Tag: Advisors

“What happens to Heroes ?” EPISODE #3: The short story long by Didier Annet

“What happens to Heroes ?” EPISODE #3: The short story long by Didier Annet

The Psychological Impacts of Cyberattacks This is the third episode of a story related to individuals who, in a matter of moments, transition from “employees” to “rescuers” in the immediate aftermath of a destructive cyberattack. What I will call the “Heroes” The hidden impact of 

Behind the Keys: Women Who Secure the Future – Sarah Jane Mellor

Behind the Keys: Women Who Secure the Future – Sarah Jane Mellor

📄 Download Feature PDF Want to connect? Here is Sarah Jane Mellor’s professional profile. Feel free to say hello and show your support. 🔗 Connect on LinkedIn About the Author Saba Bagheri, PhD Cyber Threat Intelligence Manager at Bupa APAC Director at the Cybersecurity Advisors 

Cyber (In)Securities – Issue 137

Cyber (In)Securities – Issue 137

Information Security News

1. Oracle Cloud security SNAFU latest: IT giant accused of pedantry as evidence scrubbed
The Register – Thomas Claburn
Read more

2. CoffeeLoader Malware Is Stacked With Viscous Evasion Tricks
Dark Reading – Becky Bracken
Read more

3. Phishing platform ‘Lucid’ behind wave of iOS, Android SMS attack
BleepingComputer – Bill Toulas
Read more

4. DoJ Seizes Over $8M From Sprawling Pig Butchering Scheme
Dark Reading – Kristina Beek
Read more

5. North Korean hackers adopt ClickFix attacks to target crypto firms
BleepingComputer – Bill Toulas
Read more

6. Russia-Linked Gamaredon Targets Ukraine with Remcos RAT
Security Affairs – Pierluigi Paganini
Read more

7. Hackers Exploit WordPress mu-Plugins to Inject Spam and Hijack Site Images
The Hacker News – Ravi Lakshmanan
Read more

8. Australian Kaspersky ban triggered by detection in gov agency supply chain
itNews – Ry Crozier
Read more

9. Experts Warn of the New Sophisticate Crocodilus Mobile Banking Trojan
Security Affairs – Pierluigi Paganini
Read more

10. U.S. seized $8.2 million in crypto linked to ‘Romance Baiting’ scams
BleepingComputer – Bill Toulas
Read more

11. EU plans €1.3 billion to boost continent’s cybersecurity, AI skills
SC Media – Shaun Nichols
Read more

12. ‘Incel’ accounts using self-improvement language to avoid TikTok bans – study
The Guardian – Daniel Boffey
Read more

13. Threat actor in Oracle Cloud breach may have gained access to production environments
Cybersecurity Dive – David Jones
Read more

14. BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerability
The Hacker News – Ravi Lakshmanan
Read more

15. Malaysia PM Refuses to Pay $10M Ransomware Demand
Dark Reading – Kristina Beek
Read more

16. Hackers Bypass Windows Defender Security—What You Need To Know
Forbes – Davey Winder
Read more

17. ENISA space threat landscape report highlights cybersecurity gaps in commercial satellites, urges enhanced defense
Industrial Cyber News – Anna Ribeiro
Read more

18. FBI investigates cyberattack at Oracle, patient records breached
Cybernews/Reuters
Read more

19. DOGE Plans to Rebuild SSA Code Base in Months, Risking Benefits and System Collapse
Wired – Makena Kelly
Read more

ANALYSIS

20. Introduction to AI in Cyber Warfare: The Weaponisation of AI in Cyber Warfare – Part 1 of a 6 Part Series
PrivID (Substack)
Read more

21. Innovating to Improve Cybersecurity is Forever a Work in Progress
TN Global – James Ngyuen
Read more

22. Manufacturing Cybersecurity Threats Sharply Grew in 2024
Manufacturing Digital – Rachael Brown
Read more

23. Cybersecurity for Small and Medium Businesses in 2025: Challenges and Solutions
itWire – Ansel Murphy
Read more

24. The AI-Powered Erosion Of Reality: Closing The Human Vulnerability Gap In Cybersecurity
Forbes – Stephen Moore
Read more

