Tag: Cybercrime

Cyber (In)Securities – Issue 144

News Quantum computer threat spurring quiet overhaul of internet securityCyberscoop – Greg Otto Pro-Russia hacktivists bombard Dutch public orgs with DDoS attacksBleepingComputer – Bill Toulas Dems look to close the barn door after top DOGE dog has boltedThe Register – Brandon Vigliarolo Canadian Electric Utility 

Cyber (In)Securities – Issue 143

Cyber (In)Securities – Issue 143

News Cybersecurity CEO accused of running malware on hospital PC blabs about it on LinkedInThe Register – Brandon Vigliarolo Cybersecurity experts issue response to Trump order targeting Chris Krebs, SentinelOneCyberscoop – Greg Otto Marks & Spencer breach linked to Scattered Spider ransomware attackBleepingComputer – Lawrence 

Cyber (In)Securities – Issue 140

Cyber (In)Securities – Issue 140

Information Security News

  1. Tariffs May Prompt Increase in Global Cyberattacks
    Dark Reading – Robert Lemos
  2. US Comptroller Cyber ‘Incident’ Compromises Org’s Emails
    Dark Reading – Kristina Beek
  3. Wyden Blocks Trump’s CISA Boss Nominee, Blames Cyber Agency for ‘Actively Hiding Info’ About Telecom Insecurity
    The Register – Jessica Lyons
  4. Trump Signs Order Stripping Chris Krebs of Security Clearance
    Cyberscoop – Greg Otto
  5. Hackers Target SSRF Bugs in EC2-Hosted Sites to Steal AWS Credentials
    BleepingComputer – Bill Toulas
  6. Sensitive Financial Files Feared Stolen From US Bank Watchdog
    The Register – Iain Thomson
  7. National Social Security Fund of Morocco Suffers Data Breach
    Security Affairs – Pierluigi Paganini
  8. BadBazaar and Moonshine Malware Targets Taiwanese, Tibetan and Uyghur Groups, U.K. Warns
    Cyberscoop – Tim Starks
  9. Critical FortiSwitch Flaw Lets Hackers Change Admin Passwords Remotely
    BleepingComputer – Sergiu Gatlan
  10. Fake Microsoft Office Add-in Tools Push Malware via SourceForge
    BleepingComputer – Bill Toulas
  11. Privacy Fights Over Expiring Surveillance Law Loom After House Hearing
    Cyberscoop – Tim Starks
  12. UK Orgs Pull Back Digital Projects With Looming Threat of Cyberwarfare
    Dark Reading – Kristina Beek
  13. Adobe Calls Urgent Attention to Critical ColdFusion Flaws
    SecurityWeek – Ryan Naraine
  14. 2 Android Zero-Day Bugs Under Active Exploit
    Dark Reading – Kristina Beek
  15. Treasury Department Bank Regulator Discloses Major Hack
    Cybersecurity Dive – Elizabeth Montalbano
  16. Inside a Powerful Database ICE Uses to Identify and Deport People
    404 Media – Jason Koebler
  17. Dangerous, Windows-Hijacking Neptune RAT Scurries Into Telegram, YouTube
    Dark Reading – Elizabeth Montalbano
  18. SAP Patches Critical Code Injection Vulnerabilities
    SecurityWeek – Ionut Arghire
  19. WhatsApp Vulnerability Could Facilitate Remote Code Execution
    SecurityWeek – Eduard Kovacs
  20. ESET Vulnerability Exploited for Stealthy Malware Execution
    SecurityWeek – Ionut Arghire
  21. UAC-0226 Deploys GIFTEDCROOK Stealer via Malicious Excel Files Targeting Ukraine
    The Hacker News – Ravie Lakshmanan
  22. Meta Blocks Livestreaming by Teenagers on Instagram
    The Guardian – Dan Milmo
  23. EVEREST Ransomware Group’s TOR Leak Site Offline After a Defacement
    Security Affairs – Pierluigi Paganini
  24. Russian Bots Hard at Work Spreading Political Unrest on Romania’s Internet
    Bitdefender – Graham Cluley
  25. Six Arrested for AI-Powered Investment Scams That Stole $20 Million
    BleepingComputer – Bill Toulas
  26. As CISA Braces for More Cuts, Threat Intel Sharing Takes a Hit
    The Register – Jessica Lyons
  27. Counterfeit Android Devices Found Preloaded with Triada Malware
    BleepingComputer – Bill Toulas
  28. Joint Letter on Swedish Data Storage and Access to Electronic Information Legislation
    Global Encryption Coalition – Ryan Polk

Analysis

  1. Groucho’s Wit, Cloud Complexity, and the Case for Consistent Security Policy
    SecurityWeek – Joshua Goldfarb
  2. How Democratized Development Creates a Security Nightmare
    Dark Reading – Fernando José Karl
  3. Experts Optimistic About Secure by Design Progress
    Dark Reading – Arielle Waldman
  4. Machine Identity a Key Priority for Organisations’ Security Strategies
    itNews

CyAN Members Op Eds, Articles, etc.

