Tag: cybernews
Cyber (In)Securities – Issue 143
News
-
Cybersecurity CEO accused of running malware on hospital PC blabs about it on LinkedIn
The Register – Brandon Vigliarolo -
Cybersecurity experts issue response to Trump order targeting Chris Krebs, SentinelOne
Cyberscoop – Greg Otto -
Marks & Spencer breach linked to Scattered Spider ransomware attack
BleepingComputer – Lawrence Abrams -
House passes bill to study routers’ national security risks
Cyberscoop – Matt Braken -
Hitachi Vantara takes servers offline after Akira ransomware attack
BleepingComputer – Sergiu Gatlan -
Over 1,200 SAP NetWeaver servers vulnerable to actively exploited flaw
BleepingComputer – Bill Toulas -
Cybersecurity vendors are themselves under attack by hackers, SentinelOne says
Cyberscoop – Tim Starks -
VeriSource now says February data breach impacts 4 million people
BleepingComputer – Bill Toulas -
DragonForce expands ransomware model with white-label branding scheme
BleepingComputer – Ionut Ilascu -
WooCommerce admins targeted by fake security patches that hijack sites
BleepingComputer – Bill Toulas -
Amid CVE funding fumble, ‘we were mushrooms, kept in the dark,’ says board member
The Register – Jessica Lyons -
More Ivanti attacks may be on horizon, say experts who are seeing 9x surge in endpoint scans
The Register – Connor Jones -
Mobile provider MTN says cyberattack compromised customer data
BleepingComputer – Bill Toulas -
Vehicles Face 45% More Attacks, 4 Times More Hackers
Dark Reading – Nate Nelson -
Gig-Work Platforms at Risk for Data Breaches, Fraud, Account Takeovers
Dark Reading – Tatiana Walk-Morris -
All Major Gen-AI Models Vulnerable to ‘Policy Puppetry’ Prompt Injection Attack
SecurityWeek – Ionut Arghire -
Researchers Identify Rack::Static Vulnerability Enabling Data Breaches in Ruby Servers
The Hacker News – Ravie Lakshmanan -
Anthropic finds alarming ’emerging trends’ in Claude misuse report
ZDNet – Radhika Rajkumar -
Darcula adds AI to its DIY phishing kits to help would-be vampires bleed victims dry
The Register – Jessica Lyons -
‘SessionShark’ ToolKit Evades Microsoft Office 365 MFA
Dark Reading – Kristina Beek -
Assassin’s Creed maker faces GDPR complaint for forcing single-player gamers online
The Register – Brandon Vigliarolo -
Interlock ransomware claims DaVita attack, leaks stolen data
BleepingComputer – Bill Toulas -
Verizon DBIR Flags Major Patch Delays on VPNs, Edge Appliances
SecurityWeek – Ryan Naraine -
‘Warning sign’: Espionage driving APAC cyber surge
InnovationAus – Trish Everingham
Analysis
-
The Trouble with AI in Cybersecurity – Part 5: Ethics on Autopilot
PrivID (Substack) -
Mobile Applications: A Cesspool of Security Issues
Dark Reading – Robert Lemos -
M-Trends 2025: State-Sponsored IT Workers Emerge as Global Threat
Dark Reading – Kevin Townsend -
Inside the Verizon 2025 DBIR: Five Trends That Signal a Shift in the Cyber Threat Economy
SecurityWeek – Danelle Au -
Why NHIs Are Security’s Most Dangerous Blind Spot
The Hacker News -
Navigating Regulatory Shifts & AI Risks
Dark Reading – Arnaud Treps
CyAN Members: News
-
Comment instaurer une relation de confiance entre le DPO et le Hacker Éthique ?
Cybersecurity Advisors Network -
CyAN Global Vice President Kim Chandler McDonald judges Australian Space Awards
Space Connect -
Michael do Rozario Named Finalist for Lawyers Weekly Partner of the Year Awards 2025
Lawyers Weekly
🗓️ Upcoming CyAN (and CyAN Partner) Global Events:
🎉 Celebration
CyAN 10th Anniversary
(Details TBA)
🌐 Online
CyAN Q2 Call (APAC + Gulf)
June 11 – 12:00 GST / 16:00 SGT / 18:00 AEST
🌐 Online
CyAN Q2 Call (EMEA + Americas)
June 11 – 20:00 GST / 18:00 CET / 17:00 UTC / 12:00 EDT
Cyber (In)Securities – Issue 139
Information Security News Autonomous, GenAI-Driven Attacker Platform Enters the ChatDark Reading – Elizabeth Montalbano EncryptHub’s dual life: Cybercriminal vs Windows bug-bounty researcherBleepingComputer – Bill Toulas Voluntary ‘Pall Mall Process’ seeks to curb spyware abusesCyberscoop – Tim Starks That massive GitHub supply chain attack? It all …
Cyber (In)Securities – Issue 136
Information Security News Italian government approved use of spyware on members of refugee NGO, MPs told The Guardian by Angela Giuffrida & Stephanie KirchgaessnerItalian lawmakers have been informed that spyware was authorised against members of a refugee NGO, sparking fierce backlash over potential human rights …
Cyber (In)Securities – Issue 135

Information Security News
US Weakens Disinformation Defenses, as Russia & China Ramp Up
Dark Reading by Robert Lemos
As geopolitical tensions escalate, the US has notably reduced its efforts to combat disinformation, especially from key adversaries like Russia and China. This rollback occurs despite increasing efforts by these nations to spread misinformation aimed at influencing global politics and US public opinion. Security analysts express concerns that diminishing these critical defences could significantly heighten vulnerabilities to foreign interference, potentially impacting election security and undermining public trust in democratic processes. The implications of these changes are profound, prompting debates on the balance between freedom and security in the digital age.
Read more
China-Nexus APT ‘Weaver Ant’ Caught in Yearslong Web Shell Attack
Dark Reading by Alexander Culafi
Security researchers have uncovered a sophisticated cyber-espionage campaign by the China-nexus advanced persistent threat (APT) group known as ‘Weaver Ant.’ The group has been deploying web shells across multiple victim networks globally for several years, exploiting vulnerabilities to gain persistent access and exfiltrate sensitive data. This prolonged infiltration highlights significant weaknesses in current cybersecurity defences and underscores the challenges of detecting and mitigating APT activities. The campaign’s complexity and stealth demonstrate the evolving sophistication of state-sponsored cyber actors and the continuous arms race in global cybersecurity.
Read more
Police arrests 300 suspects linked to African cybercrime rings
BleepingComputer by Sergiu Gatlan
In a significant crackdown on cybercrime, police forces across multiple countries have arrested over 300 individuals connected to extensive African cybercrime syndicates. These groups have been involved in various fraudulent schemes, including phishing, romance scams, and advanced fee fraud, causing substantial financial losses worldwide. This coordinated operation showcases the growing international collaboration in combating cyber threats and highlights the increasing sophistication of cybercriminal networks in Africa. The arrests not only disrupt ongoing operations but also serve as a deterrent to the wider cybercriminal community, emphasising the global reach and consequences of law enforcement against online crime.