25. Why Your Browsers Should Be At The Center Of Your Cybersecurity Strategy
Forbes – Anand Oswal
Read more

CyAN Special Feature: Behind the Keys – Women Who Secure the Future

26. Interview with Irene Corpuz, recognised as one of the ‘Top 20 Cybersecurity Woman of the World’ in 2024
CyAN Website
Read more

27. Interview with Daniela Fernandez, Division Director, Technology and Cyber Security Risk at Macquarie Group
CyAN Website
Read more

CyAN Members: NEWS

28. Dan Elliott on Behavioural Change in Cybersecurity
CyAN LinkedIn
Read more

29. CyAN Member Prabhat Pathak Passes His Certified Ethical Hacker Exam
CyAN LinkedIn – Member Spotlight
Read more

30. Bharat Raigangar to Speak at the Third Party and Supply Chain Cyber Security Summit (SCCS)
CyAN LinkedIn – Event Spotlight
Read more

Upcoming CyAN (and CyAN Partner) Global Events:

  • Supply Chain Cyber Security Summit (SCCS), Lisbon, Portugal: April 9–11 Read more
  • GITEX AFRICA, Marrakesh, Morocco: April 14–16 Read more
  • GITEX ASIA, Singapore (Marina Bay Sands): April 23–25 Read more
  • GISEC, Dubai World Trade Centre, UAE: May 6–8 Read more
  • The Cyber Outstanding Security Performance Awards (Cyber OSPAs), London, UK: May 8 Read more
  • CSG Awards 2025, Dubai: May 7 Read more
  • World AI Technology Expo, Dubai, UAE: May 14–15 Read more
  • CyAN 10th Anniversary Celebrations!
  • GITEX Europe Messe, Berlin, Germany: May 21–23 Read more
  • MaTeCC, Rabat, Morocco (The third annual North Africa cybersecurity event, hosted by CyAN partner École High-Tech): June 7–9, 2025 Read more
  • CyAN Q2 Community Call (APAC and the Gulf): June 11, 12:00 GST / 16:00 SGT / 18:00 AEST
  • CyAN Q2 Community Call (EMEA and the Americas): June 11, 20:00 GST / 18:00 CET / 17:00 UTC / 12:00 EDT
InSecurities Issue 137
👉 Visit us on LinkedIn – like and share!

Behind the Keys: Women Who Secure the Future – Daniela Fernandez

Behind the Keys: Women Who Secure the Future – Daniela Fernandez

📄 Download Feature PDF Want to connect? Here is Daniela Fernandez’s professional profile. Feel free to say hello and show your support. 🔗 Connect on LinkedIn About the Author Saba Bagheri, PhD Cyber Threat Intelligence Manager at Bupa APAC Director at the Cybersecurity Advisors Network 

Cyber (In)Securities – Issue 136

Cyber (In)Securities – Issue 136

Information Security News Italian government approved use of spyware on members of refugee NGO, MPs told The Guardian by Angela Giuffrida & Stephanie KirchgaessnerItalian lawmakers have been informed that spyware was authorised against members of a refugee NGO, sparking fierce backlash over potential human rights 

Unraveling Digital Sovereignty: The Delicate Balance of Digital Sovereignty: Insights and Imperatives

Unraveling Digital Sovereignty: The Delicate Balance of Digital Sovereignty: Insights and Imperatives

Defining Digital Sovereignty in Our Times

In his thought-provoking article, “Digital Sovereignty: A Framework for the Internet Age,” Robin Berjon skilfully outlines the challenges and necessities of digital sovereignty. This article builds on his foundation, delving deeper into nuanced facets of digital sovereignty and highlighting critical issues such as the essential role of end-to-end encryption (E2EE), the economic and security risks posed by tariff wars, and the importance of competent digital governance in managing powerful digital tools.

