Recent Posts

“What Happens to Heroes?” – EPISODE #1: The Unsung Heroes of the Digital World by Didier Annet

“What Happens to Heroes?” – EPISODE #1: The Unsung Heroes of the Digital World by Didier Annet

The Psychological Impacts of Cyberattacks This is the first episode of a story related to individuals who, in a matter of moments, transition from “employees” to “rescuers” in the immediate aftermath of a destructive cyberattack. What I Will Call the “Heroes” But what is a 

Cyber (In)Securities – Issue 131

Information Security News EU Looks to Tech Sovereignty with EuroStack Amid Trade War Biometric Update by Masha BorakThe European Union is making significant strides towards tech sovereignty with the development of EuroStack, a comprehensive technology initiative aimed at reducing dependence on foreign tech giants amid 

Cyber (In)Securities – Issue 130

Information Security News

House Passes Bill Requiring Federal Contractors to Implement Vulnerability Disclosure Policies

SecurityWeek by Eduard Kovacs
The U.S. House of Representatives has recently passed a bill that mandates federal contractors to establish vulnerability disclosure policies. This legislative move aims to strengthen the security of federal digital assets by ensuring that vulnerabilities are systematically reported and addressed. The bill stipulates clear guidelines for contractors on how to manage and respond to reported vulnerabilities effectively.
This initiative underscores the government’s commitment to bolstering national cybersecurity infrastructure and fostering a more secure cyber environment for public and private sector collaborations.
Read more

Ethereum Private Key Stealer on PyPI Downloaded Over 1,000 Times

BleepingComputer by Bill Toulas
A malicious package designed to steal Ethereum private keys was recently discovered on the Python Package Index (PyPI), downloaded over 1,000 times before its removal. This deceptive package, masquerading as a legitimate tool, underscores the growing threat in software supply chains where attackers exploit trust to distribute malware.
The incident highlights the critical need for developers and users to exercise heightened vigilance when integrating third-party code, emphasizing the importance of verifying sources and maintaining rigorous security protocols to safeguard sensitive cryptocurrency assets.
Read more

Women Faced the Brunt of Cybersecurity Cutbacks in 2024

Dark Reading by Kristina Beek
In 2024, the cybersecurity industry witnessed significant cutbacks that disproportionately impacted women, exacerbating existing gender disparities in tech roles. These reductions not only led to fewer women in cybersecurity positions but also stalled efforts toward achieving diversity and inclusivity within the sector.
The situation calls for urgent implementation of supportive measures and policies aimed at recruiting, retaining, and advancing women in technology, particularly in cybersecurity fields. Enhancing gender diversity is not just a matter of equity; it enriches problem-solving and strengthens the overall resilience of cybersecurity defenses, making it imperative for the industry to address these challenges proactively.
Read more

Malicious Chrome Extensions Can Spoof Password Managers in New Attack

BleepingComputer by Bill Toulas
Recent reports have identified a new type of cyber attack involving malicious Chrome extensions that can impersonate legitimate password managers. These deceptive extensions are capable of stealing login credentials by tricking users into inputting their information, believing they are using their trusted password management tools.
This emerging threat highlights the necessity for users to scrutinize browser extensions carefully before installation and emphasizes the importance of sourcing extensions from reputable developers only. It also calls for enhanced security measures by browser and extension marketplaces to prevent such malicious activities.
Read more

BadBox Botnet Powered by 1 Million Android Devices Disrupted

SecurityWeek by Ionut Arghire
The BadBox botnet, which harnessed the power of over 1 million compromised Android devices, has recently been disrupted. This vast network was used for large-scale DDoS attacks and other malicious activities, posing significant threats to online security.
The disruption marks a significant victory for cybersecurity teams, highlighting the effectiveness of coordinated efforts in combating such extensive cyber threats. It also underscores the ongoing need for robust mobile device security measures and public awareness about the risks of downloading unverified applications, which often serve as entry points for malware.
Read more

Over 1,000 WordPress Sites Infected with JavaScript Backdoors Enabling Persistent Attacker Access

The Hacker News by Ravie Lakshmanan
More than 1,000 WordPress sites have been compromised with JavaScript backdoors, allowing attackers persistent and covert access. This widespread issue highlights a significant vulnerability in website security, particularly affecting sites with outdated plugins or weak admin credentials.
The malicious JavaScript enables cybercriminals to manipulate site content, steal data directly from users, and potentially leverage the sites for further attacks. This situation calls for immediate action from site administrators to update and secure their systems, implement stringent security measures such as regular audits, and educate users on the importance of strong password policies and regular updates to prevent future breaches.
Read more

Ransomware Attacks Build Against Saudi Construction Firm

Dark Reading Global by Robert Lemos
A Saudi construction firm is currently under siege from a series of escalating ransomware attacks, highlighting a significant vulnerability within the infrastructure sector. These attacks not only threaten the operational continuity and data integrity of the firm but also expose potential security lapses in industry-wide cybersecurity practices.
The situation underscores the critical need for robust cybersecurity measures, including regular system updates, comprehensive employee training, and advanced threat detection mechanisms. It also calls for a collaborative approach to cybersecurity, with increased sharing of threat intelligence and best practices within the sector to mitigate future risks.
Read more

Espionage Actor ‘Lotus Blossom’ Targets Southeast Asia

Dark Reading by Alexander Culafi
The espionage group known as ‘Lotus Blossom’ continues to intensify its cyber espionage efforts across Southeast Asia. Leveraging sophisticated tactics, the group targets government and military sectors to gather sensitive information that could influence regional security dynamics.
This persistent threat underscores the critical need for heightened cybersecurity measures within these sectors. Enhanced vigilance, advanced threat detection systems, and continuous cybersecurity training are imperative to defend against such state-sponsored activities and to safeguard national security interests in the region.
Read more

SandboxAQ Joins UN AI Hub to Bolster Cybersecurity and Drive AI Innovation

IT Security Guru
SandboxAQ has partnered with the UN AI Hub to enhance global cybersecurity measures and foster innovation in artificial intelligence. This collaboration aims to leverage SandboxAQ’s expertise in quantum computing and AI to develop solutions that address critical security challenges faced by nations worldwide.
By integrating advanced AI technologies, the partnership seeks to create more resilient cybersecurity infrastructures and drive technological advancements that benefit global security and governance. This initiative not only highlights the potential of AI in enhancing cybersecurity but also emphasizes the importance of international cooperation in tackling complex digital threats.
Read more

