Tag: cybernews

Cyber (In)Securities – Issue 151 – Snapshot Edition

Cyber (In)Securities – Issue 151 – Snapshot Edition

You can download this edition using the download icon at the bottom. To enlarge the view, click the fullscreen icon on the bottom right. All article titles inside the flipbook are clickable links.

Cyber (In)Securities – Issue 143

Cyber (In)Securities – Issue 143


News

  1. Cybersecurity CEO accused of running malware on hospital PC blabs about it on LinkedIn
    The Register – Brandon Vigliarolo
  2. Cybersecurity experts issue response to Trump order targeting Chris Krebs, SentinelOne
    Cyberscoop – Greg Otto
  3. Marks & Spencer breach linked to Scattered Spider ransomware attack
    BleepingComputer – Lawrence Abrams
  4. House passes bill to study routers’ national security risks
    Cyberscoop – Matt Braken
  5. Hitachi Vantara takes servers offline after Akira ransomware attack
    BleepingComputer – Sergiu Gatlan
  6. Over 1,200 SAP NetWeaver servers vulnerable to actively exploited flaw
    BleepingComputer – Bill Toulas
  7. Cybersecurity vendors are themselves under attack by hackers, SentinelOne says
    Cyberscoop – Tim Starks
  8. VeriSource now says February data breach impacts 4 million people
    BleepingComputer – Bill Toulas
  9. DragonForce expands ransomware model with white-label branding scheme
    BleepingComputer – Ionut Ilascu
  10. WooCommerce admins targeted by fake security patches that hijack sites
    BleepingComputer – Bill Toulas
  11. Amid CVE funding fumble, ‘we were mushrooms, kept in the dark,’ says board member
    The Register – Jessica Lyons
  12. More Ivanti attacks may be on horizon, say experts who are seeing 9x surge in endpoint scans
    The Register – Connor Jones
  13. Mobile provider MTN says cyberattack compromised customer data
    BleepingComputer – Bill Toulas
  14. Vehicles Face 45% More Attacks, 4 Times More Hackers
    Dark Reading – Nate Nelson
  15. Gig-Work Platforms at Risk for Data Breaches, Fraud, Account Takeovers
    Dark Reading – Tatiana Walk-Morris
  16. All Major Gen-AI Models Vulnerable to ‘Policy Puppetry’ Prompt Injection Attack
    SecurityWeek – Ionut Arghire
  17. Researchers Identify Rack::Static Vulnerability Enabling Data Breaches in Ruby Servers
    The Hacker News – Ravie Lakshmanan
  18. Anthropic finds alarming ’emerging trends’ in Claude misuse report
    ZDNet – Radhika Rajkumar
  19. Darcula adds AI to its DIY phishing kits to help would-be vampires bleed victims dry
    The Register – Jessica Lyons
  20. ‘SessionShark’ ToolKit Evades Microsoft Office 365 MFA
    Dark Reading – Kristina Beek
  21. Assassin’s Creed maker faces GDPR complaint for forcing single-player gamers online
    The Register – Brandon Vigliarolo
  22. Interlock ransomware claims DaVita attack, leaks stolen data
    BleepingComputer – Bill Toulas
  23. Verizon DBIR Flags Major Patch Delays on VPNs, Edge Appliances
    SecurityWeek – Ryan Naraine
  24. ‘Warning sign’: Espionage driving APAC cyber surge
    InnovationAus – Trish Everingham

Analysis

  1. The Trouble with AI in Cybersecurity – Part 5: Ethics on Autopilot
    PrivID (Substack)
  2. Mobile Applications: A Cesspool of Security Issues
    Dark Reading – Robert Lemos
  3. M-Trends 2025: State-Sponsored IT Workers Emerge as Global Threat
    Dark Reading – Kevin Townsend
  4. Inside the Verizon 2025 DBIR: Five Trends That Signal a Shift in the Cyber Threat Economy
    SecurityWeek – Danelle Au
  5. Why NHIs Are Security’s Most Dangerous Blind Spot
    The Hacker News
  6. Navigating Regulatory Shifts & AI Risks
    Dark Reading – Arnaud Treps

CyAN Members: News

  1. Comment instaurer une relation de confiance entre le DPO et le Hacker Éthique ?
    Cybersecurity Advisors Network
  2. CyAN Global Vice President Kim Chandler McDonald judges Australian Space Awards
    Space Connect
  3. Michael do Rozario Named Finalist for Lawyers Weekly Partner of the Year Awards 2025
    Lawyers Weekly

