving threats.
Read more

A Guide to Security Investments: The Anatomy of a Cyberattack

SecurityWeek by Torsten George
This guide offers a comprehensive breakdown of the anatomy of a cyberattack, providing insights into the sequential stages that attackers often follow: reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives. It emphasizes the importance of understanding these phases to better invest in cybersecurity measures effectively. The article advocates for strategic security investments that can detect and respond to threats at each stage, reducing the potential impact on an organization. This proactive approach is crucial for businesses to enhance their resilience against increasingly sophisticated cyber threats.
Read more

Taming Agentic AI Risks with FAIR-CAM

By CI-ISAC Australia Ambassador for Cyber Threat-Led/Informed Risk Measurement and Co-Chair of the Sydney Chapter of the FAIR Institute, Denny Wan
The article discusses the innovative FAIR-CAM framework, designed to mitigate risks associated with agentic Artificial Intelligence (AI). FAIR-CAM, which stands for Fairness, Accountability, Integrity, and Resilience – Context, Agency, and Means, provides a structured approach to ensure AI systems are developed and deployed responsibly. Denny Wan emphasizes the importance of addressing the ethical implications of AI, particularly as systems gain more autonomy and decision-making capabilities. The framework aims to guide organizations in creating AI that is not only technologically advanced but also ethically aligned, promoting transparency and trust in AI applications.
Read more

CyAN Members: Op Eds, Articles, etc:

Fostering Australia’s Autonomy: The Imperative for Sovereign Satellite Communication Systems

By CyAN Board Member and Global VP, Kim Chandler McDonald
In a detailed exploration, CyAN Board Member and Global VP, Kim Chandler McDonald, addresses the urgent need for Australia to establish sovereign satellite communication systems. This analysis highlights the critical importance of self-reliance in satellite technology, essential for bolstering national security and driving economic prosperity. As we face increasing global dependencies on foreign technologies amidst escalating geopolitical tensions, the push for robust, sovereign infrastructure becomes more than a precaution—it’s a strategic imperative. McDonald emphasizes that this move towards technological autonomy is crucial not only for maintaining Australia’s digital independence but also for ensuring its position in a competitive global arena. This analysis serves as a call to action for nations worldwide, urging them to consider similar strategies to protect and empower their futures.
Read more

Opinion: Yet Another Encryption Kerfuffle

By CyAN Board Member and Communications Director John Salomon
In his latest opinion piece, CyAN Board Member and Communications Director John Salomon addresses the recurring debates surrounding encryption policies. John argues against weakening encryption standards, citing that such measures would compromise global digital security without significantly aiding law enforcement efforts. Salomon emphasizes the critical importance of maintaining strong encryption to protect personal and national security interests. He calls for a balanced approach that respects privacy rights while addressing legitimate security concerns, urging policymakers to consider the broader implications of encryption backdoors.
Read more

CyAN Members: NEWS

CyAN Board Member John Salomon to Speak at Trust and Safety Forum in Lille, France

CyAN Board Member John Salomon will take part in what will undoubtedly be a fascinating discussion on the topic, ‘Has Trust in Democracy Survived the 2024 Election Year’ at the Trust and Safety Forum in Lille, France, on April 1st. Panelists Lorena Martinez, Laetitia Avia, and Stéphanie LADEL will discuss debunking disinformation, the role of fact-checkers, and the resources required for a balanced political environment.

CyAN Celebrates the Global Impact of Its Members

CyAN thrives because of the incredible talent, leadership, and dedication of our members, and we are proud to see them shaping the future of cybersecurity on a global stage! 🚀💙


Upcoming CyAN (and CyAN Partner) Global Events:

  • Trust & Safety Forum at Forum INCYBER Europe (FIC), Lille, France: April 1-2 Read more
  • CyAN Quarterly Online Members Meeting (CyAN Members Only): March 19 (See emails for details)
  • GITEX AFRICA, Marrakesh, Morocco: April 14-16 Read more
  • GITEX ASIA, Singapore (Marina Bay Sands): April 23-25 Read more
  • GISEC, Dubai World Trade Center, UAE: May 6-8 Read more
  • The Cyber Outstanding Security Performance Awards (Cyber OSPAs), London, UK: May 8 Read more
  • World AI Technology Expo UAE, Dubai, UAE: May 14-15 Read more
  • MaTeCC: Rabat, Morocco (The third annual North Africa cybersecurity event, hosted by CyAN partner École High-Tech): June 7-9, 2025 Read more
Fostering Australia’s Autonomy: The Imperative for Sovereign Satellite Communication Systems