US Indicts 12 Chinese Nationals for Vast Espionage Attack Spree

Cyberscoop by Matt Kapko
The United States has indicted 12 Chinese nationals in connection with a comprehensive espionage operation targeting sensitive U.S. industrial and technological sectors. This sweeping indictment underscores the ongoing geopolitical tensions and the extensive nature of state-sponsored cyber espionage activities.
The accused are alleged to have conducted sophisticated cyber operations to steal trade secrets and critical data, compromising national security and the competitive edge of U.S. businesses. The case highlights the critical need for robust cyber defences and international collaboration to combat these high-stakes threats.
Read more

Open-Source Tool ‘Rayhunter’ Helps Users Detect Stingray Attacks

BleepingComputer by Bill Toulas
Rayhunter, an innovative open-source tool, has been developed to empower individuals and organizations to detect Stingray attacks—covert surveillance methods that intercept mobile phone communications. This tool is particularly crucial in protecting privacy rights as it enables users to identify and mitigate unauthorized cell tower simulators used for eavesdropping.
Rayhunter’s availability underscores the importance of community-driven solutions in enhancing digital privacy and security. It represents a significant step forward in the fight against intrusive surveillance technologies, offering a proactive approach to safeguard personal communications.
Read more

Major Ransomware Attack Sees Tata Technologies Hit – 1.4TB Dataset with Over 730,000 Files Allegedly Stolen

TechRadar by Ellen Jennings-Trace
Tata Technologies has been severely impacted by a major ransomware attack, resulting in the theft of approximately 1.4 terabytes of data, encompassing over 730,000 files. This significant security breach underscores the escalating threat landscape that corporations worldwide are facing.
The attack not only highlights the need for stringent cybersecurity measures but also puts a spotlight on the vulnerabilities that can be exploited in critical business infrastructures. The incident calls for an urgent review and reinforcement of digital defenses to prevent future occurrences and protect sensitive corporate information.
Read more

VMware Security Flaws Exploited in the Wild—Broadcom Releases Urgent Patches

The Hacker News by Ravie Lakshmanan
Recent discoveries have revealed significant security vulnerabilities in VMware products, which have been actively exploited in the wild. These flaws could allow attackers to execute code remotely and escape from secured environments, posing severe risks to enterprises relying on VMware for their virtual infrastructure.
In response, Broadcom has swiftly released urgent patches to address these vulnerabilities. Organizations are urged to apply these security updates immediately to protect their systems from potential breaches and maintain the integrity of their operational environments. This incident highlights the ongoing need for vigilance and prompt action in the face of emerging cybersecurity threats.
Read more

Threat Actor ‘JavaGhost’ Targets AWS Environments in Phishing Scheme

Dark Reading by Alexander Culafi
The ‘JavaGhost’ threat actor is currently targeting AWS environments through a sophisticated phishing scheme designed to compromise enterprise cloud infrastructures. By exploiting vulnerabilities in AWS configurations, JavaGhost has been able to execute phishing attacks that deceive users into revealing their credentials.
This campaign underscores the importance of stringent cloud security practices, including regular audits and employee training to recognize phishing attempts. Organizations using AWS must enhance their vigilance and deploy multi-layered security measures to prevent such breaches and protect their critical cloud assets.
Read more

Congress Eyes Bigger Cyber Role for NTIA Amid Telecom Attacks

Cyberscoop by Matt Bracken
In response to increasing cyber attacks targeting the telecommunications sector, Congress is considering legislation to expand the cyber responsibilities of the National Telecommunications and Information Administration (NTIA). This move aims to bolster the United States’ defenses against sophisticated cyber threats that disrupt essential communication services.
By enhancing the NTIA’s capabilities, lawmakers hope to improve coordination across federal agencies and strengthen the resilience of critical infrastructure. The proposed changes underscore the urgency of adapting governmental cyber strategies to meet the evolving landscape of digital threats.
Read more

Cisco Warns of Webex for BroadWorks Flaw Exposing Credentials

BleepingComputer by Sergiu Gatlan
Cisco has issued a warning about a critical flaw in Webex for BroadWorks that could expose user credentials, posing a significant security risk. This vulnerability allows unauthorized access to sensitive information, potentially enabling attackers to intercept and manipulate communications.
Cisco has recommended immediate updates and has provided patches to mitigate this vulnerability. This incident highlights the continuous need for vigilance and prompt software updates in safeguarding communication tools from emerging cyber threats. Organizations are urged to apply these patches without delay to protect their data and maintain the integrity of their communication channels.
Read more

Microsoft Teams Tactics, Malware Connect Black Basta, Cactus Ransomware

BleepingComputer by Lawrence Abrams
Recent analysis has revealed that cybercriminals employing Black Basta and Cactus ransomware are leveraging Microsoft Teams as a vector for their attacks. These groups use malicious tactics, such as embedding malware within seemingly legitimate communications, to exploit the popular collaboration platform.
The use of Microsoft Teams enables these attackers to bypass traditional security measures and gain unauthorized access to corporate networks. This development calls for organizations to enhance their security protocols concerning communication tools and educate employees about the risks of malware in everyday applications, ensuring robust defenses against these sophisticated cyber threats.
Read more

New Polyglot Malware Hits Aviation, Satellite Communication Firms

BleepingComputer by Bill Toulas
A sophisticated new form of polyglot malware has been identified targeting aviation and satellite communication firms, posing significant security challenges. This malware uniquely blends multiple functionalities, allowing it to act both as a data stealer and a disruptor of communication systems.
The attacks highlight vulnerabilities within critical infrastructure sectors and underscore the urgent need for enhanced cybersecurity measures. Firms in these industries are advised to conduct thorough security audits, update their systems regularly, and train staff to recognize signs of malicious activities to safeguard against such advanced threats.
Read more

3 VMware Zero-Day Bugs Allow Sandbox Escape

Dark Reading by Jai Vijayan
Three critical zero-day vulnerabilities have been discovered in VMware software, allowing attackers to escape from virtualized environments and execute code on the host machine. These vulnerabilities pose severe risks to enterprises relying on VMware for virtualization, as they could lead to full system compromise if exploited.
VMware has responded by releasing urgent patches to address these security flaws. Organizations are strongly advised to apply these updates immediately to protect their systems from potential attacks. This incident highlights the ongoing need for proactive security practices and rapid response to emerging threats in virtualization technology.
Read more