🗓️ Upcoming CyAN (and CyAN Partner) Global Events:

GISEC Logo

📍 Dubai, UAE

GISEC
May 6–8

Read more
Cyber OSPAs Logo

📍 London, UK

Cyber OSPAs
May 8

Read more
CSG Awards Logo

📍 Dubai, UAE

CSG Awards 2025
May 7

Read more
World AI Expo Logo

📍 Dubai, UAE

World AI Technology Expo
May 14–15

Read more

🎉 Celebration

CyAN 10th Anniversary
(Details TBA)

GITEX Europe Logo

📍 Berlin, Germany

GITEX Europe Messe
May 21–23

Read more
MaTeCC Logo

📍 Rabat, Morocco

MaTeCC
June 7–9

Read more

🌐 Online

CyAN Q2 Call (APAC + Gulf)
June 11 – 12:00 GST / 16:00 SGT / 18:00 AEST

🌐 Online

CyAN Q2 Call (EMEA + Americas)
June 11 – 20:00 GST / 18:00 CET / 17:00 UTC / 12:00 EDT

Cyber (In)Securities – Issue 139

Cyber (In)Securities – Issue 139

Information Security News Autonomous, GenAI-Driven Attacker Platform Enters the ChatDark Reading – Elizabeth Montalbano EncryptHub’s dual life: Cybercriminal vs Windows bug-bounty researcherBleepingComputer – Bill Toulas Voluntary ‘Pall Mall Process’ seeks to curb spyware abusesCyberscoop – Tim Starks That massive GitHub supply chain attack? It all 

Cyber (In)Securities – Issue 136

Cyber (In)Securities – Issue 136

Information Security News Italian government approved use of spyware on members of refugee NGO, MPs told The Guardian by Angela Giuffrida & Stephanie KirchgaessnerItalian lawmakers have been informed that spyware was authorised against members of a refugee NGO, sparking fierce backlash over potential human rights 

Cyber (In)Securities – Issue 135

Cyber (In)Securities – Issue 135

Information Security News

US Weakens Disinformation Defenses, as Russia & China Ramp Up

Dark Reading by Robert Lemos
As geopolitical tensions escalate, the US has notably reduced its efforts to combat disinformation, especially from key adversaries like Russia and China. This rollback occurs despite increasing efforts by these nations to spread misinformation aimed at influencing global politics and US public opinion. Security analysts express concerns that diminishing these critical defences could significantly heighten vulnerabilities to foreign interference, potentially impacting election security and undermining public trust in democratic processes. The implications of these changes are profound, prompting debates on the balance between freedom and security in the digital age.
Read more

China-Nexus APT ‘Weaver Ant’ Caught in Yearslong Web Shell Attack

Dark Reading by Alexander Culafi
Security researchers have uncovered a sophisticated cyber-espionage campaign by the China-nexus advanced persistent threat (APT) group known as ‘Weaver Ant.’ The group has been deploying web shells across multiple victim networks globally for several years, exploiting vulnerabilities to gain persistent access and exfiltrate sensitive data. This prolonged infiltration highlights significant weaknesses in current cybersecurity defences and underscores the challenges of detecting and mitigating APT activities. The campaign’s complexity and stealth demonstrate the evolving sophistication of state-sponsored cyber actors and the continuous arms race in global cybersecurity.
Read more

Police arrests 300 suspects linked to African cybercrime rings

BleepingComputer by Sergiu Gatlan
In a significant crackdown on cybercrime, police forces across multiple countries have arrested over 300 individuals connected to extensive African cybercrime syndicates. These groups have been involved in various fraudulent schemes, including phishing, romance scams, and advanced fee fraud, causing substantial financial losses worldwide. This coordinated operation showcases the growing international collaboration in combating cyber threats and highlights the increasing sophistication of cybercriminal networks in Africa. The arrests not only disrupt ongoing operations but also serve as a deterrent to the wider cybercriminal community, emphasising the global reach and consequences of law enforcement against online crime.
Read more

NIST Still Struggling to Clear Vulnerability Submissions Backlog in NVD

SecurityWeek by Ryan Naraine
The National Institute of Standards and Technology (NIST) is facing ongoing challenges in managing a significant backlog of vulnerability submissions in its National Vulnerability Database (NVD). This delay in processing and cataloguing vulnerabilities poses a risk to cybersecurity as unaddressed vulnerabilities remain exploitable for longer periods. The backlog has been attributed to a surge in reported vulnerabilities and resource constraints. This situation underscores the critical need for improved processes and additional resources to ensure timely updates to the NVD, which is essential for maintaining up-to-date security postures across industries.
Read more