  1. 🔐 End-to-End Encryption: A Cornerstone Under Pressure?
    – Peter Evans
  2. CyAN Member Spotlight: Łukasz Gawron – Advancing Cybersecurity in Poland

🗓️ Upcoming CyAN (and CyAN Partner) Global Events:

SCCS Logo

📍 Lisbon, Portugal

Supply Chain Cyber Security Summit (SCCS)
April 9–11

Read more
GITEX AFRICA Logo

📍 Marrakesh, Morocco

GITEX AFRICA
April 14–16

Read more
GITEX ASIA Logo

📍 Singapore

GITEX ASIA
April 23–25

Read more
GISEC Logo

📍 Dubai, UAE

GISEC
May 6–8

Read more
Cyber OSPAs Logo

📍 London, UK

Cyber OSPAs
May 8

Read more
CSG Awards Logo

📍 Dubai, UAE

CSG Awards 2025
May 7

Read more
World AI Expo Logo

📍 Dubai, UAE

World AI Technology Expo
May 14–15

Read more

🎉 Celebration

CyAN 10th Anniversary
(Details TBA)

GITEX Europe Logo

📍 Berlin, Germany

GITEX Europe Messe
May 21–23

Read more
MaTeCC Logo

📍 Rabat, Morocco

MaTeCC
June 7–9

Read more

🌐 Online

CyAN Q2 Call (APAC + Gulf)
June 11 – 12:00 GST / 16:00 SGT / 18:00 AEST

🌐 Online

CyAN Q2 Call (EMEA + Americas)
June 11 – 20:00 GST / 18:00 CET / 17:00 UTC / 12:00 EDT

Cyber (In)Securities – Issue 139

Cyber (In)Securities – Issue 139

Information Security News Autonomous, GenAI-Driven Attacker Platform Enters the ChatDark Reading – Elizabeth Montalbano EncryptHub’s dual life: Cybercriminal vs Windows bug-bounty researcherBleepingComputer – Bill Toulas Voluntary ‘Pall Mall Process’ seeks to curb spyware abusesCyberscoop – Tim Starks That massive GitHub supply chain attack? It all 

Behind the Keys: Women Who Secure the Future – Fatema Fardan

Behind the Keys: Women Who Secure the Future – Fatema Fardan

📄 Download Feature PDF Want to connect? Here is Fatema Fardan’s professional profile. Feel free to say hello and show your support. 🔗 Connect on LinkedIn About the Author Saba Bagheri, PhD Cyber Threat Intelligence Manager at Bupa APAC Director at the Cybersecurity Advisors Network 

Behind the Keys: Women Who Secure the Future – Edna Conway

Behind the Keys: Women Who Secure the Future – Edna Conway

Behind the Keys Cover

Want to connect? Here is Edna Conway’s professional profile. Feel free to say hello and show your support.

🔗 Connect on LinkedIn

About the Author

Saba Bagheri, PhD
Cyber Threat Intelligence Manager at Bupa
APAC Director at the Cybersecurity Advisors Network (CyAN)

She is a highly credentialed professional holding CISM, CEH, and CRISC certifications, with deep expertise in ATT&CK®-aligned SOC operations and Cyber Threat Intelligence. Based in Sydney, New South Wales, Australia, Saba is a respected leader in the cybersecurity community, actively contributing to international threat intelligence collaboration.

🔗 Connect on LinkedIn
Cyber (In)Securities – Issue 138

Cyber (In)Securities – Issue 138

Information Security News Disclosure Drama Clouds CrushFTP Vulnerability ExploitationDark Reading – Rob Wright CISA warns of Fast Flux DNS evasion used by cybercrime gangsBleepingComputer – Bill Toulas Google Quick Share Bug Bypasses Allow Zero-Click File TransferDark Reading – Tara Seals China-Linked Threat Group Exploits Ivanti 

Behind The Keys: Women Who Secure the Future

Behind The Keys: Women Who Secure the Future

(In)Securities Special Edition (In)Securities Special Edition Celebrating International Women in Tech Day Editor-in-Chief Kim Chandler McDonald Co-Founder and CEO of 3 Steps Data Global VP at CyAN An award-winning author and advocate for cybersecurity, compliance, and digital sovereignty. Kim drives global conversations on data governance 

Behind the Keys: Women Who Secure the Future – Roxanne Pashaei

Behind the Keys: Women Who Secure the Future – Roxanne Pashaei

Behind the Keys Cover

Want to connect? Here is Roxanne Pashaei’s professional profile. Feel free to say hello and show your support.

🔗 Connect on LinkedIn

About the Author

Saba Bagheri, PhD
Cyber Threat Intelligence Manager at Bupa
APAC Director at the Cybersecurity Advisors Network (CyAN)

She is a highly credentialed professional holding CISM, CEH, and CRISC certifications, with deep expertise in ATT&CK®-aligned SOC operations and Cyber Threat Intelligence. Based in Sydney, New South Wales, Australia, Saba is a respected leader in the cybersecurity community, actively contributing to international threat intelligence collaboration.

🔗 Connect on LinkedIn
Strengthening Global Security: Data Protection as National Imperative

Strengthening Global Security: Data Protection as National Imperative

In my previous article, Unraveling Digital Sovereignty: The Delicate Balance of Digital Sovereignty: Insights and Imperatives, we explored the intricate balance between protecting national interests and promoting global digital cooperation. Building on that foundation, Part 2 of our series dives deeper into how nations can