Hunters International Ransomware Claims Attack on Tata Technologies

BleepingComputer by Bill Toulas
Tata Technologies recently fell victim to a significant ransomware attack by Hunters International, resulting in the theft of over 1.4 terabytes of sensitive data, including more than 730,000 files. This breach underscores the growing threat of ransomware attacks targeting major corporations, highlighting the potential for substantial operational disruption and financial loss.
In response to the attack, Tata Technologies is taking robust measures to bolster their cybersecurity defences and mitigate the impact of the breach. This incident serves as a critical reminder for all companies to enhance their data protection strategies and prepare for the possibility of similar cyber threats.
Read more

More than 86K IoT Devices Compromised by Fast-Growing Eleven11 Botnet

Cybersecurity Dive by David Jones
The Eleven11 botnet, a rapidly expanding network, has compromised over 86,000 IoT devices worldwide, demonstrating the increasing vulnerabilities in connected technology. This botnet exploits weak default passwords and unpatched security flaws to control devices, using them for large-scale DDoS attacks and other malicious activities.
The widespread impact underscores the critical importance of securing IoT devices with strong, unique passwords and regular firmware updates. It highlights the necessity for manufacturers and users to implement more rigorous security measures to prevent such infiltrations and protect the integrity of IoT ecosystems.
Read more

Polish Space Agency Hit by Cyberattack

SecurityWeek by Ionut Arghire
The Polish Space Agency recently experienced a significant cyberattack, highlighting vulnerabilities in national security and space exploration sectors. This breach compromised sensitive data, potentially affecting critical operations and international collaborations.
The incident emphasizes the urgent need for enhanced cybersecurity protocols and systems within agencies involved in space technology and research. It also calls for increased cooperation among international partners to bolster defenses against such sophisticated threats, ensuring the protection of vital infrastructure and information in the expanding arena of space exploration.
Read more

Big Tech Opposes YouTube Exemption from Australia’s Social Media Ban

itNews by Renju Jose
Major technology companies are challenging an exemption that would allow YouTube to operate under Australia’s proposed social media ban, citing concerns over fairness and regulatory consistency. The ban, aimed at protecting users from harmful online content, has sparked debate among tech giants, who argue that all platforms should be held to the same standards.
This opposition highlights the complexities of regulating digital platforms while ensuring competitive equity. It underscores the need for clear, equitable regulations that balance user safety with fair market practices, crucial for maintaining a healthy digital ecosystem.
Read more

ANALYSIS

Cybersecurity’s Future Is All About Governance, Not More Tools

Dark Reading by Shirley Salzman
Shirley Salzman, writing for Dark Reading, argues that the future of cybersecurity isn’t about hoarding tools but about mastering governance. While technology plays a role, true resilience comes from strong policies, risk management, and compliance frameworks that align security strategies with business objectives.
Salzman emphasizes that prioritizing governance over endless tool acquisition strengthens operational resilience, mitigates risks proactively, and ensures organizations can adapt to evolving threats. By embedding governance into cybersecurity, businesses create a security posture that’s not just reactive but strategic, scalable, and built for long-term digital defense.
Read more

Identity: The New Cybersecurity Battleground

The Hacker News
The Hacker News staff highlights identity as the new battleground in cybersecurity, with attackers shifting from exploiting system vulnerabilities to targeting user credentials. Protecting digital identities now requires more than just passwords—it demands multi-factor authentication, continuous monitoring, and behavioural analytics to detect and block unauthorized access.
As identity theft and credential-based attacks grow more sophisticated, organizations must prioritize advanced identity protection measures to safeguard individuals and digital infrastructure from evolving cyber threats.
Read more

Enterprise AI Through a Data Security Lens: Balancing Productivity With Safety

Dark Reading by Adam Strange
Writing for Dark Reading, Adam Strange emphasizes that as AI continues reshaping business operations, balancing productivity with stringent data security is critical. Organizations must embed security-first principles into AI deployments, ensuring sensitive information is protected from misuse or breaches.
Strong data governance, encryption, and access controls are essential to maintaining trust in AI-driven environments. Strange argues that without prioritizing security alongside innovation, businesses risk compromising both regulatory compliance and long-term growth in an AI-powered corporate landscape.
Read more

Tech Companies’ Proposed New Safety Codes Won’t Protect All Kids Online

InnovationAus by Toby Murray
Toby Murray of InnovationAus critiques tech companies’ proposed safety codes, arguing they fail to offer comprehensive protection for all children online. While these measures represent progress, they still leave critical gaps, particularly for vulnerable users who need the most protection.
Murray calls for stronger regulatory enforcement, ensuring platforms take real accountability rather than relying on voluntary commitments. Without broader, legally binding safeguards, children remain at risk, highlighting the urgent need for policies that prioritize child safety over corporate interests.
Read more

Cyberwarfare, Elections, and the Role of Encryption in Protecting Democracy

PrivID (Substack)
PrivID (Substack) highlights encryption as a crucial safeguard for democracy, especially as cyberwarfare threats escalate. Strong encryption protects voter data and election integrity from manipulation, ensuring that democratic outcomes remain free from interference.
Weakening these protections risks exposing electoral systems to hostile actors, eroding public trust. The analysis calls on governments to uphold robust encryption standards, reinforcing digital voting security, transparency, and resilience against cyber threats that seek to undermine democratic processes.
Read more

Why Cybersecurity Jobs Are Hard to Find Amid a Worker Shortage

Dark Reading by Andrey Leskin
Andrey Leskin of Dark Reading examines the paradox of a cybersecurity job market plagued by both a talent shortage and hiring difficulties. Despite high demand, many skilled candidates struggle to secure roles due to rigid job descriptions, unrealistic experience requirements, and a preference for niche expertise over adaptable skills.
Instead of fostering talent, companies are narrowing the pool by demanding certifications over potential. The analysis calls for a shift in hiring strategies—investing in internal development, easing entry barriers, and creating pathways for emerging professionals to bridge the cybersecurity skills gap before it widens further.
Read more