Cloudflare now blocks all unencrypted traffic to its API endpoints

BleepingComputer by Bill Toulas
In a significant security enhancement, Cloudflare has announced that it will now block all unencrypted traffic to its API endpoints, mandating HTTPS for all connections. This move aims to bolster the security of data in transit, preventing interception and manipulation by malicious actors. By enforcing encrypted communications, Cloudflare enhances the overall security framework for its users and sets a higher standard for API security practices across the tech industry. This change reflects the growing emphasis on encryption as a fundamental aspect of cybersecurity in an increasingly interconnected digital landscape.
Read more

Trump’s Aggression Sours Europe on US Cloud Giants

Wired by Matt Burgess
Amidst escalating tensions over data sovereignty, European countries are increasingly wary of relying on U.S.-based cloud service providers. This shift in sentiment is largely driven by recent aggressive stances taken by the Trump administration, which have intensified concerns about data privacy and cross-border data flows. European regulators and businesses are now pushing for greater use of local cloud services to ensure data protection and compliance with stringent EU regulations. This growing distrust could reshape the global cloud services market, driving innovation and investment in European cloud infrastructure as an alternative to U.S. giants.
Read more

Critical Next.js Vulnerability Allows Attackers to Bypass Middleware Authorization Checks

The Hacker News by Ravi Lakshmanan
Developers and security teams are on high alert following the discovery of a critical vulnerability in Next.js, a popular web development framework. This security flaw allows attackers to bypass middleware authorisation checks, potentially enabling unauthorised access to sensitive data and functions. The vulnerability, identified as highly severe, affects multiple versions of the framework and poses a significant risk to applications built on Next.js. Immediate updates and patches have been released to address this issue, urging developers to upgrade their systems without delay to safeguard against potential exploits.
Read more

FBI Warns of Malicious Free Online Document Converters Spreading Malware

Security Affairs by Pierluigi Paganini
The FBI has issued a warning about the risks associated with free online document converters, which have become a vector for distributing malware. Cybercriminals are exploiting these platforms to embed malicious software into seemingly benign documents, leading to data theft, system compromise, and ransomware infections. Users are advised to exercise caution and verify the security of any online converter used. This advisory underscores the importance of cybersecurity awareness and the need for robust protective measures when using online tools. Read more

China says facial recognition should not be forced on individuals

itNews
In a surprising move, the Chinese government has issued guidelines suggesting that facial recognition technology should not be imposed on individuals without consent. This statement marks a significant shift in policy in a country known for its widespread use of surveillance technologies. The new guidelines aim to address growing public concerns about privacy and personal freedoms, reflecting a broader debate on the ethical use of technology in society. However, the implementation and enforcement of these guidelines remain to be seen, as they contrast with the extensive state surveillance practices currently in place.
Read more

AFP uses encryption powers to order technical assistance

InnovationAus by Justin Hendry
The Australian Federal Police (AFP) is leveraging new encryption laws to compel tech companies to provide technical assistance in criminal investigations. These powers enable the AFP to bypass encryption, facilitating access to data that could be crucial in solving cases. While intended to enhance law enforcement capabilities, this use of power raises significant privacy and security concerns among civil liberties groups and the tech community, who argue it could undermine the security of digital communications and infringe on individual rights.
Read more

Service NSW to enforce multifactor authentication by 2026

itNews by Eleanor Dickinson
In a proactive step towards enhancing digital security, Service NSW has announced that it will mandate multifactor authentication (MFA) for all its services by 2026. This initiative aims to strengthen protection against cyber threats and identity theft, requiring users to verify their identity through multiple verification methods before accessing services. The move reflects an increasing trend among government agencies to adopt stricter security measures to safeguard sensitive information and user data, aligning with global best practices in cybersecurity.
Read more

Prosecutors told to do more to strip ‘revenge porn’ abusers of victim images

The Observer by Shanti Das
In response to the growing issue of ‘revenge porn,’ prosecutors are being urged to take stronger actions to remove illicit images from circulation and penalise perpetrators more severely. This push for tougher enforcement comes amid reports of increasing incidents where private images are distributed without consent, causing significant distress to victims. Legal experts and advocacy groups emphasise the need for robust legal frameworks that not only prevent the initial sharing of such images but also swiftly remove them from all digital platforms. These efforts are part of a broader movement to protect individuals’ privacy and dignity in the digital age, ensuring that abusers face significant legal consequences for their actions.
Read more