Central to our discussion is Cory Doctorow’s concept of ‘enshittification’—the gradual degradation of systems as commercial pressures and scale erode their founding principles. This concept serves as a cautionary backdrop to our exploration, particularly as we examine how poor management and short-sighted policies can undermine the digital sovereignty of nations.

The Imperative of End-to-End Encryption (E2EE)

End-to-end encryption (E2EE) is foundational to digital security. As digital data increasingly underpins our societal functions, ensuring that such data remains encrypted and accessible only to intended recipients safeguards both individual privacy and national security. Advocating for the widespread adoption of robust, uncompromised E2EE is crucial for maintaining trust and integrity in international communications. This approach supports the digital sovereignty of nations by ensuring their communications remain secure from foreign interference.

The Temptation of Data Tariffs

In an era where digital borders are becoming as significant as their physical counterparts, there might be a temptation among policymakers to introduce data tariffs as a means of controlling and monetising the international flow of data. Such measures could be seen as attractive for countries looking to bolster their domestic tech industries or protect their data from foreign exploitation. However, the following section will explore why this seemingly bright idea might not shine in practice.

Tariff Wars: A Cautionary Tale

While some may argue that data tariffs could serve as economic levers or protective measures, history teaches us that tariff wars lead to economic inefficiency and often hurt more than they help. Imposing tariffs on data could backfire by isolating markets, increasing costs for consumers and businesses alike, and stifling innovation. To avoid these pitfalls, we must seek cooperative international agreements that support open data flows while respecting each nation’s right to digital sovereignty.

Data Security as National Security

Data security extends beyond protecting personal information; it is an integral component of national security. In a world where data breaches can lead to significant economic, social, and political disruptions, securing our digital assets is paramount. Robust national and international frameworks that prioritise security without compromising global interoperability are essential for maintaining digital sovereignty and economic stability.

Combating ‘Enshittification’ in Digital Governance

Cory Doctorow’s notion of ‘enshittification’—the degradation of systems as they scale—can be observed in the digital world when there is insufficient oversight and management of complex digital tools. This can lead to significant vulnerabilities in terms of security and user experience. Promoting a culture of careful stewardship and informed management across all levels of digital operations is crucial to prevent the decline in the quality and security of digital platforms.

Conclusion: A Call for Thoughtful Digital Governance

Digital sovereignty challenges us to navigate complex territories of technology, policy, and human rights. By championing uncompromised E2EE, advocating against data tariffs, emphasising the national security implications of data security, and demanding knowledgeable handling of digital technologies, we can strive towards a balanced approach that protects both individual rights and national interests. Let’s commit to fostering an environment where digital sovereignty is balanced with global cooperation for a secure, open, and fair digital future.

Read more: Digital Sovereignty: A Framework for the Internet Age by Robin Berjon


About the Author:

Kim Chandler McDonald is the Co-Founder and CEO of 3 Steps Data, driving data/digital governance solutions.
She is the Global VP of CyAN, an award-winning author, storyteller, and advocate for cybersecurity, digital sovereignty, compliance, governance, and end-user empowerment.

Cyber (In)Securities – Issue 135

Cyber (In)Securities – Issue 135

Information Security News US Weakens Disinformation Defenses, as Russia & China Ramp Up Dark Reading by Robert LemosAs geopolitical tensions escalate, the US has notably reduced its efforts to combat disinformation, especially from key adversaries like Russia and China. This rollback occurs despite increasing efforts 

Cyber (In)Securities – Issue 134

Cyber (In)Securities – Issue 134

Information Security News Judge blocks Elon Musk’s Doge from accessing social security records The Guardian by Guardian Staff & AgenciesA federal judge has issued a restraining order preventing Elon Musk’s Department of Government Efficiency (Doge) from accessing Social Security Administration (SSA) records, citing privacy concerns 

Securing the Future: Innovative Cybersecurity for Agentic AI by Shantanu Bhattacharya

Agentic AI is when autonomous AI agents make decisions and execute tasks. It’s poised to revolutionize industries. But with this power comes new cybersecurity challenges. This blog explores the deployment architectures of agentic AI solutions and identifies key attack vectors, offering a glimpse into innovative cybersecurity defenses.