Exploiting DeepSeek-R1: Breaking Down Chain of Thought Security

Trend Micro by Trent Holmes & Willem Gooderham
Trent Holmes and Willem Gooderham of Trend Micro uncover critical security flaws in DeepSeek-R1, exposing weaknesses in its chain-of-thought reasoning that attackers can exploit. These vulnerabilities enable adversaries to manipulate AI outputs, leading to misinformation, biased responses, or data leaks.
The findings highlight the urgent need for security-first AI development, where transparency, rigorous testing, and adversarial resilience are prioritized. Without stronger safeguards, large language models remain susceptible to manipulation, posing risks to trust, decision-making, and the ethical use of AI-driven systems.
Read more

Statistics & Insights

Highlights from This Week’s Cybersecurity Research by evisec – CRD #18

CyAN Member and evisec CEO Henry Röigas
Highlights from the latest cybersecurity research sources by evisec:

  • Ransomware payments prioritize speed over restoration: 96% of cases involve data exfiltration, but only 30% result in payments—mainly to prevent leaks or accelerate recovery, not restore systems.
  • Security careers: high pay, low retention: Over 60% of professionals consider leaving due to stagnation. Security architects earn up to $206K, but return-to-office mandates risk talent loss.
  • Hybrid work & BYOD risks: 98% of organizations report BYOD violations, with 90% allowing personal device access to corporate data, exposing security gaps.
  • Global threats surge: China-linked activity is up 150%, vishing skyrockets 442%, malware-free attacks hit 79%, and breakout times drop to 48 minutes, demanding faster response.
  • Software security paradox: OWASP pass rates double, but security debt worsens—fix times have increased fivefold in 15 years despite improved critical risk mitigation.

For a deeper dive on these topics and other data-led insights, explore the latest Cybersecurity Research Digest here:
Read more

CyAN Members: Op Eds, Articles, etc:

CyAN’s Position on Encryption Backdoor Legislation

CyAN Staff
CyAN firmly opposes encryption backdoors, warning that such policies undermine global cybersecurity. While governments argue they are necessary for law enforcement, the reality is they create systemic vulnerabilities that can be exploited by cybercriminals and hostile nation-states.
Weakening encryption doesn’t just affect criminals—it puts businesses, critical infrastructure, and everyday users at risk. Instead of compromising security, CyAN advocates for stronger encryption policies that protect privacy, safeguard data integrity, and ensure a more resilient digital landscape without handing malicious actors an easy entry point.
Read more

Phishing, Smishing, and Quishing—How Many Ways Can We Get Scammed?

CyAN Blog by Fel Gayanilo
CyAN Gen Sec Fel Gayanilo dives into the ever-expanding world of digital scams, where cybercriminals exploit email (phishing), SMS (smishing), and QR codes (quishing) to trick users into handing over sensitive data.
As fraud tactics evolve, so must our defenses. Many scams rely on urgency and deception, preying on human instincts rather than technical vulnerabilities. Fel emphasizes the importance of skepticism, user awareness, and layered security to mitigate these threats.
The best defense? Think before you click—because in today’s cyber landscape, convenience often comes with a hidden cost.
Read more

Dynamic Resilience: A Framework for Synergizing Operational Agility and Economic Security in the Era of Digital Transformation

CyAN Blog by Rupesh Shirke
CyAN explores Dynamic Resilience, a strategy that merges cybersecurity, business agility, and economic security to help organizations navigate digital transformation without increasing risk.
As cyber threats evolve, businesses must move beyond static defenses and embrace flexible security frameworks that adapt in real time. The key lies in balancing innovation with proactive risk management, ensuring security measures scale with technological advancements.
By integrating security into operational agility, organizations can sustain growth, safeguard assets, and maintain resilience in an unpredictable digital landscape.
Read more

Opinion: Encryption Back Doors Are Dumb.

CyAN Blog by John Salomon
CyAN Communications and Mentorship Director John Salomon, writing for the CyAN blog, dismantles the argument for encryption backdoors, bluntly stating that they are a fundamentally flawed and dangerous idea.
While governments argue for access in the name of law enforcement, Salomon warns that weakening encryption creates systemic vulnerabilities that cybercriminals and hostile actors will inevitably exploit. He emphasizes that encryption is not just about privacy—it underpins national security, financial stability, and critical infrastructure.
The article makes a clear case: breaking encryption to catch criminals ultimately puts everyone at risk.
Read more

CyAN Member’s News

We’re immensely proud to share that Dan Elliott, a highly valued member of our CyAN community and an internationally acclaimed cybersecurity advisor, is a finalist in the 2025 Australian Cyber Awards! 🏆

Dan has been recognized in the Cybersecurity Professional of the Year – Professional and Financial Services category. His nomination is a testament to his dedication to the field, his commitment to collaboration with clients and peers, and his passion for sharing his extensive experience across the sector. Join us in celebrating this well-deserved recognition!

🔗 Read more: Dan Elliott’s LinkedIn Post

Dan Elliott at AISA CyberCon Canberra

On March 18th, Dan will also be speaking at the Australian Information Security Association (AISA) CyberCon Canberra on the topic:

“The Human Element in Cyber Resilience: Lessons from the Intelligence Community”

If you’re in Canberra, you won’t want to miss this insightful session!

🔗 Watch the highlights: Dan Elliott’s LinkedIn Post

At CyAN, we are ALWAYS overjoyed to celebrate our members’ successes and contributions to the cybersecurity community. Congratulations, Dan!

Upcoming CyAN (and CyAN Partner) Global Events:

CyAN APAC: The Geopolitical Impacts of Cyber Threats: From Espionage to Influence keynote by Dan Elliot, March 12, Peoplebank, Sydney
More info

Trust & Safety Forum at Forum INCYBER Europe (FIC), Lille, France: April 1-2
More info

GITEX AFRICA, Marrakesh, Morocco: April 14-16
More info

GITEX ASIA, Singapore (Marina Bay Sands): April 23-25
More info

GISEC, Dubai World Trade Center, Dubai, UAE: May 6-8
More info

The Cyber Outstanding Security Performance Awards (Cyber OSPAs), May 8, London, UK
More info

World AI Technology Expo UAE, Dubai, UAE: May 14-15, 2025
More info

MaTeCC, Rabat, Morocco: June 7-9, 2025
(The third annual North Africa and beyond cybersecurity event, hosted by CyAN partner organisation École High-Tech.)
More info


The Cost of Silence: Enhancing Cyber Safety to Address Domestic Violence’s Impact on Women’s Employment and Education

The Cost of Silence: Enhancing Cyber Safety to Address Domestic Violence’s Impact on Women’s Employment and Education

Last Friday, I attended the launch of The Cost of Domestic Violence to Women’s Employment and Education at the University of Technology Sydney. Written by the renowned researcher and writer Anne Summers, this report lays bare how domestic violence and coercive control disrupts women’s financial 

Opinion:  Encryption Back Doors are Dumb.