U.S. Treasury Removed Sanctions Against the Crypto Mixer Service Tornado Cash

Security Affairs by Pierluigi Paganini
The U.S. Treasury has lifted sanctions on Tornado Cash, a prominent cryptocurrency mixer, reversing a previous decision that had broadly impacted the crypto community. This move comes after extensive discussions about the role of privacy in financial transactions and the legitimate uses of crypto mixing services. Tornado Cash was initially sanctioned due to concerns over money laundering and other illicit activities. The reversal highlights the complex balance regulators seek between preventing financial crimes and supporting technological and financial innovation. The decision has been met with relief in the cryptocurrency sector, which advocates for stronger privacy protections for legitimate users while acknowledging the need for oversight to prevent abuses.
Read more

Microsoft Trusted Signing service abused to code-sign malware

BleepingComputer by Lawrence Abrams
Cybersecurity researchers have uncovered a troubling misuse of Microsoft’s Trusted Signing service, where attackers have successfully code-signed malware, lending it an appearance of legitimacy. This abuse poses significant risks, as signed software is generally trusted by operating systems and security software. The incident reveals vulnerabilities in the digital signing process and raises questions about the reliability of security measures that depend heavily on certificates and signatures. Microsoft is investigating the issue and working on strengthening its verification processes to prevent similar breaches in the future.
Read more

Zero-Day Broker Operation Zero Offers Up to $4 Million for Telegram Exploits

Security Affairs by Pierluigi Paganini
Operation Zero, a prominent zero-day broker, has announced a bounty of up to $4 million for new exploits targeting the popular messaging app Telegram. This initiative reflects the high demand for vulnerabilities that can be used in cyber operations, emphasising the ongoing arms race in cybersecurity. The lucrative offer aims to attract skilled hackers and researchers to uncover previously unknown security flaws. Such bounties highlight the dual nature of the cybersecurity industry, where the discovery of vulnerabilities can either enhance security through patching or be exploited for malicious purposes, depending on who controls the information.
Read more

Coinbase was primary target of recent GitHub Actions breaches

BleepingComputer by Lawrence Abrams
In a recent security incident, Coinbase, a leading cryptocurrency exchange, was identified as the primary target of breaches involving GitHub Actions. Attackers exploited GitHub’s continuous integration and delivery service to execute unauthorised actions and potentially access sensitive data. The breach highlights the vulnerabilities associated with third-party platforms and the importance of securing software development pipelines. Coinbase has responded by enhancing their security measures and collaborating with GitHub to address these vulnerabilities, aiming to prevent similar incidents in the future and protect user assets.
Read more

What CISA’s Red Team Disarray Means for US Cyber Defense

Dark Reading by Becky Bracken
The Cybersecurity and Infrastructure Security Agency (CISA) is currently grappling with internal challenges related to its red team operations, which are essential for testing and improving US cyber defences. This disarray has raised concerns about the effectiveness of national cybersecurity strategies, especially at a time when threats are increasingly sophisticated. The red team’s role in simulating attacks to expose vulnerabilities is critical, and any disruption in their activities could significantly impact the nation’s ability to detect and respond to real cyber threats. The situation underscores the need for robust and well-coordinated cybersecurity practices to safeguard national interests.
Read more

Oracle denies breach after hacker claims theft of 6 million data records

BleepingComputer by Sergiu Gatlan
Oracle has publicly refuted claims of a data breach after a hacker alleged the theft of 6 million records from their systems. The hacker’s claims, circulated widely online, suggested a significant security lapse. However, Oracle’s investigation found no evidence supporting these claims, asserting that their security measures remained intact. This incident highlights the challenges companies face in managing cybersecurity threats and the impact of false breach claims on reputation and trust. It also underscores the importance of rigorous security protocols and timely, transparent communication in maintaining stakeholder confidence.
Read more

