Tag: Cybercrime

Behind the Keys: Women Who Secure the Future – Inssata RICOURT

Behind the Keys: Women Who Secure the Future – Inssata RICOURT

📄 Download Feature PDF Want to connect? Here is Inssata RICOURT’s professional profile. Feel free to say hello and show your support. 🔗 Connect on LinkedIn About the Author Saba Bagheri, PhD Cyber Threat Intelligence Manager at Bupa APAC Director at the Cybersecurity Advisors Network 

“What happens to Heroes ?” EPISODE #3: The short story long by Didier Annet

“What happens to Heroes ?” EPISODE #3: The short story long by Didier Annet

The Psychological Impacts of Cyberattacks This is the third episode of a story related to individuals who, in a matter of moments, transition from “employees” to “rescuers” in the immediate aftermath of a destructive cyberattack. What I will call the “Heroes” The hidden impact of 

Behind the Keys: Women Who Secure the Future – Sarah Jane Mellor

Behind the Keys: Women Who Secure the Future – Sarah Jane Mellor

Behind the Keys Cover

Want to connect? Here is Sarah Jane Mellor’s professional profile. Feel free to say hello and show your support.

🔗 Connect on LinkedIn

About the Author

Saba Bagheri, PhD
Cyber Threat Intelligence Manager at Bupa
APAC Director at the Cybersecurity Advisors Network (CyAN)

She is a highly credentialed professional holding CISM, CEH, and CRISC certifications, with deep expertise in ATT&CK®-aligned SOC operations and Cyber Threat Intelligence. Based in Sydney, New South Wales, Australia, Saba is a respected leader in the cybersecurity community, actively contributing to international threat intelligence collaboration.

🔗 Connect on LinkedIn
Cyber (In)Securities – Issue 137

Cyber (In)Securities – Issue 137

Information Security News 1. Oracle Cloud security SNAFU latest: IT giant accused of pedantry as evidence scrubbedThe Register – Thomas ClaburnRead more 2. CoffeeLoader Malware Is Stacked With Viscous Evasion TricksDark Reading – Becky BrackenRead more 3. Phishing platform ‘Lucid’ behind wave of iOS, Android 

Behind the Keys: Women Who Secure the Future – Daniela Fernandez

Behind the Keys: Women Who Secure the Future – Daniela Fernandez

📄 Download Feature PDF Want to connect? Here is Daniela Fernandez’s professional profile. Feel free to say hello and show your support. 🔗 Connect on LinkedIn About the Author Saba Bagheri, PhD Cyber Threat Intelligence Manager at Bupa APAC Director at the Cybersecurity Advisors Network 

Upcoming Global Events to Watch Out For

Upcoming Global Events to Watch Out For

CyAN Logo

CyAN is proud to announce our role as a Community Partner for the following prominent global cybersecurity and technology events. Mark your calendars!

Supply Chain Cyber Security Summit (SCCS)

9–11 April 2025 | Lisbon, Portugal

CyAN board member Bharat Raigangar will be speaking at this critical cybersecurity event, focusing on securing supply chains and third-party partnerships. Learn practical strategies and insights through real-world case studies presented by Bharat and other leading cybersecurity experts.

Learn more →

GITEX Africa 2025

14–16 April 2025 | Morocco

Discover Africa’s dynamic tech growth and engage with innovative solutions transforming the continent’s technology landscape.

Learn more →

GITEX Asia 2025

23–25 April 2025 | Singapore

Join the Asian inaugural edition of the world’s largest tech event. Connect with top tech innovators and industry leaders.

Learn more →

CSG Awards 2025

7 May 2025 | Shangri-La, Sheikh Zayed Rd, Dubai, UAE

CyAN board member Bharat Raigangar is participating both as a distinguished jury member and speaker at this prestigious cybersecurity event. The CSG Awards 2025 recognize top cybersecurity leaders and CISOs for their pivotal roles in protecting enterprises against cyberattacks. Featuring expert speakers from diverse sectors, the event will offer valuable insights on threat intelligence, risk management, compliance, and cyber resilience strategies. Join over 100 global cybersecurity experts and explore cutting-edge solutions, AI-driven threat detection tools, and groundbreaking security technologies, empowering your organization to stay ahead of evolving cyber threats.

Learn more →

GISEC GLOBAL 2025

6–8 May 2025 | Dubai World Trade Centre, UAE

Attend the largest cybersecurity event in the Middle East & Africa, featuring over 750 cybersecurity brands and thousands of Infosec professionals tackling the latest cybersecurity challenges. Connect directly with global cybersecurity leaders, CISOs, industry experts, and top decision-makers from government, finance, healthcare, infrastructure, and defense sectors.

Learn more →

Cyber OSPAs 2025

8 May 2025 | 133 Houndsditch, London, UK

The Cyber OSPAs recognize outstanding companies, teams, individuals, products, and initiatives across the cybersecurity sector. These prestigious awards are independent, credible, and inclusive, celebrating exceptional performance based on extensive research and strict judging criteria. CyAN Vice President Kim Chandler McDonald proudly represents CyAN as a judge for the fourth consecutive year. Join cybersecurity leaders, innovators, and industry professionals for an evening of networking and celebration at the Big SASIG Conference Dinner.