Read more
NIST Still Struggling to Clear Vulnerability Submissions Backlog in NVD
SecurityWeek by Ryan Naraine
The National Institute of Standards and Technology (NIST) is facing ongoing challenges in managing a significant backlog of vulnerability submissions in its National Vulnerability Database (NVD). This delay in processing and cataloguing vulnerabilities poses a risk to cybersecurity as unaddressed vulnerabilities remain exploitable for longer periods. The backlog has been attributed to a surge in reported vulnerabilities and resource constraints. This situation underscores the critical need for improved processes and additional resources to ensure timely updates to the NVD, which is essential for maintaining up-to-date security postures across industries.
Read more
Cloudflare now blocks all unencrypted traffic to its API endpoints
BleepingComputer by Bill Toulas
In a significant security enhancement, Cloudflare has announced that it will now block all unencrypted traffic to its API endpoints, mandating HTTPS for all connections. This move aims to bolster the security of data in transit, preventing interception and manipulation by malicious actors. By enforcing encrypted communications, Cloudflare enhances the overall security framework for its users and sets a higher standard for API security practices across the tech industry. This change reflects the growing emphasis on encryption as a fundamental aspect of cybersecurity in an increasingly interconnected digital landscape.
Read more
Trump’s Aggression Sours Europe on US Cloud Giants
Wired by Matt Burgess
Amidst escalating tensions over data sovereignty, European countries are increasingly wary of relying on U.S.-based cloud service providers. This shift in sentiment is largely driven by recent aggressive stances taken by the Trump administration, which have intensified concerns about data privacy and cross-border data flows. European regulators and businesses are now pushing for greater use of local cloud services to ensure data protection and compliance with stringent EU regulations. This growing distrust could reshape the global cloud services market, driving innovation and investment in European cloud infrastructure as an alternative to U.S. giants.
Read more
Critical Next.js Vulnerability Allows Attackers to Bypass Middleware Authorization Checks
The Hacker News by Ravi Lakshmanan
Developers and security teams are on high alert following the discovery of a critical vulnerability in Next.js, a popular web development framework. This security flaw allows attackers to bypass middleware authorisation checks, potentially enabling unauthorised access to sensitive data and functions. The vulnerability, identified as highly severe, affects multiple versions of the framework and poses a significant risk to applications built on Next.js. Immediate updates and patches have been released to address this issue, urging developers to upgrade their systems without delay to safeguard against potential exploits.
Read more
FBI Warns of Malicious Free Online Document Converters Spreading Malware
Security Affairs by Pierluigi Paganini
The FBI has issued a warning about the risks associated with free online document converters, which have become a vector for distributing malware. Cybercriminals are exploiting these platforms to embed malicious software into seemingly benign documents, leading to data theft, system compromise, and ransomware infections. Users are advised to exercise caution and verify the security of any online converter used. This advisory underscores the importance of cybersecurity awareness and the need for robust protective measures when using online tools. Read more
China says facial recognition should not be forced on individuals
itNews
In a surprising move, the Chinese government has issued guidelines suggesting that facial recognition technology should not be imposed on individuals without consent. This statement marks a significant shift in policy in a country known for its widespread use of surveillance technologies. The new guidelines aim to address growing public concerns about privacy and personal freedoms, reflecting a broader debate on the ethical use of technology in society. However, the implementation and enforcement of these guidelines remain to be seen, as they contrast with the extensive state surveillance practices currently in place.
Read more
AFP uses encryption powers to order technical assistance
InnovationAus by Justin Hendry
The Australian Federal Police (AFP) is leveraging new encryption laws to compel tech companies to provide technical assistance in criminal investigations. These powers enable the AFP to bypass encryption, facilitating access to data that could be crucial in solving cases. While intended to enhance law enforcement capabilities, this use of power raises significant privacy and security concerns among civil liberties groups and the tech community, who argue it could undermine the security of digital communications and infringe on individual rights.
Read more
Service NSW to enforce multifactor authentication by 2026
itNews by Eleanor Dickinson
In a proactive step towards enhancing digital security, Service NSW has announced that it will mandate multifactor authentication (MFA) for all its services by 2026. This initiative aims to strengthen protection against cyber threats and identity theft, requiring users to verify their identity through multiple verification methods before accessing services. The move reflects an increasing trend among government agencies to adopt stricter security measures to safeguard sensitive information and user data, aligning with global best practices in cybersecurity.
Read more
Prosecutors told to do more to strip ‘revenge porn’ abusers of victim images
The Observer by Shanti Das
In response to the growing issue of ‘revenge porn,’ prosecutors are being urged to take stronger actions to remove illicit images from circulation and penalise perpetrators more severely. This push for tougher enforcement comes amid reports of increasing incidents where private images are distributed without consent, causing significant distress to victims. Legal experts and advocacy groups emphasise the need for robust legal frameworks that not only prevent the initial sharing of such images but also swiftly remove them from all digital platforms. These efforts are part of a broader movement to protect individuals’ privacy and dignity in the digital age, ensuring that abusers face significant legal consequences for their actions.
Read more
U.S. Treasury Removed Sanctions Against the Crypto Mixer Service Tornado Cash
Security Affairs by Pierluigi Paganini
The U.S. Treasury has lifted sanctions on Tornado Cash, a prominent cryptocurrency mixer, reversing a previous decision that had broadly impacted the crypto community. This move comes after extensive discussions about the role of privacy in financial transactions and the legitimate uses of crypto mixing services. Tornado Cash was initially sanctioned due to concerns over money laundering and other illicit activities. The reversal highlights the complex balance regulators seek between preventing financial crimes and supporting technological and financial innovation. The decision has been met with relief in the cryptocurrency sector, which advocates for stronger privacy protections for legitimate users while acknowledging the need for oversight to prevent abuses.
Read more
Microsoft Trusted Signing service abused to code-sign malware
BleepingComputer by Lawrence Abrams
Cybersecurity researchers have uncovered a troubling misuse of Microsoft’s Trusted Signing service, where attackers have successfully code-signed malware, lending it an appearance of legitimacy. This abuse poses significant risks, as signed software is generally trusted by operating systems and security software. The incident reveals vulnerabilities in the digital signing process and raises questions about the reliability of security measures that depend heavily on certificates and signatures. Microsoft is investigating the issue and working on strengthening its verification processes to prevent similar breaches in the future.
Read more
Zero-Day Broker Operation Zero Offers Up to $4 Million for Telegram Exploits
Security Affairs by Pierluigi Paganini
Operation Zero, a prominent zero-day broker, has announced a bounty of up to $4 million for new exploits targeting the popular messaging app Telegram. This initiative reflects the high demand for vulnerabilities that can be used in cyber operations, emphasising the ongoing arms race in cybersecurity. The lucrative offer aims to attract skilled hackers and researchers to uncover previously unknown security flaws. Such bounties highlight the dual nature of the cybersecurity industry, where the discovery of vulnerabilities can either enhance security through patching or be exploited for malicious purposes, depending on who controls the information.