Nation-State ‘Paragon’ Spyware Infections Target Civil Society

Dark Reading by Nate Nelson
The sophisticated ‘Paragon’ spyware, linked to a nation-state actor, has been discovered targeting civil society organizations worldwide. This malware campaign is noted for its precision and stealth, designed to infiltrate systems and gather sensitive information without detection. The impact on civil society is profound, threatening the privacy and security of activists and non-governmental organizations engaged in sensitive or controversial work. The discovery of ‘Paragon’ underscores the growing trend of state-sponsored cyber espionage aimed at political manipulation and surveillance, raising serious concerns about digital security and human rights.
Read more

Medusa Ransomware Uses Malicious Driver to Disable Anti-Malware with Stolen Certificates

The Hacker News by Ravi Lakshmanan
The Medusa ransomware has evolved with a new tactic, using a malicious driver signed with stolen certificates to disable anti-malware software, enhancing its ability to infect systems undetected. This development represents a significant escalation in ransomware sophistication, as attackers now manipulate legitimate software validation mechanisms to bypass security. The use of stolen certificates complicates detection efforts, as it allows the malware to appear trustworthy to the system’s security protocols. This strategy underscores the necessity for enhanced vigilance and updated security measures to combat advanced ransomware threats.
Read more

Attack Update As FBI Warns Email And VPN Users—Activate 2FA Now

Forbes by Davey Winder
The FBI has issued a critical alert urging users of email services and VPNs to activate two-factor authentication (2FA) immediately. This warning comes in response to a surge in cyber attacks targeting these services, exploiting weak or reused passwords. By implementing 2FA, users can significantly enhance their security, creating an additional barrier against unauthorised access. This precaution is particularly crucial as cybercriminals increasingly deploy sophisticated techniques to bypass traditional security measures. The FBI’s advisory highlights the ongoing need for robust cybersecurity practices to protect personal and organisational data.
Read more

Trump order put states at the forefront of cyber and natural disaster response

Gov Exec by Chris Teale
A recent executive order by President Trump has shifted significant responsibility for responding to cyberattacks and natural disasters to state governments. This directive aims to enhance local readiness and response capabilities by empowering states with more autonomy and resources. However, it also challenges states to rapidly upscale their infrastructure and training programs to effectively manage these critical situations. The order reflects a strategic shift towards a more decentralised approach in managing emergencies, intending to foster quicker and more localised responses but also requiring significant coordination and support from federal agencies.
Read more

Groups Urge Congress to Extend Expiration Date for Cybersecurity Information Sharing Act

American Public Power Association by Paul Ciampoli
Advocacy groups are calling on Congress to extend the Cybersecurity Information Sharing Act’s expiration date, emphasising the importance of continued and enhanced public-private collaboration in cybersecurity efforts. The act facilitates the sharing of cybersecurity threat information between the government and private sector, playing a crucial role in pre-emptive threat detection and response. Supporters argue that extending the act is vital for maintaining a robust defence against increasingly sophisticated cyber threats, ensuring that both sectors can rapidly exchange information and coordinate responses effectively.
Read more

The Trump Administration Wants USAID on the Blockchain

Wired by Vittoria Elliott
The Trump administration has proposed integrating blockchain technology into the operations of USAID, the U.S. agency responsible for foreign aid. The initiative aims to increase transparency, reduce corruption, and improve accountability in aid distribution. By using blockchain’s decentralised ledger system, the administration hopes to track aid flows more accurately and ensure that funds reach their intended recipients. While the idea has garnered interest for its potential efficiency, critics warn of challenges including technical complexity, data privacy, and the risk of excluding communities with limited digital access.
Read more

ANALYSIS

Is the Middle East’s Race to Digitize a Threat to Infrastructure?

Dark Reading by Apu Pavithran
The Middle East’s rapid digitisation efforts are raising concerns about potential vulnerabilities in critical infrastructure. This technological push aims to boost economic growth and modernise various sectors, but it also exposes these systems to cyber threats. Experts warn that without robust cybersecurity measures, the region’s infrastructure could be at risk of cyberattacks that disrupt essential services. The article emphasises the need for comprehensive security strategies to safeguard these vital systems as they become increasingly interconnected and reliant on digital technologies.
Read more

The Quantum Apocalypse Is Coming. Be Very Afraid

Wired by Amit Catwalk
Imagine a world where today’s encryption crumbles in seconds—this is the looming threat posed by quantum computing. Often called the ‘quantum apocalypse,’ the scenario envisions a future where critical infrastructure, financial systems, and private communications are laid bare. The article explores how quantum advancements could dismantle current cryptographic defences, sparking urgent investment in quantum-resistant technologies. With adversaries already developing quantum capabilities, the race is on to secure digital systems before quantum breakthroughs force a global reckoning in cybersecurity.
Read more