Fostering Australia’s Autonomy: The Imperative for Sovereign Satellite Communication Systems

Inspired by recent movements in Europe, where tech giants like Airbus have advocated for a sovereign fund to support local technology sectors, this article explores Australia’s strategic need to develop sovereign satellite communication systems. As digital connectivity becomes increasingly crucial, the time to fortify our 

Cyber (In)Securities – Issue 132

Information Security News Elon Musk’s Starlink Could Be Used to Transmit Australian Election Voting Results The Guardian by Josh TaylorThe Guardian reports that Elon Musk’s satellite internet service, Starlink, is being considered as a potential method to transmit voting results in Australian elections. This proposal 

Opinion: Yet Another Encryption Kerfuffle

This Time it’s Ukraine…

Recorded Future reports that “Signal has stopped responding to requests from Ukrainian law enforcement regarding Russian cyber threats”.

https://therecord.media/signal-no-longer-cooperating-with-ukraine

This comes hot on the heels of ongoing spats in Sweden, where law enforcement demands backdoors into secure messaging apps like Signal and WhatsApp, France, where a controversial amendment to the “Narcotrafic” law would have mandated encryption backdoors in order to simplify surveillance of drug traffickers, the UK, where the Home Office is engaged in a struggle with Apple to disable certain encryption functionalities for UK iCloud users, and others.

As with the European Union’s now-dead “Chat Control” legislative proposal, CyAN has consistently opposed encryption back doors. They are dangerous, and will damage confidence in secure commerce, voting, privacy, and other cornerstones of a strong, free, and democratic civil society.

Speaking as a very strong sympathizer of Ukraine’s cause: Signal is being consistent about ensuring the integrity of end to end encryption. Law enforcement should focus on endpoints.

Any highly secure, anonymous tool will be used by bad actors, it is inevitable. Keeping such tools secure is as much in Ukraine’s interests as in everyone else’s; if Signal is willing and able to help anyone access messages, then Russians will also figure out a way to get in (that’s bad, by the way.)

Law enforcement and intelligence agencies have a history of demanding access to encrypted data at rest and in transit, usually for perfectly understandable reasons and founded in good intentions. This is an extremely dangerous slippery slope, and the damage from such access is far greater than any benefits.

I want Ukraine to prevail, and to win its fight for freedom and independence against Russian aggression. I recognize that Russia is a hotbed, even state sponsor, of cyberattacks, fraud, and other menaces to our prosperity and stability, and I applaud Ukraine’s tireless efforts as part of a broader global coalition fighting these. I also fully recognize that the country is in a desperate situation; it’s completely rational and understandable that Ukrainian agencies would want any advantage they can muster in what is an existential struggle for the country. Legal, social, and economic niceties tend to take a back seat when someone is bombing your civilians and infrastructure without provocation.

That said, having the luxury of not having to face such a direct threat (yet?) we can afford to take a more strategic view. Not having access to encrypted messages of Russian cybercriminals may hamper Ukrainian countermeasures; it will not cripple their capabilities. At the same time, it doesn’t matter where and why a precedent for accessing secure, private communications is set – once the door is open, it will not close. The ongoing flurry of legislative, law enforcement, and intelligence agency demands for encryption backdoors needs constant vigilance and opposition; just because we may strongly sympathize with a cause doesn’t mean we should allow it to be a justification for something that is potentially much more damaging in the long term.

Welcome New Member – Abid Malik from Dubai

Welcome New Member – Abid Malik from Dubai

Please welcome our newest member from Dubai, Abid Malik! Abid Malik isn’t just a GRC and cybersecurity advisor—he’s a strategist who turns risk management into business opportunities. With 20+ years of experience across banking, fintech, and multinational sectors, he helps businesses strengthen security, navigate regulations, 

“What Happens to Heroes?” – EPISODE #1: The Unsung Heroes of the Digital World by Didier Annet

“What Happens to Heroes?” – EPISODE #1: The Unsung Heroes of the Digital World by Didier Annet

The Psychological Impacts of Cyberattacks This is the first episode of a story related to individuals who, in a matter of moments, transition from “employees” to “rescuers” in the immediate aftermath of a destructive cyberattack. What I Will Call the “Heroes” But what is a 