Read more
Coinbase was primary target of recent GitHub Actions breaches
BleepingComputer by Lawrence Abrams
In a recent security incident, Coinbase, a leading cryptocurrency exchange, was identified as the primary target of breaches involving GitHub Actions. Attackers exploited GitHub’s continuous integration and delivery service to execute unauthorised actions and potentially access sensitive data. The breach highlights the vulnerabilities associated with third-party platforms and the importance of securing software development pipelines. Coinbase has responded by enhancing their security measures and collaborating with GitHub to address these vulnerabilities, aiming to prevent similar incidents in the future and protect user assets.
Read more
What CISA’s Red Team Disarray Means for US Cyber Defense
Dark Reading by Becky Bracken
The Cybersecurity and Infrastructure Security Agency (CISA) is currently grappling with internal challenges related to its red team operations, which are essential for testing and improving US cyber defences. This disarray has raised concerns about the effectiveness of national cybersecurity strategies, especially at a time when threats are increasingly sophisticated. The red team’s role in simulating attacks to expose vulnerabilities is critical, and any disruption in their activities could significantly impact the nation’s ability to detect and respond to real cyber threats. The situation underscores the need for robust and well-coordinated cybersecurity practices to safeguard national interests.
Read more
Oracle denies breach after hacker claims theft of 6 million data records
BleepingComputer by Sergiu Gatlan
Oracle has publicly refuted claims of a data breach after a hacker alleged the theft of 6 million records from their systems. The hacker’s claims, circulated widely online, suggested a significant security lapse. However, Oracle’s investigation found no evidence supporting these claims, asserting that their security measures remained intact. This incident highlights the challenges companies face in managing cybersecurity threats and the impact of false breach claims on reputation and trust. It also underscores the importance of rigorous security protocols and timely, transparent communication in maintaining stakeholder confidence.
Read more
Nation-State ‘Paragon’ Spyware Infections Target Civil Society
Dark Reading by Nate Nelson
The sophisticated ‘Paragon’ spyware, linked to a nation-state actor, has been discovered targeting civil society organizations worldwide. This malware campaign is noted for its precision and stealth, designed to infiltrate systems and gather sensitive information without detection. The impact on civil society is profound, threatening the privacy and security of activists and non-governmental organizations engaged in sensitive or controversial work. The discovery of ‘Paragon’ underscores the growing trend of state-sponsored cyber espionage aimed at political manipulation and surveillance, raising serious concerns about digital security and human rights.
Read more
Medusa Ransomware Uses Malicious Driver to Disable Anti-Malware with Stolen Certificates
The Hacker News by Ravi Lakshmanan
The Medusa ransomware has evolved with a new tactic, using a malicious driver signed with stolen certificates to disable anti-malware software, enhancing its ability to infect systems undetected. This development represents a significant escalation in ransomware sophistication, as attackers now manipulate legitimate software validation mechanisms to bypass security. The use of stolen certificates complicates detection efforts, as it allows the malware to appear trustworthy to the system’s security protocols. This strategy underscores the necessity for enhanced vigilance and updated security measures to combat advanced ransomware threats.
Read more
Attack Update As FBI Warns Email And VPN Users—Activate 2FA Now
Forbes by Davey Winder
The FBI has issued a critical alert urging users of email services and VPNs to activate two-factor authentication (2FA) immediately. This warning comes in response to a surge in cyber attacks targeting these services, exploiting weak or reused passwords. By implementing 2FA, users can significantly enhance their security, creating an additional barrier against unauthorised access. This precaution is particularly crucial as cybercriminals increasingly deploy sophisticated techniques to bypass traditional security measures. The FBI’s advisory highlights the ongoing need for robust cybersecurity practices to protect personal and organisational data.
Read more
Trump order put states at the forefront of cyber and natural disaster response
Gov Exec by Chris Teale
A recent executive order by President Trump has shifted significant responsibility for responding to cyberattacks and natural disasters to state governments. This directive aims to enhance local readiness and response capabilities by empowering states with more autonomy and resources. However, it also challenges states to rapidly upscale their infrastructure and training programs to effectively manage these critical situations. The order reflects a strategic shift towards a more decentralised approach in managing emergencies, intending to foster quicker and more localised responses but also requiring significant coordination and support from federal agencies.
Read more
Groups Urge Congress to Extend Expiration Date for Cybersecurity Information Sharing Act
American Public Power Association by Paul Ciampoli
Advocacy groups are calling on Congress to extend the Cybersecurity Information Sharing Act’s expiration date, emphasising the importance of continued and enhanced public-private collaboration in cybersecurity efforts. The act facilitates the sharing of cybersecurity threat information between the government and private sector, playing a crucial role in pre-emptive threat detection and response. Supporters argue that extending the act is vital for maintaining a robust defence against increasingly sophisticated cyber threats, ensuring that both sectors can rapidly exchange information and coordinate responses effectively.
Read more
The Trump Administration Wants USAID on the Blockchain
Wired by Vittoria Elliott
The Trump administration has proposed integrating blockchain technology into the operations of USAID, the U.S. agency responsible for foreign aid. The initiative aims to increase transparency, reduce corruption, and improve accountability in aid distribution. By using blockchain’s decentralised ledger system, the administration hopes to track aid flows more accurately and ensure that funds reach their intended recipients. While the idea has garnered interest for its potential efficiency, critics warn of challenges including technical complexity, data privacy, and the risk of excluding communities with limited digital access.
Read more
ANALYSIS
Is the Middle East’s Race to Digitize a Threat to Infrastructure?
Dark Reading by Apu Pavithran
The Middle East’s rapid digitisation efforts are raising concerns about potential vulnerabilities in critical infrastructure. This technological push aims to boost economic growth and modernise various sectors, but it also exposes these systems to cyber threats. Experts warn that without robust cybersecurity measures, the region’s infrastructure could be at risk of cyberattacks that disrupt essential services. The article emphasises the need for comprehensive security strategies to safeguard these vital systems as they become increasingly interconnected and reliant on digital technologies.
Read more
The Quantum Apocalypse Is Coming. Be Very Afraid
Wired by Amit Catwalk
Imagine a world where today’s encryption crumbles in seconds—this is the looming threat posed by quantum computing. Often called the ‘quantum apocalypse,’ the scenario envisions a future where critical infrastructure, financial systems, and private communications are laid bare. The article explores how quantum advancements could dismantle current cryptographic defences, sparking urgent investment in quantum-resistant technologies. With adversaries already developing quantum capabilities, the race is on to secure digital systems before quantum breakthroughs force a global reckoning in cybersecurity.