Why Canada and the EU Must Support Ukraine—And Each Other

PrivID (Substack)
This analysis explores the geopolitical and cybersecurity implications of the ongoing conflict in Ukraine, arguing for stronger support from Canada and the European Union. The piece highlights how the conflict has not only regional but global cybersecurity ramifications, emphasising the need for collective action to counter threats and bolster security frameworks. The author argues that supporting Ukraine is pivotal not just for regional stability but also as a stand against cyber aggression that could set precedents affecting global norms and cybersecurity policies. The call for collaborative support from Canada and the EU reflects a broader strategy to enhance resilience against cyber threats and ensure a coordinated response to international security challenges.
Read more

Nowhere to Run: The Online Footprint of an Alleged Kinahan Cartel Associate

Bellingcat by Connor Plunkett, Peter Barth and Beau Donelly
Digital footprints don’t just expose everyday over-sharers—they’re now unravelling global crime networks. This investigation tracks the online activity of an alleged Kinahan cartel associate, revealing how open-source intelligence (OSINT) tools can map relationships, locations, and movements with remarkable precision. The piece highlights how social media and digital platforms, once seen as neutral ground, have become both tools of the trade for criminals and goldmines for law enforcement. As the boundaries between digital life and real-world crime blur, the role of OSINT in modern policing is becoming impossible to ignore.
Read more

The Human Factor: Redefining Cybersecurity In The Age Of AI

Forbes by Tony Bradley
As AI transforms cybersecurity, the human element is proving more essential—not less. While machine learning brings speed, scale, and automation to threat detection, it lacks the nuance, ethics, and context-driven reasoning that human judgment provides. This piece explores how people remain both a vulnerability and a vital line of defence, particularly in high-stakes decision-making. It calls for sustained investment in human capability—through training, adaptability, and oversight—to ensure AI augments rather than replaces skilled professionals. In an age of automation, resilient cyber defence still begins with people.
Read more

Strengthening Cybersecurity: Lessons from the Cybersecurity Survey

International Monetary Fund by Rangachary Ravikumar
What’s standing between nations and stronger cyber resilience? A recent IMF survey offers clues, revealing persistent gaps in protecting critical infrastructure and inconsistencies in how countries approach cybersecurity. The findings point to the urgent need for greater international cooperation, clearer standards, and the sharing of best practices. With threats growing in speed and scale, the piece argues that no single country can go it alone—collective defence is now essential. Investment in capacity-building, policy alignment, and cross-border collaboration will be key to staying ahead of an increasingly complex threat landscape.
Read more

CyAN Members: Op Eds, Articles, etc:

CVE, CVSS, and EPSS: Which One Actually Matters for Security?

Fel Gayanilo
When it comes to measuring risk, not all cybersecurity metrics are created equal. Fel breaks down the roles of CVE, CVSS, and EPSS, examining how each contributes to a security team’s understanding of vulnerabilities. While CVE identifies flaws and CVSS scores their severity, EPSS stands out for its predictive power—estimating the likelihood a vulnerability will actually be exploited. Fel’s analysis calls for a shift toward more dynamic, intelligence-led security strategies that prioritise risk by likelihood, not just theoretical impact—enabling teams to stay ahead of the curve, not just react to it. As threat actors move faster and exploit windows shrink, timing is everything. Metrics that help security teams prioritise what will be attacked—rather than what could be—are quickly becoming essential.
Read more

Cybersecurity in Singapore – BlackHat Asia 2025 Here We Go!

Nick Kelly
Few places are leaning into cybersecurity innovation quite like Singapore. With government support, a booming startup ecosystem, and growing international collaboration, the city-state is fast becoming a regional powerhouse. As momentum builds ahead of Black Hat Asia 2025, Nick reflects on Singapore’s strategic role in shaping cybersecurity conversations across the Asia-Pacific. From policy to practice, the event promises to showcase both local leadership and global expertise—reinforcing CyAN’s commitment to community, knowledge sharing, and advancing security on a global scale. The energy is palpable, and the opportunities for cross-border learning and partnership are vast. If Singapore is any indication, the future of cybersecurity will be as collaborative as it is cutting-edge.
Read more