Opinion: Encryption Back Doors are Dumb.

A member’s take on why encryption backdoors are a stupid, harmful, pointless idea.

Cyber (In)Securities – Issue 129

Information Security News

Latin American Orgs Face 40% More Attacks Than Global Average

Dark Reading by Nate Nelson
Organisations in Latin America are experiencing a surge in cyberattacks, facing 40% more incidents than the global average. This alarming trend underscores the unique cybersecurity challenges in the region, exacerbated by rapid digital transformation and targeted attacks by sophisticated cybercriminals.
Latin American businesses are urged to significantly enhance their cyber defenses and implement comprehensive security strategies. Emphasising the need for advanced threat detection systems and robust cybersecurity training, these measures are crucial to mitigate escalating threats and protect vital infrastructures.
Read more

Nearly 12,000 API Keys and Passwords Found in AI Training Dataset

BleepingComputer by Ionut Ilascu
A concerning discovery in an AI training dataset has surfaced nearly 12,000 API keys and passwords, highlighting significant security vulnerabilities. This incident demonstrates the risks associated with using real-world data in machine learning projects without stringent verification and cleansing processes.
The inadvertent exposure of sensitive credentials could lead to substantial security breaches, emphasising the urgent need for robust data sanitisation protocols and enhanced privacy protection measures in AI development. Organisations must prioritize tightening their data handling practices to prevent similar vulnerabilities and protect sensitive information from potential cyber threats.
Read more

DHS Says CISA Won’t Stop Looking at Russian Cyber Threats

Cyberscoop by Tim Starks
The Department of Homeland Security (DHS) has reaffirmed its commitment to monitoring Russian cyber threats, as stated by the Cybersecurity and Infrastructure Security Agency (CISA). This comes amid escalating global tensions and increasing cyber activities from state-sponsored groups.
CISA emphasises the continuous need for vigilance and proactive measures to counter these threats effectively. The agency’s ongoing focus on Russian cyber operations underscores the critical importance of national cyber defence strategies in protecting U.S. infrastructures and maintaining cybersecurity resilience.
Read more

Hackers Exploit AWS Misconfigurations to Launch Phishing Attacks via SES and WorkMail

The Hacker News by Ravie Lakshmanan
Hackers are exploiting misconfigurations in Amazon Web Services (AWS), specifically targeting SES and WorkMail, to launch sophisticated phishing attacks. This tactic allows cybercriminals to send seemingly legitimate emails from trusted domains, significantly increasing the likelihood of successful scams.
The incidents highlight the critical vulnerabilities associated with cloud services and the necessity for stringent security practices. Organisations using AWS are urged to conduct regular security audits and tighten configurations to thwart these phishing schemes and protect sensitive data from being compromised.
Read more

EU’s New Product Liability Directive & Its Cybersecurity Impact

Dark Reading by Jatin Mannepalli
The EU’s New Product Liability Directive introduces significant changes with profound implications for cybersecurity across member states. This legislation extends liability to include digital products, compelling manufacturers to ensure higher security standards to avoid legal repercussions.
It’s designed to protect consumers from potential harms caused by digital products and services, including those related to cybersecurity breaches. This directive not only aims to enhance consumer protection but also pushes companies to adopt more rigorous cybersecurity measures, thereby elevating the overall security posture within the digital marketplace.
Read more

Microsoft Unveils Finalized EU Data Boundary as European Doubt Over US Grows

The Register by Richard Speed
Microsoft has officially finalized the EU Data Boundary, responding to increasing European concerns about data privacy and the handling of information by U.S. entities. This strategic move ensures that all personal data from European customers will be stored and processed within EU borders, aligning with stringent EU data protection regulations.
The implementation of this boundary aims to mitigate legal risks, enhance data sovereignty, and strengthen trust among European users. It reflects Microsoft’s commitment to addressing privacy concerns and adapting to global demands for more localised and secure data management practices.
Read more

UK Watchdog to Investigate TikTok and Reddit Over Use of Children’s Data

The Guardian by Robyn Vinter
The UK watchdog is set to investigate TikTok and Reddit for their handling of children’s data, raising significant concerns about privacy and protection online. This inquiry highlights potential violations of data protection laws intended to safeguard minors from misuse of their personal information on these platforms.
The investigation aims to ensure that both social media giants adhere strictly to legal standards, emphasising the importance of robust age verification processes and transparent data usage policies. This action underscores the growing urgency to protect young users in the digital landscape, where personal data is often vulnerable to exploitation.
Read more

C++ Creator Calls for Help to Defend Programming Language from ‘Serious Attacks’

The Register by Thomas Claburn
Bjarne Stroustrup, the esteemed creator of C++, has urgently called for support to defend the programming language from what he terms as ‘serious attacks’. These attacks compromise the integrity and efficiency of C++, potentially undermining its reliability and performance for developers globally.
Stroustrup emphasises the critical importance of rallying the programming community to protect C++ and maintain its foundational role in software development, impacting a vast array of applications across various industries. He stresses the potential long-term implications for technological innovation and software integrity if these challenges are not addressed effectively.
Read more

LinkedIn Scam Emails Warning

ITWire by Gordon Peters
Amid rising cybersecurity concerns, LinkedIn users are increasingly targeted by sophisticated scam emails that mimic official communications. These phishing attempts are designed to steal personal data by convincing users to click on malicious links that appear to be legitimate LinkedIn updates.
Security experts are sounding the alarm, highlighting the growing prevalence and sophistication of these scams. They strongly urge users to be vigilant, to verify the authenticity of messages, and to understand the risks to their personal information online amid these evolving cyber threats, emphasising the need for enhanced digital literacy.
Read more