Read more
Why Canada and the EU Must Support Ukraine—And Each Other
PrivID (Substack)
This analysis explores the geopolitical and cybersecurity implications of the ongoing conflict in Ukraine, arguing for stronger support from Canada and the European Union. The piece highlights how the conflict has not only regional but global cybersecurity ramifications, emphasising the need for collective action to counter threats and bolster security frameworks. The author argues that supporting Ukraine is pivotal not just for regional stability but also as a stand against cyber aggression that could set precedents affecting global norms and cybersecurity policies. The call for collaborative support from Canada and the EU reflects a broader strategy to enhance resilience against cyber threats and ensure a coordinated response to international security challenges.
Read more
Nowhere to Run: The Online Footprint of an Alleged Kinahan Cartel Associate
Bellingcat by Connor Plunkett, Peter Barth and Beau Donelly
Digital footprints don’t just expose everyday over-sharers—they’re now unravelling global crime networks. This investigation tracks the online activity of an alleged Kinahan cartel associate, revealing how open-source intelligence (OSINT) tools can map relationships, locations, and movements with remarkable precision. The piece highlights how social media and digital platforms, once seen as neutral ground, have become both tools of the trade for criminals and goldmines for law enforcement. As the boundaries between digital life and real-world crime blur, the role of OSINT in modern policing is becoming impossible to ignore.
Read more
The Human Factor: Redefining Cybersecurity In The Age Of AI
Forbes by Tony Bradley
As AI transforms cybersecurity, the human element is proving more essential—not less. While machine learning brings speed, scale, and automation to threat detection, it lacks the nuance, ethics, and context-driven reasoning that human judgment provides. This piece explores how people remain both a vulnerability and a vital line of defence, particularly in high-stakes decision-making. It calls for sustained investment in human capability—through training, adaptability, and oversight—to ensure AI augments rather than replaces skilled professionals. In an age of automation, resilient cyber defence still begins with people.
Read more
Strengthening Cybersecurity: Lessons from the Cybersecurity Survey
International Monetary Fund by Rangachary Ravikumar
What’s standing between nations and stronger cyber resilience? A recent IMF survey offers clues, revealing persistent gaps in protecting critical infrastructure and inconsistencies in how countries approach cybersecurity. The findings point to the urgent need for greater international cooperation, clearer standards, and the sharing of best practices. With threats growing in speed and scale, the piece argues that no single country can go it alone—collective defence is now essential. Investment in capacity-building, policy alignment, and cross-border collaboration will be key to staying ahead of an increasingly complex threat landscape.
Read more
CyAN Members: Op Eds, Articles, etc:
CVE, CVSS, and EPSS: Which One Actually Matters for Security?
Fel Gayanilo
When it comes to measuring risk, not all cybersecurity metrics are created equal. Fel breaks down the roles of CVE, CVSS, and EPSS, examining how each contributes to a security team’s understanding of vulnerabilities. While CVE identifies flaws and CVSS scores their severity, EPSS stands out for its predictive power—estimating the likelihood a vulnerability will actually be exploited. Fel’s analysis calls for a shift toward more dynamic, intelligence-led security strategies that prioritise risk by likelihood, not just theoretical impact—enabling teams to stay ahead of the curve, not just react to it. As threat actors move faster and exploit windows shrink, timing is everything. Metrics that help security teams prioritise what will be attacked—rather than what could be—are quickly becoming essential.
Read more
Cybersecurity in Singapore – BlackHat Asia 2025 Here We Go!
Nick Kelly
Few places are leaning into cybersecurity innovation quite like Singapore. With government support, a booming startup ecosystem, and growing international collaboration, the city-state is fast becoming a regional powerhouse. As momentum builds ahead of Black Hat Asia 2025, Nick reflects on Singapore’s strategic role in shaping cybersecurity conversations across the Asia-Pacific. From policy to practice, the event promises to showcase both local leadership and global expertise—reinforcing CyAN’s commitment to community, knowledge sharing, and advancing security on a global scale. The energy is palpable, and the opportunities for cross-border learning and partnership are vast. If Singapore is any indication, the future of cybersecurity will be as collaborative as it is cutting-edge.
Read more
CyAN Members: NEWS




- Breaking the Cycle: Combatting Online IBSA for a Safer Digital Experience
- Congratulations to CyAN member and CEO of White Hat IT Security, Sándor Fehér, for winning the Best CEO of the Year 2025 award from Behaviour – a HR-magazin in the small business category! Congratulate him on LinkedIn
- Celebrated CyAN member and winner of the 2024 European CyberWomen Trophy, Sarah Jane Mellor! Congratulate her on this LinkedIn post
- Congratulations to CyAN member and Founder of Vyanams Strategies (VYS), Vaishnavi J, and her team for their crucial support in developing the 5Rights Foundation’s ‘Children & AI Design Code’! Learn more on LinkedIn
- Congratulations to CyAN member Rupesh Shirke and his family on the arrival of their beautiful baby girl. Send your congratulations to Rupesh
Upcoming CyAN (and CyAN Partner) Global Events:
- Trust & Safety Forum at Forum INCYBER Europe (FIC), Lille, France: April 1–2 Read more
- Supply Chain Cyber Security Summit (SCCS), Lisbon, Portugal: April 9–11 Read more
- GITEX AFRICA, Marrakesh, Morocco: April 14–16 Read more
- GITEX ASIA, Singapore (Marina Bay Sands): April 23–25 Read more
- GISEC, Dubai World Trade Centre, UAE: May 6–8 Read more
- The Cyber Outstanding Security Performance Awards (Cyber OSPAs), London, UK: May 8 Read more
- CSG Awards 2025, Dubai: May 7 Read more
- World AI Technology Expo, Dubai, UAE: May 14–15 Read more
- CyAN 10th Anniversary Celebrations!
- GITEX Europe Messe, Berlin, Germany: May 21–23 Read more
- MaTeCC, Rabat, Morocco (The third annual North Africa cybersecurity event, hosted by CyAN partner École High-Tech): June 7–9, 2025 Read more
- CyAN Q2 Community Call (APAC and the Gulf): June 11, 12:00 GST / 16:00 SGT / 18:00 AEST
- CyAN Q2 Community Call (EMEA and the Americas): June 11, 20:00 GST / 18:00 CET / 17:00 UTC / 12:00 EDT
Cyber (In)Securities – Issue 134
Information Security News Judge blocks Elon Musk’s Doge from accessing social security records The Guardian by Guardian Staff & AgenciesA federal judge has issued a restraining order preventing Elon Musk’s Department of Government Efficiency (Doge) from accessing Social Security Administration (SSA) records, citing privacy concerns …
Cyber (In)Securities – Issue 133
Information Security News Microsoft: New RAT Malware Used for Crypto Theft, Reconnaissance BleepingComputer by Sergiu GatlanMicrosoft has identified a new form of RAT (Remote Access Trojan) malware that is being used for cryptocurrency theft and detailed reconnaissance of infected systems. This sophisticated malware targets digital …
Cyber (In)Securities – Issue 132
Information Security News
Elon Musk’s Starlink Could Be Used to Transmit Australian Election Voting Results
The Guardian by Josh Taylor
The Guardian reports that Elon Musk’s satellite internet service, Starlink, is being considered as a potential method to transmit voting results in Australian elections. This proposal aims to leverage Starlink’s extensive network to ensure reliable and secure communication of electoral data, especially in remote and rural areas where traditional internet services might not be as effective. The initiative highlights the growing influence of private satellite networks in critical public sectors and raises questions about the security implications of depending on commercial space infrastructure for national electoral processes.