Cyber (In)Securities – Issue 131

Information Security News

EU Looks to Tech Sovereignty with EuroStack Amid Trade War

Biometric Update by Masha Borak
The European Union is making significant strides towards tech sovereignty with the development of EuroStack, a comprehensive technology initiative aimed at reducing dependence on foreign tech giants amid ongoing trade tensions. This ambitious project seeks to bolster the EU’s capabilities in digital services and infrastructure, promoting a self-reliant approach to technology that aligns with its strategic economic and security interests.
EuroStack is poised to enhance data protection, cloud computing, and overall digital autonomy for the EU, marking a pivotal shift in the global tech landscape as Europe navigates the complexities of international trade and tech dominance.
Read more

Trump Coins Used as Lure in Malware Campaign

SecurityWeek by Kevin Townsend
In a novel cyberattack, malicious actors are exploiting the popularity of Trump-themed commemorative coins to distribute malware. This campaign targets supporters through phishing emails that offer a chance to purchase these coins, only to infect their systems with malicious software when they attempt to engage.
The deceptive emails are crafted with convincing details and a call to action that redirects users to compromised websites. This strategy highlights a growing trend of using political memorabilia and current events as bait, reflecting an evolution in social engineering tactics aimed at specific demographic groups.
Read more

Experts Warn of Mass Exploitation of Critical PHP Flaw CVE-2024-4577

Security Affairs by Pierluigi Paganini
Cybersecurity experts are raising alarms about a critical vulnerability in PHP, identified as CVE-2024-4577, which is being exploited on a massive scale. This severe flaw allows attackers to execute arbitrary code on servers running vulnerable versions of PHP, potentially compromising millions of websites and web applications.
The widespread use of PHP in server-side scripting for web development makes this vulnerability particularly dangerous. Security professionals urge immediate patching and updates, as exploiting this flaw can give attackers control over web servers, leading to data theft, site defacement, and further network compromise.
Read more

‘SideWinder’ Intensifies Attacks on Maritime Sector

Dark Reading by Jai Vijayan
The cyber threat group known as SideWinder is intensifying its targeted attacks on the maritime sector, deploying sophisticated tactics to infiltrate networks and steal sensitive information. This group’s activities have raised significant security concerns within the maritime industry, which is crucial for global trade and logistics.
SideWinder’s methods include using advanced malware and phishing attacks to gain access to ship management systems and port authority databases, aiming to disrupt operations and gather strategic data. The escalation of these attacks underscores the need for enhanced cybersecurity measures in critical infrastructure sectors to protect against increasingly adept and persistent threat actors.
Read more

X Outages Reportedly Caused by Massive Cyberattack

ZDNet by Lance Whitney
A significant cyberattack is reported to be the cause behind recent widespread outages of the social media platform X. This attack highlights the vulnerabilities in digital platforms that are increasingly becoming targets for sophisticated cyber threats.
The cyberattack not only disrupted service for millions of users worldwide but also raised concerns about data security and the robustness of infrastructure against such incursions. The incident has prompted urgent calls for stronger cybersecurity protocols and resilience strategies to shield against future disruptions and potential data breaches.
Read more

Multiple Vulnerabilities Found in ICONICS Industrial SCADA Software

Cyberscoop by Derek B. Johnson
Recent findings have revealed multiple vulnerabilities in ICONICS industrial SCADA software, posing significant risks to critical infrastructure systems that depend on this technology for operational control and monitoring. These vulnerabilities could allow cyber attackers to manipulate controls, alter configurations, or even shut down operations, potentially leading to severe consequences in sectors like energy, manufacturing, and water treatment.
The discovery underscores the critical need for continuous vulnerability assessments and prompt patching within industrial systems to safeguard them from potential cyber threats and ensure the continuity of essential services.
Read more

Swiss Critical Sector Faces New 24-Hour Cyberattack Reporting Rule

BleepingComputer by Bill Toulas
Switzerland has introduced a stringent new regulation requiring critical sector organizations to report cyberattacks within 24 hours of detection. This rule aims to enhance national cybersecurity resilience by ensuring swift and coordinated response efforts to digital threats.
The legislation covers entities in essential services such as healthcare, transportation, finance, and utilities, emphasizing the importance of transparency and prompt communication in mitigating the impacts of cyber incidents. The move reflects a growing global trend toward tighter cyber regulations as governments seek to fortify defenses against the increasing frequency and sophistication of cyberattacks.
Read more

Researchers Expose New Polymorphic Attack That Clones Browser Extensions to Steal Credentials