Extreme Online Violence May Be Linked to Rise of ‘0 to 100’ Killers, Experts Say

The Guardian by Rachel Hall
Experts are increasingly concerned about the link between extreme online violence and the emergence of ‘0 to 100’ killers, individuals who rapidly escalate from no criminal background to committing severe acts of violence. This phenomenon is being studied as part of broader efforts to understand how digital environments influence offline behaviour.
Researchers are examining patterns in online activity that may predict these sudden violent outbursts, suggesting that early intervention could prevent potential tragedies. The focus is on creating tools and strategies to identify and mitigate these risks before they manifest in real-world violence.
Read more

Ransomware Gangs Exploit Paragon Partition Manager Bug in BYOVD Attacks

BleepingComputer by Bill Toulas
Ransomware gangs are exploiting a vulnerability in Paragon Partition Manager to conduct BYOVD (Bring Your Own Vulnerable Driver) attacks. This technique allows attackers to bypass security measures by using legitimate but flawed drivers.
Security researchers warn that this vulnerability is particularly dangerous because it enables ransomware to gain deep system access without immediate detection. The exploit has been used in several high-profile ransomware campaigns, highlighting the critical need for updates and patches to protect against such sophisticated cyber threats. Efforts are underway to mitigate the risk by providing timely security updates and educating users on the importance of maintaining software integrity.
Read more

Tarlogic Discovers Security Flaw Allowing Eavesdropping on Private Conversations via Bluetooth Headset Microphone

IT Security Guru by Daniel Tannenbaum
Tarlogic Security has uncovered a significant flaw in Bluetooth technology that allows eavesdropping on private conversations via Bluetooth headset microphones. This vulnerability can be exploited without alerting the device owner, making it a serious privacy concern.
Researchers at Tarlogic warn that this flaw not only breaches individual privacy but also poses a risk to corporate security if sensitive business discussions are intercepted. The discovery has prompted calls for immediate updates to Bluetooth security protocols to prevent such vulnerabilities and protect users from potential espionage.
Read more

SolarWinds CISO Says Security Execs Are ‘Nervous’ About Individual Liability for Data Breaches

Cyberscoop by Derek B. Johnson
Tim Brown, the CISO of SolarWinds, has voiced concerns that security executives are becoming increasingly nervous about being held personally liable for data breaches. This anxiety is driven by the rising frequency and severity of cyber attacks, which are putting immense pressure on security frameworks.
Brown emphasises the need for robust security measures and proactive risk management strategies to protect against potential breaches. Additionally, there is a call for clearer regulations and support systems to help security professionals manage these challenges without the fear of personal repercussions.
Read more

Attackers Could Hack Smart Solar Systems and Cause Serious Damage

Security Affairs by Pierluigi Paganini
Security researchers have raised alarms over vulnerabilities in smart solar systems that could be exploited by hackers to cause serious damage. These systems, integral to renewable energy grids, can be remotely accessed if not properly secured, allowing attackers to manipulate energy production or disrupt power supplies.
The potential for such attacks underscores the need for stringent security measures in the burgeoning smart energy sector. This threat not only poses risks to energy stability but also highlights broader implications for national security as reliance on renewable technologies increases.
Read more

US Soldier Intends to Admit Hacking 15 Telecom Carriers

Dark Reading by Kristina Beek
A US soldier has signalled intentions to plead guilty to hacking into the systems of 15 telecom carriers, exposing significant vulnerabilities in telecommunications security. This case highlights the risk of insider threats where individuals exploit their technical skills and security clearances to access sensitive information, posing serious implications for national security.
The incident has prompted authorities to reevaluate and strengthen security protocols across the telecommunications industry, emphasising the need for rigorous access controls and ongoing surveillance to prevent future breaches.
Read more

Qilin Ransomware Claims Attack at Lee Enterprises, Leaks Stolen Data

BleepingComputer by Bill Toulas
Qilin ransomware has targeted Lee Enterprises, marking a significant breach in media cybersecurity. The group behind the attack has not only encrypted the company’s data but also begun leaking sensitive information to pressure for a ransom.
This incident highlights the increasing threat ransomware poses to the media sector, where disruptions can significantly impact operations and information integrity. Lee Enterprises is currently assessing the damage and coordinating with cybersecurity experts to mitigate the effects, reinforce their defenses, and prevent future attacks.
Read more

Amnesty Finds Cellebrite’s Zero-Day Used to Unlock Serbian Activist’s Android Phone

The Hacker News by Ravie Lakshmanan
Amnesty International has reported that a zero-day exploit in Cellebrite’s forensic technology was used to unlawfully access the Android phone of a Serbian activist. This breach underscores significant privacy concerns and the potential for misuse of surveillance tools.
The exploit enabled unauthorised access to sensitive personal data, exposing vulnerabilities in technologies that are commonly used by law enforcement worldwide. This incident has intensified calls for more stringent regulations on digital surveillance tools to prevent their use in political repression or other harmful activities, advocating for an international effort to protect digital rights and ensure privacy.
Read more

Meta Apologises Over Flood of Gore, Violence, and Dead Bodies on Instagram

The Guardian by Dan Milmo
Meta has issued an apology following a surge of disturbing content on Instagram, including graphic violence and images of deceased individuals. This influx has sparked widespread criticism and raised questions about the platform’s content moderation policies.
Meta has acknowledged the distress caused to users and is reviewing its algorithms and moderation practices to better detect and filter out such inappropriate content. The company has reiterated a commitment to improving its systems to ensure that Instagram remains a safe space for its community, emphasising the importance of safeguarding user experience against harmful content.
Read more

Fake CAPTCHA PDFs Spread Lumma Stealer via Webflow, GoDaddy, and Other Domains

The Hacker News by Ravie Lakshmanan
Cybersecurity researchers have identified a new threat where fake CAPTCHA PDFs are being used to distribute Lumma Stealer malware across multiple domains, including Webflow and GoDaddy. This sophisticated scheme tricks users into downloading malware under the guise of verifying identity, exploiting trusted website functionalities.
The Lumma Stealer can extract a wide range of personal information, leading to significant privacy breaches. Experts are urging users to be cautious with downloads and to verify the authenticity of files and requests, especially when prompted by unexpected security checks.
Read more

