You’d think nation-state cyber attackers would be too busy targeting military secrets, critical infrastructure, or global financial systems to bother with your local optometrist, small engineering firm, or boutique consultancy. But you’d be wrong. As Rob Lemos in his recent Dark Reading article “Nation-State Threats Put SMBs in Their Sights” noted, small and medium businesses […]
Advisors
Cyber (In)Securities – Issue 141
News Former cyber official targeted by Trump quits company over moveNBC News – Kevin Collier MITRE’s CVE program given last-minute reprieveitNews – Raphael Satter Whistle Blower: Russian Breach of US Data Through DOGENarativ – Zev Shalev Midnight Blizzard deploys GrapeLoader malwareBleepingComputer – Bill Toulas 4chan taken down following major hackBleepingComputer – Sergiu Gatlan China places […]
No Time for Antics with Semantics: Why CVEs Are Cybersecurity’s Lifeline

The cybersecurity world runs on shared language. We don’t often talk about it in those terms—but that’s exactly what the CVE (Common Vulnerabilities and Exposures) system is. A global taxonomy of flaws. A universal index of weakness. The quiet backbone that lets defenders coordinate responses in a coherent, time-sensitive, and standardised way. This week, we […]
What happens to Heroes?” EPISODE #4: The Unsung Heroes of the Digital World by Didier Annet

The Psychological Impacts of Cyberattacks This is the fourth episode of a story related to individuals who, in a matter of moments, transition from “employees” to “rescuers” in the immediate aftermath of a destructive cyberattack. What I will call the “Heroes”! Let’s Rewrite the Story of a Cyberattack – Uchrony of a losing scenario “The […]
Welcome New Member – Younès Felahi from Morocco

Please welcome our newest member from Morocco, Younès Felahi Younes FELAHI, a recognized cybersecurity expert in Morocco and Africa, has over 15 years of experience in the field. He has held positions as a consultant, architect, and expert in cyber strategies, governance, risk and compliance, cyber architecture, SOC activity structuring, and management of detection […]
Cyber (In)Securities – Issue 140

Information Security News Tariffs May Prompt Increase in Global CyberattacksDark Reading – Robert Lemos US Comptroller Cyber ‘Incident’ Compromises Org’s EmailsDark Reading – Kristina Beek Wyden Blocks Trump’s CISA Boss Nominee, Blames Cyber Agency for ‘Actively Hiding Info’ About Telecom InsecurityThe Register – Jessica Lyons Trump Signs Order Stripping Chris Krebs of Security ClearanceCyberscoop – […]
Cyber (In)Securities – Issue 139

Information Security News Autonomous, GenAI-Driven Attacker Platform Enters the ChatDark Reading – Elizabeth Montalbano EncryptHub’s dual life: Cybercriminal vs Windows bug-bounty researcherBleepingComputer – Bill Toulas Voluntary ‘Pall Mall Process’ seeks to curb spyware abusesCyberscoop – Tim Starks That massive GitHub supply chain attack? It all started with a stolen SpotBugs tokenThe Register – Jessica Lyons […]
Behind the Keys: Women Who Secure the Future – Fatema Fardan

Download Feature PDF Want to connect? Here is Fatema Fardan’s professional profile. Feel free to say hello and show your support.
Connect on LinkedIn About the Author Saba Bagheri, PhD Cyber Threat Intelligence Manager at Bupa APAC Director at the Cybersecurity Advisors Network (CyAN) She is a highly credentialed professional holding CISM, CEH, […]
Behind the Keys: Women Who Secure the Future – Edna Conway

Download Feature PDF Want to connect? Here is Edna Conway’s professional profile. Feel free to say hello and show your support.
Connect on LinkedIn About the Author Saba Bagheri, PhD Cyber Threat Intelligence Manager at Bupa APAC Director at the Cybersecurity Advisors Network (CyAN) She is a highly credentialed professional holding CISM, CEH, […]
Cyber (In)Securities – Issue 138

Information Security News Disclosure Drama Clouds CrushFTP Vulnerability ExploitationDark Reading – Rob Wright CISA warns of Fast Flux DNS evasion used by cybercrime gangsBleepingComputer – Bill Toulas Google Quick Share Bug Bypasses Allow Zero-Click File TransferDark Reading – Tara Seals China-Linked Threat Group Exploits Ivanti BugDark Reading – Jai Vijayan International intelligence agencies raise the […]