CyAN Members: NEWS

  1. Breaking the Cycle: Combatting Online IBSA for a Safer Digital Experience
  2. Congratulations to CyAN member and CEO of White Hat IT Security, Sándor Fehér, for winning the Best CEO of the Year 2025 award from Behaviour – a HR-magazin in the small business category! Congratulate him on LinkedIn
  3. Celebrated CyAN member and winner of the 2024 European CyberWomen Trophy, Sarah Jane Mellor! Congratulate her on this LinkedIn post
  4. Congratulations to CyAN member and Founder of Vyanams Strategies (VYS), Vaishnavi J, and her team for their crucial support in developing the 5Rights Foundation’s ‘Children & AI Design Code’! Learn more on LinkedIn
  5. Congratulations to CyAN member Rupesh Shirke and his family on the arrival of their beautiful baby girl. Send your congratulations to Rupesh

Upcoming CyAN (and CyAN Partner) Global Events:

  • Trust & Safety Forum at Forum INCYBER Europe (FIC), Lille, France: April 1–2 Read more
  • Supply Chain Cyber Security Summit (SCCS), Lisbon, Portugal: April 9–11 Read more
  • GITEX AFRICA, Marrakesh, Morocco: April 14–16 Read more
  • GITEX ASIA, Singapore (Marina Bay Sands): April 23–25 Read more
  • GISEC, Dubai World Trade Centre, UAE: May 6–8 Read more
  • The Cyber Outstanding Security Performance Awards (Cyber OSPAs), London, UK: May 8 Read more
  • CSG Awards 2025, Dubai: May 7 Read more
  • World AI Technology Expo, Dubai, UAE: May 14–15 Read more
  • CyAN 10th Anniversary Celebrations!
  • GITEX Europe Messe, Berlin, Germany: May 21–23 Read more
  • MaTeCC, Rabat, Morocco (The third annual North Africa cybersecurity event, hosted by CyAN partner École High-Tech): June 7–9, 2025 Read more
  • CyAN Q2 Community Call (APAC and the Gulf): June 11, 12:00 GST / 16:00 SGT / 18:00 AEST
  • CyAN Q2 Community Call (EMEA and the Americas): June 11, 20:00 GST / 18:00 CET / 17:00 UTC / 12:00 EDT

Cyber (In)Securities – Issue 134

Cyber (In)Securities – Issue 134

Information Security News Judge blocks Elon Musk’s Doge from accessing social security records The Guardian by Guardian Staff & AgenciesA federal judge has issued a restraining order preventing Elon Musk’s Department of Government Efficiency (Doge) from accessing Social Security Administration (SSA) records, citing privacy concerns 

Cyber (In)Securities – Issue 133

Information Security News Microsoft: New RAT Malware Used for Crypto Theft, Reconnaissance BleepingComputer by Sergiu GatlanMicrosoft has identified a new form of RAT (Remote Access Trojan) malware that is being used for cryptocurrency theft and detailed reconnaissance of infected systems. This sophisticated malware targets digital 

Cyber (In)Securities – Issue 132

Information Security News

Elon Musk’s Starlink Could Be Used to Transmit Australian Election Voting Results

The Guardian by Josh Taylor
The Guardian reports that Elon Musk’s satellite internet service, Starlink, is being considered as a potential method to transmit voting results in Australian elections. This proposal aims to leverage Starlink’s extensive network to ensure reliable and secure communication of electoral data, especially in remote and rural areas where traditional internet services might not be as effective. The initiative highlights the growing influence of private satellite networks in critical public sectors and raises questions about the security implications of depending on commercial space infrastructure for national electoral processes.
Read more

Worried About DeepSeek? Turns Out, Gemini and Other US AIs Collect More User Data

ZDNet by Matene Toure
Recent analysis reveals that, contrary to popular concern, AI systems like Gemini are collecting more user data than DeepSeek. This comparative insight into U.S. AI technologies underscores the extensive data collection practices prevalent in the industry, often surpassing those of widely debated systems. The report highlights the need for greater transparency and regulatory scrutiny regarding how personal data is harvested and utilized by AI technologies. It calls for consumers and policymakers to reconsider the balance between technological advancement and privacy rights, emphasizing the importance of establishing clear data governance frameworks.
Read more