Microsoft Disrupted a Global Cybercrime Ring Abusing Azure OpenAI Service

Security Affairs by Pierluigi Paganini
Microsoft has successfully disrupted a global cybercrime ring that was abusing its Azure OpenAI service. The operation involved cybercriminals using the service for malicious activities, including phishing and spreading malware.
Microsoft’s intervention highlights the ongoing battle against cyber threats exploiting cloud platforms. The company’s proactive measures have prevented further misuse, demonstrating the critical need for continuous monitoring and rapid response capabilities in cloud services. This event underscores the importance of vigilance and technological readiness in thwarting cybercriminal activities that leverage powerful cloud-based tools.
Read more

Farm and Food Cybersecurity Act Reintroduced to Protect Food Supply Chain from Cyber Threats

Industrial Cyber by Anna Ribeiro
The US Farm and Food Cybersecurity Act has been reintroduced to bolster cybersecurity across the food supply chain. This legislative push aims to protect critical infrastructure from cyber threats that could disrupt food production and distribution.
The act calls for enhanced security protocols, collaboration between government agencies and private sectors, and increased funding for cybersecurity measures. This initiative highlights the growing recognition of the vulnerability of the agricultural sector to cyber attacks, emphasising the importance of safeguarding this essential industry from potential disruptions.
Read more

Over 49,000 Misconfigured Building Access Systems Exposed Online

BleepingComputer by Bill Toulas
Over 49,000 building access control systems have been found exposed online due to misconfigurations, posing a significant security risk. These systems, which manage entry to facilities, could potentially allow unauthorised access if exploited by cybercriminals.
The exposure highlights a widespread issue in the security practices surrounding building management systems and underscores the need for stringent security audits and configurations. Cybersecurity experts are calling for immediate action to address these vulnerabilities to prevent potential breaches that could compromise both physical and data security.
Read more

ANALYSIS

Third-Party Risk Tops Cybersecurity Claims

Dark Reading by Robert Lemos
Recent findings reveal that third-party risks now lead as the primary cause of cybersecurity claims, underscoring the significant vulnerabilities associated with external collaborations. These risks stem from inadequate security measures among vendors and partners, potentially leading to data breaches and substantial financial losses.
The rise in such claims highlights the necessity for Organisations to enhance their third-party risk management protocols, ensuring rigorous security assessments and continuous monitoring of external entities. This proactive approach is essential to safeguard sensitive data and maintain robust cybersecurity defenses in an interconnected business environment.
Read more

Top 10 Most Probable Ways a Company Can Be Hacked

Dark Reading by Erich Kron
Cybersecurity expert Erich Kron has compiled a list of the top ten most probable ways companies can fall victim to hackers. This list serves as a crucial guide for businesses aiming to bolster their cyber defences.
The vulnerabilities range from phishing and malware to weak passwords and unsecured remote access. Kron emphasises the importance of awareness and proactive measures, such as regular updates, training employees, and implementing strong access controls. Highlighting these common vulnerabilities aims to empower companies to better protect themselves from increasingly sophisticated cyber threats.
Read more

This 5-Year Tech Industry Forecast Predicts Some Surprising Winners – and Losers

ZDNet by Joe McKendrick
A recent five-year forecast for the tech industry has identified potential winners and losers, shedding light on expected shifts in market dynamics. The report predicts that emerging technologies like artificial intelligence and blockchain will see significant growth, while traditional sectors may face challenges adapting to rapid technological changes.
Analysts stress the importance of innovation and flexibility for companies aiming to thrive in this evolving landscape. The forecast serves as a strategic guide for stakeholders to anticipate changes and strategically position themselves for success in the competitive tech arena.
Read more

3 Things to Know About AI Data Poisoning

Dark Reading by Arvind Nithrakashyap
AI data poisoning is emerging as a critical cybersecurity threat, allowing attackers to manipulate machine learning models by corrupting their training data. This technique can degrade AI performance, introduce biases, or even cause systems to make harmful decisions.
Security experts warn that as AI becomes more integrated into critical sectors like healthcare, finance, and cybersecurity, the risk of poisoned data grows. Organisations are urged to implement robust data validation, adversarial testing, and security protocols to safeguard AI integrity and prevent malicious exploitation of AI-driven technologies.
Read more

Fortifying Financial Services Cybersecurity with Threat Intelligence and Cybersecurity Automation

Financial IT by Chris Jacob
The financial sector is ramping up cybersecurity efforts by integrating threat intelligence and automation to combat increasingly sophisticated cyber threats. Experts highlight how automation enhances threat detection and response times, reducing reliance on manual processes that leave institutions vulnerable.
By leveraging AI-driven security measures, financial firms can better predict, prevent, and mitigate cyber attacks. As cybercriminal tactics evolve, industry leaders emphasise the necessity of real-time intelligence and automated defenses to protect sensitive financial data and maintain customer trust.
Read more

CyAN Members: Op Eds, Articles, etc:

The Cost of Silence: Enhancing Cyber Safety to Address Domestic Violence’s Impact on Women’s Employment and Education

Kim Chandler McDonald
CyAN Global VP Kim Chandler McDonald explores how technology-facilitated abuse disrupts women’s employment and education, limiting financial independence and career growth. She highlights the role of digital safety in preventing coercive control and ensuring that survivors can access opportunities without fear of online harassment.
The article advocates for stronger policies, employer awareness, and cybersecurity solutions that protect at-risk individuals. By addressing these challenges, Kim underscores the urgent need for systemic changes to create safer digital spaces and empower affected women.
Read more

Open Letter – Support for Responsible Cybersecurity Vulnerability Disclosure in Germany

CyAN Staff
CyAN staff have issued an open letter advocating for responsible cybersecurity vulnerability disclosure in Germany, emphasising the need for clear legal protections for security researchers. The letter highlights concerns that without proper safeguards, ethical hackers may face legal repercussions for exposing security flaws.
CyAN calls for legislation that encourages transparency, cooperation, and responsible reporting to strengthen Germany’s cybersecurity posture. The initiative aims to balance security needs with ethical considerations, ensuring researchers can contribute without fear of prosecution.
Read more

CyAN Member’s News

We at CyAN are ALWAYS overjoyed to celebrate our members’ successes and their contributions to the cybersecurity community!