The Hacker News by Ravie Lakshmanan
Security researchers have uncovered a new polymorphic attack technique that clones legitimate browser extensions to stealthily steal user credentials. This sophisticated method involves altering the code of popular extensions, turning them into trojans that can capture sensitive information such as passwords and banking details without alerting users or security systems.
The findings highlight a significant escalation in browser-based threats, emphasizing the need for users to verify the authenticity of extensions and maintain updated anti-malware solutions. The report calls for heightened awareness and stricter security practices to counteract these deceptive strategies that exploit the trust in commonly used digital tools.
Read more

Rhysida Pwns Two US Healthcare Orgs, Extracts Over 300K Patients’ Data

The Register by Connor Jones
The cyber threat group Rhysida has successfully breached two US healthcare organizations, compromising the personal and medical information of over 300,000 patients. This sophisticated attack highlights the increasing vulnerability of the healthcare sector to cyber incursions, which can have devastating consequences for patient privacy and institutional integrity.
The hackers utilized advanced tactics to infiltrate network defenses and exfiltrate a significant amount of sensitive data, underscoring the critical need for healthcare entities to enhance their cybersecurity measures. This incident serves as a stark reminder of the importance of robust security protocols and continuous monitoring to protect patient information against such malicious activities.
Read more

Former NSA Cyber Director Warns Drastic Job Cuts Threaten National Security

Cybersecurity Dive by David Jones
The former director of NSA’s cyber division has issued a stark warning that significant job cuts within the agency pose a serious threat to national security. These reductions in cybersecurity personnel come at a time when cyber threats are becoming more frequent and sophisticated.
The former director emphasizes that decreasing the number of skilled cybersecurity professionals undermines the country’s ability to defend against and respond to cyber incidents effectively. This alert calls for urgent reconsideration of budget and staffing decisions to ensure the NSA and other critical security agencies are well-equipped to safeguard national interests in the digital age.
Read more

SilentCryptoMiner Infects 2,000 Russian Users via Fake VPN and DPI Bypass Tools

The Hacker News by Ravie Lakshmanan
A new malware known as SilentCryptoMiner is targeting Russian users by masquerading as legitimate VPN and DPI (Deep Packet Inspection) bypass tools. The malware has already infected approximately 2,000 individuals, covertly mining cryptocurrency using the resources of compromised systems.
This campaign highlights the dangers of downloading software from unverified sources, as attackers capitalize on the demand for privacy tools in regions with strict internet regulations. The incident underscores the need for heightened vigilance and the importance of using trusted channels for software downloads to prevent such deceptive and harmful intrusions.
Read more

US Cities Warn of Wave of Unpaid Parking Phishing Texts

BleepingComputer by Lawrence Abrams
Several US cities are issuing warnings about a new phishing scam involving unpaid parking tickets. The scam sends text messages to individuals, falsely claiming they have unpaid parking fines and directing them to a fraudulent website.
Once on the site, victims are prompted to enter personal information, which the scammers can then use for identity theft or financial fraud. This wave of phishing attacks highlights the increasingly cunning tactics used by cybercriminals to exploit everyday situations. Authorities are urging the public to verify any such claims through official municipal channels and to be cautious about providing personal information online.
Read more

NCSA Ordered to Step Up Preparations Against Cyber Warfare

The Nation
The Thai National Cyber Security Authority (NCSA) has been ordered to intensify its preparations against potential cyber warfare threats. This directive comes in response to escalating global cyber tensions and the increasing sophistication of potential cyber-attacks that could target critical national infrastructure.
The NCSA’s enhanced focus aims to bolster the country’s defenses by developing more advanced cyber response strategies, conducting regular security drills, and strengthening collaborations with international cybersecurity entities. This proactive approach is designed to ensure the nation remains resilient in the face of growing cyber threats and can effectively mitigate the impact of any cyber-attacks.
Read more

Internet Shutdowns at Record High in Africa as Access ‘Weaponized’

The Guardian by Eromo Egbejule
Internet shutdowns have reached a record high across Africa, with governments increasingly ‘weaponizing’ access to control information and suppress dissent. This trend is alarming advocates for freedom of expression and digital rights, as shutdowns not only curtail civil liberties but also impact economies and disrupt everyday life.
The use of internet blackouts as a political tool is particularly prevalent during protests, elections, and civil unrest, raising serious concerns about the erosion of democratic norms. This pattern underscores the urgent need for international dialogue and policy interventions to protect internet access as a fundamental right and to prevent its use as a tool for political manipulation.
Read more

