📄 Download Feature PDF Want to connect? Here is Inssata RICOURT’s professional profile. Feel free to say hello and show your support. 🔗 Connect on LinkedIn About the Author Saba Bagheri, PhD Cyber Threat Intelligence Manager at Bupa APAC Director at the Cybersecurity Advisors Network …
The Psychological Impacts of Cyberattacks This is the third episode of a story related to individuals who, in a matter of moments, transition from “employees” to “rescuers” in the immediate aftermath of a destructive cyberattack. What I will call the “Heroes” The hidden impact of …
Saba Bagheri, PhD
Cyber Threat Intelligence Manager at Bupa
APAC Director at the Cybersecurity Advisors Network (CyAN)
She is a highly credentialed professional holding CISM, CEH, and CRISC certifications, with deep expertise in ATT&CK®-aligned SOC operations and Cyber Threat Intelligence. Based in Sydney, New South Wales, Australia, Saba is a respected leader in the cybersecurity community, actively contributing to international threat intelligence collaboration.
Information Security News 1. Oracle Cloud security SNAFU latest: IT giant accused of pedantry as evidence scrubbedThe Register – Thomas ClaburnRead more 2. CoffeeLoader Malware Is Stacked With Viscous Evasion TricksDark Reading – Becky BrackenRead more 3. Phishing platform ‘Lucid’ behind wave of iOS, Android …
📄 Download Feature PDF Want to connect? Here is Daniela Fernandez’s professional profile. Feel free to say hello and show your support. 🔗 Connect on LinkedIn About the Author Saba Bagheri, PhD Cyber Threat Intelligence Manager at Bupa APAC Director at the Cybersecurity Advisors Network …
CyAN is proud to announce our role as a
Community Partner
for the following prominent global cybersecurity and technology events. Mark your calendars!
Supply Chain Cyber Security Summit (SCCS)
9–11 April 2025 | Lisbon, Portugal
CyAN board member Bharat Raigangar will be speaking at this critical cybersecurity event, focusing on securing supply chains and third-party partnerships. Learn practical strategies and insights through real-world case studies presented by Bharat and other leading cybersecurity experts.
7 May 2025 | Shangri-La, Sheikh Zayed Rd, Dubai, UAE
CyAN board member Bharat Raigangar is participating both as a distinguished jury member and speaker at this prestigious cybersecurity event. The CSG Awards 2025 recognize top cybersecurity leaders and CISOs for their pivotal roles in protecting enterprises against cyberattacks. Featuring expert speakers from diverse sectors, the event will offer valuable insights on threat intelligence, risk management, compliance, and cyber resilience strategies. Join over 100 global cybersecurity experts and explore cutting-edge solutions, AI-driven threat detection tools, and groundbreaking security technologies, empowering your organization to stay ahead of evolving cyber threats.
Attend the largest cybersecurity event in the Middle East & Africa, featuring over 750 cybersecurity brands and thousands of Infosec professionals tackling the latest cybersecurity challenges. Connect directly with global cybersecurity leaders, CISOs, industry experts, and top decision-makers from government, finance, healthcare, infrastructure, and defense sectors.
The Cyber OSPAs recognize outstanding companies, teams, individuals, products, and initiatives across the cybersecurity sector. These prestigious awards are independent, credible, and inclusive, celebrating exceptional performance based on extensive research and strict judging criteria. CyAN Vice President Kim Chandler McDonald proudly represents CyAN as a judge for the fourth consecutive year. Join cybersecurity leaders, innovators, and industry professionals for an evening of networking and celebration at the Big SASIG Conference Dinner.
Engage with AI industry leaders and innovators at the largest global AI expo, featuring workshops, hackathons, seminars, and exceptional networking opportunities. Connect directly with over 1,500 corporate AI leaders from startups to Fortune 500 companies, exploring innovations and advancements shaping the future of AI.
Europe’s most global and collaborative tech event, bringing together industry leaders and policymakers to drive digital innovation forward. Connect with global tech innovators, explore strategic insights, and discover technologies accelerating Europe’s digital transformation.