We’re immensely proud to share that two esteemed members of the CyAN community, CyAN member Mohit Makhija and CyAN APAC Director Saba Bagheri, are finalists in the prestigious 2025 Australian Cyber Awards!

Mohit has been recognised in the Cyber Security Professional of the Year category, while Saba has earned accolades in both the Cyber Security Consultant of the Year – Enterprise and Cyber Security Professional of the Year – Government and Defence categories.

Their nominations are a testament to their outstanding contributions and dedication to the field of cybersecurity. Join us in congratulating Mohit and Saba—we are rooting for their success and celebrate their well-deserved recognition!

🔗 Mohit’s LinkedIn Post
🔗 Saba’s LinkedIn Post

And there’s more!

Please join us in celebrating our valued member Mohammed Shakil Khan, who has earned his Independent Director Certification from IICA and is now part of the Independent Director’s Databank of the Ministry of Corporate Affairs, Govt. of India.

Congratulations, Mohammed!

We’re excited to celebrate your achievement in earning the Independent Director Certification from the Indian Institute of Corporate Affairs (IICA) and becoming part of the Independent Director’s Databank under the Ministry of Corporate Affairs, Govt. of India.

This milestone reflects your dedication to corporate governance and leadership. Wishing you continued success in making an impact!

🔗 Mohammed’s LinkedIn Post

How MITRE ATT&CK Helps Us Understand and Stop Cyber Threats

Fel Gayanilo
CyAN General Secretary Fel Gayanilo explores how the MITRE ATT&CK framework enhances cybersecurity by providing a structured way to identify, analyse, and mitigate cyber threats. The framework helps security teams understand attacker tactics, techniques, and procedures, enabling more effective threat detection and response.
Gayanilo highlights its role in improving incident response, refining threat intelligence, and strengthening organisational security postures. As cyber threats evolve, he emphasises that leveraging frameworks like MITRE ATT&CK is crucial for staying ahead of adversaries and proactively defending critical systems.
Read more

Upcoming CyAN (and CyAN Partner) Global Events:

Breaking the Cycle: Combating Online IBSA for a Safer Digital Experience webinar, March 6th (EST 6AM, CET 12PM, AEST 10PM)
Register here

CyAN APAC: The Geopolitical Impacts of Cyber Threats: From Espionage to Influence keynote by Dan Elliot, March 12, Peoplebank, Sydney
More info

Trust & Safety Forum at Forum INCYBER Europe (FIC), Lille, France: April 1-2
More info

GITEX AFRICA, Marrakesh, Morocco: April 14-16
More info

GITEX ASIA, Singapore (Marina Bay Sands): April 23-25
More info

GISEC, Dubai World Trade Center, Dubai, UAE: May 6-8
More info

The Cyber Outstanding Security Performance Awards (Cyber OSPAs), May 8, London, UK
More info

World AI Technology Expo UAE, Dubai, UAE: May 14-15, 2025
More info

MaTeCC, Rabat, Morocco: June 7-9, 2025
(The third annual North Africa and beyond cybersecurity event, hosted by CyAN partner organisation École High-Tech.)
More info


📄 Download the full issue of CyAN Cyber (In)Securities Issue 12
Click here to view the PDF

Cybersecurity Investments in Global Banking: Comparative Analysis and Case Studies

Cybersecurity Investments in Global Banking: Comparative Analysis and Case Studies

An overview of cybersecurity spend in international banks

Dynamic Resilience: A Framework for Synergizing Operational Agility and Economic Security in the Era of Digital Transformation by Rupesh Shirke

Dynamic Resilience: A Framework for Synergizing Operational Agility and Economic Security in the Era of Digital Transformation by Rupesh Shirke

Abstract In today’s rapidly evolving digital landscape, organizations face unprecedented challenges that necessitate establishing a robust framework to navigate operational agility and economic security. This document delves into dynamic resilience, harmoniously integrating these vital components to foster sustainable growth, adaptability, and long-term success. Through a 

CyAN’s Position on Encryption Backdoor Legislation

The Cybersecurity Advisors Network believes that the security and privacy of information are fundamental to a thriving digital economy and society. We are committed to supporting initiatives, standards, technologies, and laws that enhance the global information ecosystem’s security, trustworthiness, safety, and resilience. Central to this commitment is our unwavering support for strong end-to-end encryption.

The Importance of Encryption

Encryption does more than protect technological infrastructures; it has significant social, political, and economic implications. By securing business transactions and voting processes, encryption ensures that these activities remain confidential and reliable. It also protects individuals’ privacy and shields them from cyber threats. In regions where fundamental rights are threatened, encryption enables dissidents and members of other threatened groups, such as LGBTQ, to communicate securely and free from governmental eavesdropping.

The Risks of Encryption Backdoors

Laws requiring encryption backdoors are often based in good intentions. However, introducing backdoors into encryption solutions compromises the very data security we strive to uphold. Such vulnerabilities can be exploited by malicious actors, lead to government overreach, or introduce unintentional security flaws. Importantly, criminals will bypass these laws by using unregulated encrypted platforms, rendering the backdoors ineffective.

Recent Legislative Challenges

In recent months, CyAN has voiced its opposition to several legislative efforts that threatened encryption integrity:

Meanwhile, new threats to the integrity of end-to-end encryption have emerged in Europe:

Both of these proposals would have a serious and detrimental impact on all services relying on end-to-end encryption – including secure messengers like Signal and WhatsApp, VPNs, and others.

CyAN’s Stance

While we recognize and appreciate the efforts of law enforcement and intelligence agencies in combating crimes such as child exploitation, drug trafficking, and terrorism, these efforts must not compromise the overarching need for privacy and security. CyAN strongly opposes any legislative proposals that threaten the integrity of encryption and, by extension, the privacy and security of the global digital community.

As part of our ongoing commitment to fostering a secure, private, and resilient digital world, CyAN will continue to lead and support efforts to preserve the strength of encryption. We urge legislators and the public to stand with us in opposing any initiatives that undermine these fundamental digital protections.

Open Letter – Support for Responsible Cybersecurity Vulnerability Disclosure in Germany

CyAN supports the open letter to the incoming German government advocating for legal clarity in protecting good faith cybersecurity vulnerability researchers.