Cyber (In)Securities – Issue 124

CyAN

Information Security News Thai authorities detain four Europeans in ransomware crackdown Cyberscoop by Greg OttoIn a coordinated operation, Thai authorities arrested four European nationals in Phuket, suspected of orchestrating Phobos ransomware attacks. The individuals allegedly extorted approximately $16 million in Bitcoin from over 1,000 victims globally. The operation, codenamed “Phobos Aetor,” involved raids across multiple […]

Delving into the Shadows: An Approach to Identifying Obscure Cyberattacks

CyAN

By Shantanu Bhattacharya Posted on February 06, 2025 | Originally published on RSAC Conference 📌 Read the original article on RSAC Conference In the ever-evolving landscape of cybersecurity, attackers are constantly seeking new ways to bypass traditional defenses. This blog delves into the often-overlooked methods they use, focusing on how obscure techniques, specifically within UNIX […]

Australia’s Digital Destiny: Leading the Charge for Online Freedom

Introduction In today’s interconnected world, the importance of digital rights cannot be overstated. While the European Union is making commendable strides in this arena, Australia stands at a pivotal juncture to assert its leadership in championing online freedom. The nation’s commitment to democratic values, coupled with a robust technological infrastructure, uniquely positions it to influence […]

Cyber (In)Securities – Issue 123

CyAN

Information Security News: Federal Judge Tightens DOGE Leash Over Critical Treasury Payment System AccessThe Register by Brandon Vigliarolo and Jessica LyonA federal judge has mandated stricter regulatory oversight on the integration of Dogecoin (DOGE) within the U.S. Treasury’s critical payment systems, following concerns about the cryptocurrency’s potential to disrupt financial stability. This decision introduces a […]

Welcome New Member – Osama Soliman from UAE

Please welcome our newest member from UAE, Osama Soliman! Osama Soliman is a seasoned GRC professional with extensive experience in risk management, internal controls, and regulatory compliance. He currently leads the Risk & Control function at a leading online food delivery platform, overseeing GRC activities across multiple markets, including Enterprise Risk Management (ERM), Technology Risk […]

Cyber (In)Securities – Issue 122

CyAN

Information Security News: TSA’s Airport Facial-Recog Tech Faces Audit ProbeThe Register by Brandon VigliaroloThe U.S. Transportation Security Administration’s (TSA) facial recognition program is under audit by the Government Accountability Office (GAO) due to concerns over privacy, data security, and potential biases. The audit will assess how biometric data is collected, stored, and shared, and whether […]

How EDR/XDR Technologies Enhance Data Privacy and Their Implications for AI Governance

In today’s digital world, data privacy has become a paramount concern for organizations and individuals alike. As cyber threats grow increasingly sophisticated, organizations turn to robust security solutions like Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR) to safeguard sensitive data. Beyond their immediate role in mitigating cyber risks, these technologies also […]

CyAN Members Bharat Raigangar and Dr. Mathew Nicho Featured as Cover Story in Enterprise IT World MEA

We are proud to share that two of our esteemed CyAN members, Bharat Raigangar and Dr. Mathew Nicho, are featured as the cover story in the December 2024 issue of Enterprise IT World MEA! his engaging cover story reflects their thought leadership and their commitment to advancing cybersecurity practices within the financial industry and beyond. […]

Welcome new member – Yedhu Krishna Menon

Please welcome our newest member from Kuwait, Yedhu Krishna Menon from Kuwait! Yedhu Krishna Menon is a seasoned Third-Party Risk and Cybersecurity expert with over 15 years of experience, currently serving as the Head of Third-Party Risk Management at Gulf Bank. Throughout his career, he has demonstrated excellence in third-party and supply chain security, cybersecurity, […]