Read more
Worried About DeepSeek? Turns Out, Gemini and Other US AIs Collect More User Data
ZDNet by Matene Toure
Recent analysis reveals that, contrary to popular concern, AI systems like Gemini are collecting more user data than DeepSeek. This comparative insight into U.S. AI technologies underscores the extensive data collection practices prevalent in the industry, often surpassing those of widely debated systems. The report highlights the need for greater transparency and regulatory scrutiny regarding how personal data is harvested and utilized by AI technologies. It calls for consumers and policymakers to reconsider the balance between technological advancement and privacy rights, emphasizing the importance of establishing clear data governance frameworks.
Read more
Car Exploit Allows You to Spy on Drivers in Real Time
Dark Reading by Nate Nelson
A newly discovered vulnerability in modern car technology allows for real-time spying on drivers, exposing a significant privacy risk. This exploit targets the communication systems embedded within vehicles, enabling unauthorized access to live audio and location tracking without the driver’s knowledge. The exposure of such a flaw highlights the increasing security concerns as automobiles become more connected and technologically sophisticated. Security experts are urging car manufacturers to enhance their cybersecurity measures and are advising drivers to be aware of the potential for such breaches and to seek updates and fixes that may mitigate these risks.
Read more
Inside Elon Musk’s ‘Digital Coup’
Wired by Makena Kelly, David Gilbert, Vittoria Elliott, Kate Knibbs, Dhruv Mehrotra, Dell Cameron, Tim Marksman, Leah Geiger & Zoe Schiffer
An in-depth investigation reveals how Elon Musk’s inner circle has gained extraordinary, seemingly unfettered access to vast amounts of sensitive U.S. citizen data, including social media, biometric, financial, and government-related records. Unlike officials who undergo stringent security vetting, these individuals—operating with no formal oversight—wield significant control over systems affecting national infrastructure, AI development, and online platforms. The report raises critical questions: Why do private actors with no public accountability have access to such vast datasets? And without transparency or regulation, who ensures this data isn’t misused? The findings underscore the urgent need for scrutiny and safeguards to prevent a small, unelected group from exerting unchecked influence over critical digital ecosystems.
Read more
Dems Ask Federal Agencies for Reassurance DOGE Isn’t Feeding Data into AI Willy-Nilly
The Register by Brandon Vigliarolo
US Democratic lawmakers are seeking reassurances from federal agencies regarding the use of DOGE, a data aggregation tool, amid concerns about its data handling practices and potential privacy implications. This inquiry stems from worries that DOGE could be indiscriminately funneling vast amounts of user data into AI systems without sufficient oversight or adherence to privacy standards. The request highlights the broader issues of data protection and transparency in government technology deployments, pressing for clear policies that ensure data is managed responsibly and ethically in line with citizens’ privacy rights.
Read more
ASIC Sues FIIG Securities for Cyber Security Failures
by itNews
The Australian Securities and Investments Commission (ASIC) has initiated legal action against FIIG Securities, accusing the firm of inadequate cybersecurity measures that failed to protect sensitive client data. This lawsuit marks a significant move by the regulatory body to enforce stricter cybersecurity compliance among financial institutions. ASIC’s action underscores the growing importance of robust cyber defences in the financial sector, highlighting the legal and reputational risks companies face when they neglect cybersecurity. The case serves as a stark reminder for businesses to prioritize the security of their digital infrastructures to safeguard against potential breaches and regulatory penalties.
Read more
GitHub Uncovers New ruby-saml Vulnerabilities Allowing Account Takeover Attacks
The Hacker News by Ravie Lakshmanan
GitHub has identified critical vulnerabilities in the ruby-saml authentication library, which could allow attackers to carry out account takeover attacks. These security flaws make it possible for cybercriminals to bypass authentication steps and gain unauthorized access to user accounts across various platforms that use this library. The discovery has prompted urgent calls for developers to update their applications with the latest patched version of ruby-saml to prevent potential exploits. This incident highlights the ongoing challenges in securing authentication mechanisms and the importance of maintaining up-to-date security practices in software development.
Read more
Microsoft Warns of Hospitality Sector Attacks Involving ClickFix
SecurityWeek by Eduard Kovacs
Microsoft has issued a warning about a series of targeted cyberattacks against the hospitality sector, involving a malicious software called ClickFix. The attacks are primarily focused on hotels, resorts, and other entities within the industry, exploiting vulnerabilities to steal sensitive information such as customer data and financial records. ClickFix is deployed through seemingly benign email attachments that, when opened, initiate a chain of malicious activities. Microsoft’s alert emphasizes the need for heightened cybersecurity measures in the hospitality industry, particularly in improving email security protocols and training staff to recognize potential cyber threats.
Read more
Apple to Appeal Against UK Government Data Demand at Secret High Court Hearing
The Guardian by Rachel Hall
Apple is set to challenge a UK government request for data in a secret high court hearing, marking a significant clash over privacy and government surveillance powers. The tech giant’s appeal stems from concerns about the implications of such data access for user privacy and the potential setting of a precedent that could affect global operations. This legal battle underscores the ongoing tension between technology companies and government agencies over access to digital information, highlighting the delicate balance between national security interests and individual privacy rights.
Read more
Legislative Push for Child Online Safety Runs Afoul of Encryption Advocates (Again)
Cyberscoop by Derek B. Johnson
A legislative effort aimed at enhancing online safety for children has once again clashed with encryption advocates. The proposed measures seek to implement stricter controls on digital platforms to protect minors, but they have raised concerns about potentially undermining end-to-end encryption. Encryption advocates argue that while protecting children is paramount, the security and privacy of all users must not be compromised. This ongoing debate highlights the tension between safeguarding vulnerable internet users and maintaining robust privacy protections, emphasizing the challenge of balancing these critical interests.
Read more
DeepSeek Can Be Gently Persuaded to Spit Out Malware Code
The Register by Connor Jones
The AI tool DeepSeek, known for its data processing capabilities, has been found vulnerable to manipulation that can result in the generation of malware code. Researchers demonstrated that with specific inputs, DeepSeek could be “gently persuaded” to produce harmful code, highlighting a significant security concern. This revelation puts a spotlight on the potential dangers of AI systems when exploited by malicious actors. It raises crucial questions about the ethical development and security hardening of AI technologies, urging developers to implement more robust safeguards against such vulnerabilities.