Information Security News US Weakens Disinformation Defenses, as Russia & China Ramp Up Dark Reading by Robert LemosAs geopolitical tensions escalate, the US has notably reduced its efforts to combat disinformation, especially from key adversaries like Russia and China. This rollback occurs despite increasing efforts …
Information Security News Judge blocks Elon Musk’s Doge from accessing social security records The Guardian by Guardian Staff & AgenciesA federal judge has issued a restraining order preventing Elon Musk’s Department of Government Efficiency (Doge) from accessing Social Security Administration (SSA) records, citing privacy concerns …
The European Union’s Digital Markets Act (DMA) is setting the stage for significant changes in the tech landscape, particularly for companies like Apple, known for their tightly controlled ecosystems. While the DMA aims to enhance competition and consumer choice by opening up platforms like iOS to third-party app stores and facilitating app sideloading—where users can install apps from sources other than the official App Store—these changes introduce serious cybersecurity concerns. In this article, I delve deep into the potential risks associated with malware distribution and the challenges to maintaining end-to-end encryption integrity.
The Risks of Opening iOS
Under the DMA, Apple will need to allow third-party app stores and the sideloading of apps—practices previously prohibited under its stringent security model. This move fundamentally alters the security dynamics of iOS devices, historically insulated from many cyber threats by Apple’s rigorous app vetting process.
With third-party app stores, the gatekeeping role diminishes, potentially making room for malicious actors to exploit newfound vulnerabilities. The primary concern here is malware, which could be more easily distributed through less-regulated app stores or deceptive sideloading scenarios. Such changes could see iOS users facing threats similar to those on more open platforms, where malware infections are significantly more common.
End-to-End Encryption at Risk
Another critical concern is the DMA’s requirement for messaging service interoperability, which could compromise the secure, End-to-End Encrypted (E2EE) communication channels platforms like iMessage currently offer. The mandate to allow cross-platform messaging challenges the very foundation of E2EE, potentially requiring decryption and re-encryption processes that could introduce vulnerabilities. This not only jeopardises user privacy but also exposes them to risks of interception and data breaches. Ensuring that messages remain secure across different messaging platforms, without introducing backdoors or weaknesses, is a formidable technical challenge that has yet to be fully addressed.
Apple’s Countermeasures and Their Limitations
In response to these risks, Apple plans to implement several security measures, such as notarising apps distributed outside the App Store and requiring developers to register with Apple to run third-party app stores. However, these measures may not fully replicate the security levels currently provided by the App Store’s ecosystem.
The notarisation process, while helpful, might not catch all forms of malware, especially sophisticated ones designed to bypass such checks. Additionally, the effectiveness of these countermeasures depends significantly on my awareness and the vigilance of third-party store operators.
The Broader Implications for Users and Businesses
The opening of Apple’s ecosystem under the DMA guidelines presents a dual-edged sword: it promotes competition and innovation but also significantly raises the stakes for digital security.
What does this mean for Apple customers? Without doubt, we will need to be more discerning about where we download our apps from, potentially adjusting to a new reality where app source verification becomes a routine necessity. For businesses, particularly small app developers, the changes could provide an opportunity to reach consumers directly but also require them to invest more heavily in security measures to protect their apps and maintain user trust.
Conclusion
As the DMA begins to reshape the digital market, our attention must sharpen around the security implications for end-users. The trade-offs between increased competition and potential security lapses are not trivial—especially in an era where data breaches and cybersecurity threats are increasingly sophisticated. Ensuring that consumer protection remains a priority is essential as we navigate this new regulatory environment.
I invite you to share your views and concerns in the comments below as we consider the future of digital security and privacy in a post-DMA world.
About the Author:
Kim Chandler McDonald is the Co-Founder and CEO of 3 Steps Data, driving data/digital governance solutions.
She is the Global VP of CyAN, an award-winning author, storyteller, and advocate for cybersecurity, digital sovereignty, compliance, governance, and end-user empowerment.
Agentic AI is when autonomous AI agents make decisions and execute tasks. It’s poised to revolutionize industries. But with this power comes new cybersecurity challenges. This blog explores the deployment architectures of agentic AI solutions and identifies key attack vectors, offering a glimpse into innovative …