Learn more →

World AI Technology Expo UAE 2025

14–15 May 2025 | Dubai, UAE

Engage with AI industry leaders and innovators at the largest global AI expo, featuring workshops, hackathons, seminars, and exceptional networking opportunities. Connect directly with over 1,500 corporate AI leaders from startups to Fortune 500 companies, exploring innovations and advancements shaping the future of AI.

Learn more →

GITEX EUROPE x Berlin 2025

21–23 May 2025 | Messe Berlin, Germany

Europe’s most global and collaborative tech event, bringing together industry leaders and policymakers to drive digital innovation forward. Connect with global tech innovators, explore strategic insights, and discover technologies accelerating Europe’s digital transformation.

Learn more →
Cyber (In)Securities – Issue 135

Cyber (In)Securities – Issue 135

Information Security News US Weakens Disinformation Defenses, as Russia & China Ramp Up Dark Reading by Robert LemosAs geopolitical tensions escalate, the US has notably reduced its efforts to combat disinformation, especially from key adversaries like Russia and China. This rollback occurs despite increasing efforts 

Cyber (In)Securities – Issue 134

Cyber (In)Securities – Issue 134

Information Security News Judge blocks Elon Musk’s Doge from accessing social security records The Guardian by Guardian Staff & AgenciesA federal judge has issued a restraining order preventing Elon Musk’s Department of Government Efficiency (Doge) from accessing Social Security Administration (SSA) records, citing privacy concerns 

Navigating Uncharted Waters: The EU’s Digital Markets Act and Its Impact on Security

Navigating Uncharted Waters: The EU’s Digital Markets Act and Its Impact on Security

The European Union’s Digital Markets Act (DMA) is setting the stage for significant changes in the tech landscape, particularly for companies like Apple, known for their tightly controlled ecosystems. While the DMA aims to enhance competition and consumer choice by opening up platforms like iOS to third-party app stores and facilitating app sideloading—where users can install apps from sources other than the official App Store—these changes introduce serious cybersecurity concerns. In this article, I delve deep into the potential risks associated with malware distribution and the challenges to maintaining end-to-end encryption integrity.

The Risks of Opening iOS

Under the DMA, Apple will need to allow third-party app stores and the sideloading of apps—practices previously prohibited under its stringent security model. This move fundamentally alters the security dynamics of iOS devices, historically insulated from many cyber threats by Apple’s rigorous app vetting process.

With third-party app stores, the gatekeeping role diminishes, potentially making room for malicious actors to exploit newfound vulnerabilities. The primary concern here is malware, which could be more easily distributed through less-regulated app stores or deceptive sideloading scenarios. Such changes could see iOS users facing threats similar to those on more open platforms, where malware infections are significantly more common.

End-to-End Encryption at Risk

Another critical concern is the DMA’s requirement for messaging service interoperability, which could compromise the secure, End-to-End Encrypted (E2EE) communication channels platforms like iMessage currently offer. The mandate to allow cross-platform messaging challenges the very foundation of E2EE, potentially requiring decryption and re-encryption processes that could introduce vulnerabilities. This not only jeopardises user privacy but also exposes them to risks of interception and data breaches. Ensuring that messages remain secure across different messaging platforms, without introducing backdoors or weaknesses, is a formidable technical challenge that has yet to be fully addressed.

Apple’s Countermeasures and Their Limitations

In response to these risks, Apple plans to implement several security measures, such as notarising apps distributed outside the App Store and requiring developers to register with Apple to run third-party app stores. However, these measures may not fully replicate the security levels currently provided by the App Store’s ecosystem.

The notarisation process, while helpful, might not catch all forms of malware, especially sophisticated ones designed to bypass such checks. Additionally, the effectiveness of these countermeasures depends significantly on my awareness and the vigilance of third-party store operators.

The Broader Implications for Users and Businesses

The opening of Apple’s ecosystem under the DMA guidelines presents a dual-edged sword: it promotes competition and innovation but also significantly raises the stakes for digital security.

What does this mean for Apple customers? Without doubt, we will need to be more discerning about where we download our apps from, potentially adjusting to a new reality where app source verification becomes a routine necessity. For businesses, particularly small app developers, the changes could provide an opportunity to reach consumers directly but also require them to invest more heavily in security measures to protect their apps and maintain user trust.

Conclusion

As the DMA begins to reshape the digital market, our attention must sharpen around the security implications for end-users. The trade-offs between increased competition and potential security lapses are not trivial—especially in an era where data breaches and cybersecurity threats are increasingly sophisticated. Ensuring that consumer protection remains a priority is essential as we navigate this new regulatory environment.

I invite you to share your views and concerns in the comments below as we consider the future of digital security and privacy in a post-DMA world.


About the Author:

Kim Chandler McDonald is the Co-Founder and CEO of 3 Steps Data, driving data/digital governance solutions.
She is the Global VP of CyAN, an award-winning author, storyteller, and advocate for cybersecurity, digital sovereignty, compliance, governance, and end-user empowerment.

Securing the Future: Innovative Cybersecurity for Agentic AI by Shantanu Bhattacharya

Agentic AI is when autonomous AI agents make decisions and execute tasks. It’s poised to revolutionize industries. But with this power comes new cybersecurity challenges. This blog explores the deployment architectures of agentic AI solutions and identifies key attack vectors, offering a glimpse into innovative