Stalked: How a Relentless Campaign of Online Abuse Derailed One Woman’s Life

The Observer by Carole Cadwalladr
This in-depth article chronicles the harrowing experience of a woman whose life was dramatically affected by a relentless campaign of online abuse. It explores the devastating impact of cyberstalking, which included constant harassment, the spreading of personal information, and threats that extended beyond the digital realm into her physical life.
The case study sheds light on the psychological and social repercussions of such targeted attacks, highlighting the insufficient legal protections and the often inadequate response from law enforcement agencies. This story calls for stronger regulatory measures and more robust support systems to protect individuals from cyber harassment and to hold perpetrators accountable.
Read more

White House Cyber Director’s Office Set for More Power Under Trump, Experts Say

The Record by Suzanne Smalley
According to experts, the office of the White House cyber director is poised to receive expanded powers under the Trump administration. This move aims to enhance the national cybersecurity strategy by centralizing authority and improving coordination among various federal agencies involved in cyber defense.
The bolstering of the cyber director’s office reflects an acknowledgment of the growing cyber threats facing the United States and the need for a more unified government response. Experts suggest that this restructuring will enable more effective policy-making and operational decisions in cybersecurity, potentially leading to stronger protections against cyberattacks on national infrastructure.
Read more

Undocumented Commands Found in Bluetooth Chip Used by a Billion Devices

BleepingComputer by Bill Toulas
Recent discoveries have revealed undocumented commands in a widely used Bluetooth chip, present in over a billion devices, raising significant security concerns. These hidden commands, if exploited, could potentially allow attackers to execute arbitrary actions on affected devices without the user’s knowledge.
This vulnerability underscores the critical importance of hardware security and the potential risks associated with overlooked or hidden functionalities in common technology components. The exposure of such commands highlights the need for manufacturers to conduct thorough security audits and for users to ensure their devices are regularly updated to mitigate any potential threats arising from such vulnerabilities.
Read more

Japanese Telecom Giant NTT Suffered a Data Breach That Impacted 18,000 Companies

Security Affairs by Pierluigi Paganini
The Japanese telecommunications giant NTT disclosed a significant data breach impacting approximately 18,000 corporate clients. This breach involved unauthorized access to a wide range of sensitive data, potentially exposing business secrets and personal information.
The incident highlights vulnerabilities in telecommunications networks that can have far-reaching consequences for both the service provider and its extensive client base. NTT has initiated a comprehensive security overhaul and is collaborating with law enforcement to investigate the breach. This event underscores the need for enhanced cybersecurity measures and continuous vigilance to protect against sophisticated cyber threats in an increasingly interconnected world.
Read more

Cyberattacks Targeting IT Vendors Intensify, Causing Bigger Losses

Cybersecurity Dive by Alexei Alexis
The frequency and severity of cyberattacks targeting IT vendors have dramatically intensified, resulting in substantial financial and operational losses. This trend is particularly alarming as IT vendors often serve as gateways to broader networks, making them attractive targets for cybercriminals looking to exploit multiple victims through a single entry point.
These attacks not only disrupt IT operations but also compromise the security of their clients’ data and systems. The article highlights the growing need for IT vendors to implement robust cybersecurity strategies, including multi-factor authentication, regular security audits, and employee training, to mitigate the risks and protect both their assets and those of their clients.
Read more

YouTubers Extorted via Copyright Strikes to Spread Malware

BleepingComputer by Bill Toulas
An emerging cyber threat involves extortion of YouTubers through the manipulation of copyright strike processes to distribute malware. Cybercriminals are targeting content creators by threatening them with copyright strikes, which can severely impact their channel and revenue unless they comply with demands that often include downloading malware-laden software.
This strategy not only exploits the legal copyright mechanisms but also turns them into a tool for cyber extortion. The practice highlights a new form of cybercrime that blends traditional copyright abuse with digital extortion, significantly complicating the security landscape for online content creators. It underscores the importance of vigilance and legal awareness among YouTubers to protect against such sophisticated and damaging attacks.
Read more