Read more
NIST Finalizes Differential Privacy Rules to Protect Data
Dark Reading by Arielle Waldman
The US National Institute of Standards and Technology (NIST) has finalized its guidelines on differential privacy, establishing a framework designed to enhance data protection. This move aims to provide organizations with a method to share useful information while ensuring that individual data remains private and secure. The new rules advocate for incorporating differential privacy techniques into data analytics processes, effectively minimizing the risk of personal data exposure. These standards represent a significant step forward in the struggle to balance data utility and privacy, urging companies to adopt these practices to safeguard sensitive information.
Read more
Meta Warns of FreeType Vulnerability (CVE-2025-27363) With Active Exploitation Risk
The Hacker News by Ravie Lakshmanan
Meta has issued a warning about a critical vulnerability in the FreeType font rendering library, identified as CVE-2025-27363, which is currently at risk of active exploitation. This vulnerability allows attackers to execute arbitrary code through specially crafted fonts. Given the widespread use of FreeType in various software applications, the potential impact is significant. Meta urges developers and system administrators to apply the available patches immediately to mitigate the risk and prevent potential breaches that could lead to substantial data loss and system compromise.
Read more
CISA: Medusa Ransomware Hit Over 300 Critical Infrastructure Orgs
BleepingComputer by Sergiu Gatlan
The US Cybersecurity and Infrastructure Security Agency (CISA) has reported that Medusa ransomware has compromised over 300 critical infrastructure organizations across various sectors. This widespread attack underscores the growing threat of ransomware to essential services and national security. CISA is urging affected organizations to take immediate action to mitigate the damage and prevent further breaches. The advisory also calls for increased vigilance and enhanced security measures among all organizations to protect against this highly disruptive form of malware, which continues to evolve and find new targets.
Read more
Cisco Patches 10 Vulnerabilities in IOS XR
SecurityWeek by Ionut Arghire
Cisco has released patches for ten vulnerabilities in its IOS XR software, which is widely used in carrier-grade routers and networking equipment. These vulnerabilities range from high to critical severity and could allow attackers to cause denial of service, execute arbitrary commands, or escalate privileges. The announcement stresses the importance for network administrators to apply these updates promptly to prevent potential cyber attacks that could disrupt network operations. Cisco’s proactive measures reflect its commitment to maintaining the security and integrity of its products amidst an increasingly complex threat landscape.
Read more
GITLAB Addressed Critical Auth Bypass Flaws in CE and EE
Security Affairs by Pierluigi Paganini
GitLab has successfully addressed critical authentication bypass flaws affecting both its Community Edition (CE) and Enterprise Edition (EE) platforms. These vulnerabilities posed significant security risks, potentially allowing unauthorized users to gain access to private repositories and sensitive data without proper credentials. The patches were issued swiftly following the discovery, underscoring GitLab’s commitment to user security and the prompt response needed to avert potential data breaches. Users of both editions are urged to update their systems immediately to ensure they are protected against these exploits.
Read more
Garantex Crypto Exchange Admin Arrested While on Vacation
BleepingComputer by Sergiu Gatlan
A recent legislative push aimed at enhancing online safety for children has once again sparked controversy among encryption advocates. The proposed measures, which call for increased monitoring and restrictions on digital platforms, are meeting resistance from those who argue that they could undermine end-to-end encryption and infringe on privacy rights. Advocates for digital privacy assert that while protecting children online is critical, it should not come at the expense of weakening encryption, which secures communications and protects users’ data from unauthorized access. This ongoing debate highlights the challenging balance between safeguarding vulnerable populations and preserving fundamental privacy protections.
Read more
That Weird CAPTCHA Could Be a Malware Trap – Here’s How to Protect Yourself
ZDNet by Lance Whitney
A recent report highlights a troubling trend where CAPTCHA tests, commonly used to verify user authenticity, are being manipulated to spread malware. Cybercriminals are crafting fake CAPTCHA screens that mimic those of legitimate websites to deceive users into downloading malicious software. This tactic not only compromises the security of the affected devices but also undermines trust in what has been a standard security measure on many online platforms. The article provides essential tips on how to identify and avoid these fraudulent CAPTCHA tests, emphasizing the importance of vigilance and updating security software regularly to protect against such sophisticated cyber threats.
Read more
Zoom Patches 4 High-Severity Vulnerabilities
SecurityWeek by Eduard Kovacs
Zoom has addressed four high-severity vulnerabilities that could have allowed attackers to compromise users’ devices and breach personal data. These security flaws were found in various components of the video conferencing software, which if exploited, could enable unauthorized remote code execution and data theft. The vulnerabilities highlight ongoing challenges in securing widely used communication tools. Zoom’s prompt release of patches reflects its commitment to user safety amidst increasing reliance on digital communication platforms. Users are strongly encouraged to update their software immediately to safeguard against potential cyber-attacks exploiting these issues.
Read more
Chinese Cyberspies Backdoor Juniper Routers for Stealthy Access
BleepingComputer by Bill Toulas
Chinese cyber espionage efforts have escalated with the discovery that state-sponsored hackers have installed backdoors in Juniper network routers. This strategic move allows for stealthy, long-term access to network traffic, enabling the interception and manipulation of data. The revelation underscores the sophistication and persistence of cyber threats posed by nation-state actors, particularly targeting critical infrastructure and corporate networks. The incident has prompted urgent calls for network administrators to conduct thorough security audits and apply necessary patches or countermeasures to mitigate the risk of such covert surveillance activities.
Read more
This is the FBI, Open Up. China’s Volt Typhoon is on Your Network
The Register by Jessica Lyons
The FBI has issued a warning about ‘Volt Typhoon,’ a sophisticated cyberattack campaign originating from China, targeting U.S. networks. This initiative involves a series of coordinated attacks designed to infiltrate critical infrastructure and exfiltrate sensitive information. The urgency of the FBI’s alert highlights the significant threat posed by these cyber incursions, which leverage advanced persistent threat (APT) tactics to gain long-term access to targeted systems. The warning serves as a critical reminder for organizations to bolster their cybersecurity defenses and remain vigilant against evolving threats from state-sponsored actors.
Read more
New North Korean Android Spyware Slips Onto Google Play
BleepingComputer by Bill Toulas
North Korean hackers have successfully infiltrated Google Play with sophisticated Android spyware, posing a significant threat to users’ data privacy. The spyware, disguised within seemingly legitimate applications, is capable of stealing a wide range of personal information, including contacts, messages, and device data. This incident highlights the ongoing challenges faced by app stores in preventing the distribution of malicious software and underscores the need for users to be vigilant about the apps they download. It also calls for enhanced security measures by digital platforms to detect and block such threats more effectively.
Read more
Trump Administration Halts Funding for Two Cybersecurity Efforts, Including One for Elections
SecurityWeek by Associated Press
The Trump administration has recently halted funding for two significant cybersecurity initiatives, including one specifically aimed at securing election systems. This decision has sparked concerns among cybersecurity experts and advocates about the potential vulnerabilities in critical infrastructure and the integrity of upcoming elections. The cessation of these funds raises questions about the commitment to combating cyber threats and maintaining robust security measures at a national level. Critics argue that this move could leave the United States more exposed to cyberattacks, particularly during sensitive electoral processes.