Agentic AI Deployment Architecture

Agentic AI systems typically employ a modular, layered architecture, where the core lies within five key layers:

  • AI Agents Layer: Houses the autonomous entities performing tasks, interacting with users, and collaborating using large language models (LLM).
  • Orchestration Layer: Manages the workflows of multi-agent framework. It keeps track of conversations and actions.
  • Security & Trust Layer: Here is where the Zero Trust architecture verifies all AI interactions. In this layer, the prompt injections are sanitized and filtered. The architecture incorporates role and attribute-based access control along with threat detection tools.
  • Data and Knowledge Layer: Here the agentic system stores persistent and non-persistent memories for improved reasoning. The structured and unstructured data is organized using vector databases and knowledge graphs.
  • Infrastructure Layer: Houses the cloud, edge, and on-premises computing resources. It also is responsible for the LLM’s and other key hosting and deployment.

Key Attack Vectors Unique to Agentic AI

  • Prompt Injection & Manipulation: Attackers exploit agentic AI’s greatest strength by tricking the system using malformed and subtle prompts. It can cause the system to carry out harmful actions. An example of this could be tricking a trading tool to make an unauthorized trade.
  • AI Supply Chain Attacks: Threat actors could compromise training data or pre-trained models, leading to biased or insecure agentic AI behaviors. Training data must be authenticated to prevent AI’s from leaning biased traits.
  • Model Inference & Data Extraction: Attackers could extract personally identifiable information (PII) or proprietary information by querying agentic AI models to extract data that would otherwise be inaccessible.
  • AI System Hijacking: Gaining full control of an autonomous AI agent, for example, disabling the security protocols of an incident response system.
  • AI-Driven Social Engineering: Scammers using advanced AI tools to craft hyper-personalized phishing attacks.
  • Decision Poisoning & Adversarial Attacks: Crafting inputs to manipulate AI outputs, such as tricking fraud detection systems into thinking fraud isn’t actually fraud.
  • Inter-Agent Collusion & AI Swarm Exploits: AI agents collaborating to create attacks or amplify risks. This could be an agent used for trading that starts to create artificial market fluctuations.

Innovative Cybersecurity Solutions for Agentic AI

  • AI Firewalls & LLM Guardrails: Intercept and sanitize prompts/outputs, ensuring Zero Trust AI.
  • AI Model Fingerprinting & Provenance Tracking: Verify model integrity and prevent poisoning using cryptographic fingerprints and blockchain.
  • AI Red-Teaming as a Service: Continuous adversarial testing using AI-driven red teams to simulate attacks.
  • Self-Healing AI Security Agents: Detect, adapt, and neutralize attacks in real-time, patching vulnerabilities autonomously.
  • Trust Layer for AI Communication: Cryptographic verification and AI-to-AI authentication.
  • AI-Governed Least Privilege Access Control: Dynamic access control based on real-time behavior analysis.
  • Synthetic Honeytokens for AI Deception: Detect unauthorized access attempts.
  • AI Behavioral Sandboxing: Isolate AI agents in controlled environments to limit decision-making risks.

Conclusion

Securing agentic AI requires a proactive, multi-layered approach. Innovative cybersecurity solutions, along with robust governance frameworks, are essential for harnessing the transformative power of AI while mitigating risks. As agentic AI becomes increasingly prevalent, prioritizing security will be critical for building trust and ensuring its responsible deployment.


About the Author

Shantanu Bhattacharya
Founder, CEO & CTO, 360Sequrity
LinkedIn Profile

🔗 Read the original article on RSAC Conference
Originally posted on March 10, 2025

Cyber (In)Securities – Issue 133

Information Security News Microsoft: New RAT Malware Used for Crypto Theft, Reconnaissance BleepingComputer by Sergiu GatlanMicrosoft has identified a new form of RAT (Remote Access Trojan) malware that is being used for cryptocurrency theft and detailed reconnaissance of infected systems. This sophisticated malware targets digital