Developer Sabotaged Ex-Employer with Kill Switch Activated When He Was Let Go

The Register by Iain Thomson
A developer orchestrated a sabotage attack against his former employer by implementing a kill switch that activated upon his dismissal. This deliberate act caused significant disruption to the company’s operations, as critical systems were disabled, leading to downtime and financial losses.
The incident underscores the potential risks associated with insider threats and the importance of maintaining stringent security protocols, especially regarding access control and monitoring of sensitive systems. The company has since taken steps to bolster its security measures and review its policies to prevent such occurrences in the future, highlighting the need for continuous vigilance and robust security practices in the workplace.
Read more

ANALYSIS

Cybersecurity is a ‘Continual Battle,’ but Industry Can’t Be ‘Complacent,’ Experts Say

Security Systems News by Cory Harris
Experts in cybersecurity are emphasizing that the fight against cyber threats is an ongoing battle that requires constant vigilance and adaptation. This article discusses the ever-evolving nature of cyber threats and the critical importance of staying proactive in cybersecurity practices.
Industry leaders warn against complacency, highlighting that as technology advances, so do the tactics of cybercriminals. Harris, editor of Security Systems News, advocates for continuous investment in cybersecurity infrastructure, regular updates to defensive strategies, and ongoing training for all staff. The message is clear: the cybersecurity landscape is dynamic and requires perpetual effort and innovation to keep data and systems safe.
Read more

Rapid7’s Chief Scientist Warns Australian Businesses to Prioritize Their Ransomware Policies

itWire by Grant Titmus
Rapid7’s Chief Scientist, Raj Samani, has issued a stark warning to Australian businesses regarding the escalating threat of ransomware attacks. Samani is urging companies to prioritize their ransomware response policies and strengthen their cybersecurity defenses to combat this pervasive threat.
His call to action comes amid rising incidents of ransomware across Australia, which are increasingly sophisticated and disruptive. The article highlights the necessity for businesses to implement comprehensive security measures, including regular data backups, employee training on phishing awareness, and robust incident response plans. The emphasis is on preparation and resilience, aiming to mitigate potential impacts and ensure business continuity in the face of these cyber challenges.
Read more

CyAN Members: Op Eds, Articles, etc:

Copy of FY2024 IT and Cybersecurity Spending Analysis (Selected ASX 200 Companies)

CyAN Member Nick Kelly
CyAN Member Nick Kelly provides a detailed analysis of the FY2024 IT and cybersecurity spending across selected ASX 200 companies, revealing significant trends and investment patterns. This report underscores the growing emphasis on cybersecurity in the corporate sector, reflecting increased allocations toward enhancing digital defenses.
Kelly’s analysis points out that despite economic pressures, companies are prioritizing investments in cybersecurity to address the escalating threat landscape. The document serves as a crucial resource for understanding how top Australian companies are strategically positioning their resources to combat cyber threats, offering valuable insights into the prioritization of IT and cybersecurity expenditures in response to evolving challenges.
Read more

Upcoming CyAN (and CyAN Partner) Global Events:

CyAN APAC: The Geopolitical Impacts of Cyber Threats: From Espionage to Influence

Keynote by Dan Elliot
📅 Date: March 12
📍 Location: Peoplebank, Sydney
🔗 Event details


Trust & Safety Forum at Forum INCYBER Europe (FIC)

📅 Date: April 1-2
📍 Location: Lille, France
🔗 Event details


CyAN Quarterly Online Members Meeting (CyAN Members Only)

📅 Date: March 19
📍 Location: Online
📩 See emails for details


GITEX AFRICA 2025

📅 Date: April 14-16
📍 Location: Marrakesh, Morocco
🔗 Event details


GITEX ASIA 2025

📅 Date: April 23-25
📍 Location: Marina Bay Sands, Singapore
🔗 Event details


GISEC Global 2025

📅 Date: May 6-8
📍 Location: Dubai World Trade Center, UAE
🔗 Event details


The Cyber Outstanding Security Performance Awards (Cyber OSPAs)

📅 Date: May 8
📍 Location: London, UK
🔗 Event details


World AI Technology Expo UAE

📅 Date: May 14-15, 2025
📍 Location: Dubai, UAE
🔗 Event details


MaTeCC: North Africa Cybersecurity Event

📅 Date: June 7-9, 2025
📍 Location: Rabat, Morocco
🔗 Event details

Cyber (In)Securities – Issue 130

Information Security News House Passes Bill Requiring Federal Contractors to Implement Vulnerability Disclosure Policies SecurityWeek by Eduard KovacsThe U.S. House of Representatives has recently passed a bill that mandates federal contractors to establish vulnerability disclosure policies. This legislative move aims to strengthen the security of