Read more
Over 400 IPs Exploiting Multiple SSRF Vulnerabilities in Coordinated Cyber Attack
The Hacker News by Ravie Lakshmanan
A coordinated cyber attack involving over 400 IP addresses has been exploiting multiple Server-Side Request Forgery (SSRF) vulnerabilities across various online platforms. This widespread assault highlights a growing trend where attackers manipulate web servers to send requests to internal resources, leading to data breaches and unauthorized access to sensitive information. The scale and sophistication of this attack underline the urgent need for organizations to enhance their web application security and closely monitor network activity. It also calls for the implementation of stricter security protocols to prevent such vulnerabilities from being exploited.
Read more
US Hasn’t Determined Who Was Behind Cyberattack That Caused Outage on Musk’s X
SecurityWeek by Associated Press
Officials have yet to determine who was behind the cyberattack that caused a widespread outage on X (formerly Twitter), raising concerns over the platform’s security and resilience. The disruption has fueled speculation about whether state-sponsored hackers or cybercriminal groups were responsible, particularly given the platform’s role in global communications. Experts warn that major online platforms remain attractive targets for large-scale disruptions, highlighting the need for stronger cyber defenses, rapid response mechanisms, and greater transparency when high-profile platforms face security incidents.
Read more
UK Must Pay Cyber Pros More Than Its Prime Minister, Top Civil Servant Says
The Register by Connor Jones
A top UK civil servant has advocated for paying cybersecurity professionals more than the Prime Minister to attract top talent needed for national security. This proposal highlights the critical demand for skilled cybersecurity personnel amid escalating global cyber threats. The call for competitive salaries aims to address the growing difficulty in recruiting and retaining cyber experts essential for protecting national infrastructure. The statement has sparked discussions about prioritizing investment in cybersecurity talent to strengthen the nation’s defenses against increasingly sophisticated cyberattacks.
Read more
Microsoft Patches 57 Vulnerabilities, Including 6 Zero-Days
Cyberscoop by Matt Kapko
Microsoft has released updates to patch 57 vulnerabilities, including six classified as zero-days, which were actively being exploited. This substantial update covers a broad range of issues across multiple Microsoft products, highlighting the company’s ongoing efforts to tighten security defenses against increasingly sophisticated cyber threats. The patched vulnerabilities include those that could allow attackers to execute arbitrary code, gain elevated privileges, and bypass security features. Users and organizations are urged to apply these updates immediately to protect their systems from potential exploits that could compromise data and operational security.
Read more
Apple Discloses Zero-Day Vulnerability, Releases Emergency Patches
Cyberscoop by Greg Otto
Apple has disclosed a critical zero-day vulnerability affecting several of its products and has swiftly released emergency patches to address the issue. This vulnerability, which was being actively exploited, could allow attackers to execute arbitrary code with kernel privileges, posing a severe security risk to users. The urgency of Apple’s response emphasizes the potential severity of the exploit and the necessity for users to update their devices immediately to protect against potential data breaches and system takeovers. This incident highlights the ongoing battle against cyber threats and the importance of timely software updates in maintaining device security.
Read more
‘Sloppy’ Cops Flout Tech Surveillance Laws
InnovationAus by Joseph Brookes
A recent report criticizes law enforcement agencies for their ‘sloppy’ adherence to technology surveillance laws, accusing them of flouting regulations designed to protect citizens’ privacy. The investigation highlights instances where police have improperly accessed and used surveillance tools, leading to significant concerns about oversight and accountability. This lax approach to legal compliance not only undermines public trust but also raises serious questions about the effectiveness of current regulatory frameworks in governing the use of advanced surveillance technologies by the police.
Read more
Allstate Insurance Sued for Delivering Personal Info on a Platter, in Plaintext, to Anyone Who Went Looking for It
The Register by Jessica Lyons
Allstate Insurance is facing a lawsuit after allegedly exposing customers’ personal information in plaintext, making it easily accessible to anyone who knew where to look. The lawsuit claims that highly sensitive data—including names, addresses, and policy details—was left unprotected, violating industry security standards and consumer privacy laws. Critics argue this represents a severe failure in basic cybersecurity hygiene, especially for an insurer handling vast amounts of private data. The case underscores the risks of poor data protection practices and raises questions about corporate accountability when personal information is left vulnerable to exploitation.
Read more
ANALYSIS
Strengthening the Human Firewall: Prioritizing Mental Health in Cybersecurity Teams
IT Security Guru by Jonathan Marnoch
Prioritizing mental health is crucial for enhancing the effectiveness and resilience of cybersecurity teams. Jonathan Marnoch emphasizes the need for supportive work environments that recognize the high-stress nature of cyber roles. He suggests implementing mental health strategies like regular wellness checks, mental health days, and accessible support services. These measures not only improve team well-being but also strengthen their ability to handle security threats. A comprehensive approach to mental health ensures that professionals remain equipped to uphold strong cybersecurity defenses.
Read more
US Must Prioritize Cybersecurity Training for the Military’s Engineers
Cyberscoop by Alison King, Annie Fixler, and Rear Adm. (Ret.) Mark Montgomery
Addressing the increasing cyber threats requires that the U.S. military prioritize cybersecurity training for its engineers. This article discusses how bolstering the cyber training regimen for military personnel is essential to protect national security interests. It emphasizes the need for a robust educational framework that can adapt to the evolving nature of cyber threats and equip engineers with the skills necessary to defend against sophisticated cyber attacks. Enhancing this training is not just about technical skills but also about understanding the strategic implications of cyber warfare.
Read more
The CISO as Business Resilience Architect
Dark Reading by Randolph Barr
The evolving role of Chief Information Security Officers (CISOs) now encompasses being architects of business resilience, extending beyond traditional cybersecurity boundaries. This shift reflects the increasing recognition of cyber risks as fundamental business risks. CISOs are tasked with designing and implementing strategies that not only protect information assets but also ensure business continuity in the face of cyber incidents. The role demands a deep understanding of business processes, risk management, and strategic planning, making CISOs pivotal in aligning security initiatives with broader business objectives.
Read more
Navigating AI-Powered Cyber Threats in 2025: 4 Expert Security Tips for Businesses
ZDNet by Dan Patterson
As businesses face an evolving landscape of AI-powered cyber threats in 2025, experts offer crucial security tips to stay protected. The focus is on proactive defense strategies, including the integration of advanced AI tools for threat detection and response. Experts emphasize the importance of continuous training for security teams to keep pace with AI developments. They also recommend regular system audits and updates to safeguard against sophisticated AI exploits. Strengthening collaboration across industry sectors is advised to share insights and best practices in combating these next-generation threats.
Read more
Pentesters: Is AI Coming for Your Role?
by The Hacker News
The rise of AI-driven security tools has sparked debate over the future of penetration testing and whether AI could replace human pentesters. While AI excels at automating vulnerability scanning and identifying common exploits, experts argue that human intuition, creativity, and contextual understanding remain irreplaceable. Pentesters bring critical thinking and adaptive problem-solving that AI lacks, making them essential in uncovering complex security flaws. Instead of replacing pentesters, AI is expected to enhance their capabilities, allowing security professionals to focus on more advanced, high-impact testing scenarios.
Read more
Cybersecurity Can’t Wait: Modern Enterprises Must Adapt
by TripWire
Modern enterprises must adopt a proactive cybersecurity strategy to stay ahead of evolving threats. This article stresses that reactive approaches are no longer sufficient as cyberattacks grow more sophisticated and frequent. Organizations are urged to implement continuous monitoring, real-time threat detection, and adaptive security frameworks to mitigate risks effectively. Investing in employee training, strong identity management, and AI-driven security tools is also highlighted as key to strengthening overall resilience. Businesses that fail to adapt risk severe financial, operational, and reputational damage in an increasingly hostile digital landscape.
Read more
2025 Annual State of the Industry Report Summary
by Cyber Security Tribe
Traditional security measures often fall short in detecting and preventing insider threats, which pose significant risks to organizations. This article explores how insiders—whether malicious or negligent—can bypass standard security controls, making detection more challenging than external attacks. It emphasizes the need for a more proactive approach, including behavioral analytics, real-time monitoring, and zero-trust frameworks to minimize insider risk. Organizations are encouraged to foster a culture of security awareness, implement strict access controls, and continuously review security policies to adapt to evolving threats from within.
Read more
Top Cybersecurity Concerns for 2025: Considerations for the C-Suite
Forbes by Anurag Lal
The latest industry report provides a comprehensive overview of the cybersecurity landscape heading into 2025, highlighting key trends, emerging threats, and strategic priorities for businesses. Findings indicate a surge in AI-driven attacks, increased regulatory scrutiny, and a growing emphasis on resilience over mere compliance. The report stresses the need for organizations to invest in adaptive security strategies, workforce upskilling, and robust incident response frameworks. As cyber risks become more complex, businesses must shift from reactive defense to proactive risk management to stay ahead of evolving threats.
Read more
CyAN Members: Op Eds, Articles, etc:
Cyber Kill Chain: Breaking Down the Steps
by CyAN Gen Sec Fel Gayanilo
Fel Gayanilo provides a detailed breakdown of the Cyber Kill Chain, outlining the key stages attackers follow to infiltrate systems and execute cyber threats. From reconnaissance and weaponization to exploitation, persistence, and data exfiltration, the piece explains how understanding these steps helps organizations move from reactive defenses to proactive security strategies and minimize risks before they escalate. Fel emphasizes that effective cybersecurity requires continuous threat intelligence, early detection, and rapid response strategies to stay ahead of attackers. He highlights the importance of monitoring attacker behaviours, identifying vulnerabilities early, and implementing adaptive security measures to disrupt threats before they cause significant damage. By understanding attacker methodologies, cybersecurity teams can anticipate evolving threats, strengthen defenses, and enhance overall cyber resilience in an increasingly hostile digital environment.
Read more
“What Happens to Heroes?” – Episode #1: The Unsung Heroes of the Digital World
by Didier Annet
Didier Annet shines a light on the often-overlooked individuals who keep the digital world safe—cybersecurity professionals, analysts, and data protection officers working behind the scenes to protect sensitive systems and information. This first episode in the series explores the challenges these experts face, from the relentless pace of cyber threats to the lack of recognition for their critical contributions. Annet reflects on the emotional and ethical weight carried by those responsible for safeguarding digital infrastructure, highlighting the toll of staying ahead of attackers in an ever-evolving threat landscape. He raises important questions about how these “unsung heroes” are supported, acknowledged, and motivated in an era of constant cyber conflict, emphasizing the need for greater appreciation, resources, and mental health support to sustain their efforts.
Read more
What Do Reality TV, OSINT, and French Celebrities on the Run Have in Common? Meet CyAN Member Sylvain Hajri!
Sylvain Hajri isn’t just a rockstar within the OSINT community; he’s also the founder of the search engine Epieos and the vibrant French community OSINT FR. Beyond developing tools that empower analysts worldwide, Sylvain brings his expertise to reality TV, where he tracks celebrities on the run. His recent podcast with OSINT producer Josh Axelrod delves into his early days in OSINT, the journey of building Epieos, the ethics of creating intelligence tools, and the hunter mindset essential for top-tier investigators. This captivating conversation showcases one of CyAN’s most innovative and intriguing members—don’t miss it!
Read more
Valued CyAN Member Rupesh Shirke Elevated to IEEE Senior Member
CyAN member Rupesh Shirke has been elevated to the grade of IEEE Senior Member, an honor bestowed only on those within the global engineering and technology community who have made significant contributions to their profession. This achievement reflects his dedication, expertise, and impact in advancing technology and cybersecurity. Congratulations, Rupesh—we’re immensely proud of you!
Bharat Raigangar Recognized as a Distinguished Jury Member for the CSG Awards 2025
Bharat Raigangar, a CyAN board member, has been recognized as a distinguished jury member for the CSG Awards 2025 at Enterprise IT World MEA! With his deep expertise in IT & Security, Bharat brings invaluable insights to honor excellence in cybersecurity. His leadership and commitment to elevating industry standards make him an outstanding choice for this role, and we look forward to seeing his contributions shape the awards.
Read more
CyAN thrives because of the incredible talent, leadership, and dedication of our members, and we are proud to see them shaping the future of cybersecurity on a global stage!

Upcoming CyAN (and CyAN Partner) Global Events:
- Trust & Safety Forum at Forum INCYBER Europe (FIC), Lille, France: April 1-2 Event Info
- CyAN Quarterly Online Members Meeting (CyAN Members Only): March 19, see emails for details
- GITEX AFRICA, Marrakesh, Morocco: April 14-16 Event Info
- GITEX ASIA, Singapore (Marina Bay Sands): April 23-25 Event Info
- GISEC, Dubai World Trade Center, UAE: May 6-8 Event Info
- The Cyber Outstanding Security Performance Awards (Cyber OSPAs), London, UK: May 8 Event Info
- World AI Technology Expo UAE, Dubai, UAE: May 14-15 Event Info
- MaTeCC, Rabat, Morocco: June 7-9 (The third annual North Africa and beyond cybersecurity event, hosted by CyAN partner organization École High-Tech.) Event Info
Cyber (In)Securities – Issue 131
Information Security News EU Looks to Tech Sovereignty with EuroStack Amid Trade War Biometric Update by Masha BorakThe European Union is making significant strides towards tech sovereignty with the development of EuroStack, a comprehensive technology initiative aimed at reducing dependence on foreign tech giants amid …