Car Exploit Allows You to Spy on Drivers in Real Time

Dark Reading by Nate Nelson
A newly discovered vulnerability in modern car technology allows for real-time spying on drivers, exposing a significant privacy risk. This exploit targets the communication systems embedded within vehicles, enabling unauthorized access to live audio and location tracking without the driver’s knowledge. The exposure of such a flaw highlights the increasing security concerns as automobiles become more connected and technologically sophisticated. Security experts are urging car manufacturers to enhance their cybersecurity measures and are advising drivers to be aware of the potential for such breaches and to seek updates and fixes that may mitigate these risks.
Read more

Inside Elon Musk’s ‘Digital Coup’

Wired by Makena Kelly, David Gilbert, Vittoria Elliott, Kate Knibbs, Dhruv Mehrotra, Dell Cameron, Tim Marksman, Leah Geiger & Zoe Schiffer
An in-depth investigation reveals how Elon Musk’s inner circle has gained extraordinary, seemingly unfettered access to vast amounts of sensitive U.S. citizen data, including social media, biometric, financial, and government-related records. Unlike officials who undergo stringent security vetting, these individuals—operating with no formal oversight—wield significant control over systems affecting national infrastructure, AI development, and online platforms. The report raises critical questions: Why do private actors with no public accountability have access to such vast datasets? And without transparency or regulation, who ensures this data isn’t misused? The findings underscore the urgent need for scrutiny and safeguards to prevent a small, unelected group from exerting unchecked influence over critical digital ecosystems.
Read more

Dems Ask Federal Agencies for Reassurance DOGE Isn’t Feeding Data into AI Willy-Nilly

The Register by Brandon Vigliarolo
US Democratic lawmakers are seeking reassurances from federal agencies regarding the use of DOGE, a data aggregation tool, amid concerns about its data handling practices and potential privacy implications. This inquiry stems from worries that DOGE could be indiscriminately funneling vast amounts of user data into AI systems without sufficient oversight or adherence to privacy standards. The request highlights the broader issues of data protection and transparency in government technology deployments, pressing for clear policies that ensure data is managed responsibly and ethically in line with citizens’ privacy rights.
Read more

ASIC Sues FIIG Securities for Cyber Security Failures

by itNews
The Australian Securities and Investments Commission (ASIC) has initiated legal action against FIIG Securities, accusing the firm of inadequate cybersecurity measures that failed to protect sensitive client data. This lawsuit marks a significant move by the regulatory body to enforce stricter cybersecurity compliance among financial institutions. ASIC’s action underscores the growing importance of robust cyber defences in the financial sector, highlighting the legal and reputational risks companies face when they neglect cybersecurity. The case serves as a stark reminder for businesses to prioritize the security of their digital infrastructures to safeguard against potential breaches and regulatory penalties.
Read more

GitHub Uncovers New ruby-saml Vulnerabilities Allowing Account Takeover Attacks

The Hacker News by Ravie Lakshmanan
GitHub has identified critical vulnerabilities in the ruby-saml authentication library, which could allow attackers to carry out account takeover attacks. These security flaws make it possible for cybercriminals to bypass authentication steps and gain unauthorized access to user accounts across various platforms that use this library. The discovery has prompted urgent calls for developers to update their applications with the latest patched version of ruby-saml to prevent potential exploits. This incident highlights the ongoing challenges in securing authentication mechanisms and the importance of maintaining up-to-date security practices in software development.
Read more

Microsoft Warns of Hospitality Sector Attacks Involving ClickFix

SecurityWeek by Eduard Kovacs
Microsoft has issued a warning about a series of targeted cyberattacks against the hospitality sector, involving a malicious software called ClickFix. The attacks are primarily focused on hotels, resorts, and other entities within the industry, exploiting vulnerabilities to steal sensitive information such as customer data and financial records. ClickFix is deployed through seemingly benign email attachments that, when opened, initiate a chain of malicious activities. Microsoft’s alert emphasizes the need for heightened cybersecurity measures in the hospitality industry, particularly in improving email security protocols and training staff to recognize potential cyber threats.
Read more

Apple to Appeal Against UK Government Data Demand at Secret High Court Hearing

The Guardian by Rachel Hall
Apple is set to challenge a UK government request for data in a secret high court hearing, marking a significant clash over privacy and government surveillance powers. The tech giant’s appeal stems from concerns about the implications of such data access for user privacy and the potential setting of a precedent that could affect global operations. This legal battle underscores the ongoing tension between technology companies and government agencies over access to digital information, highlighting the delicate balance between national security interests and individual privacy rights.
Read more

Legislative Push for Child Online Safety Runs Afoul of Encryption Advocates (Again)

Cyberscoop by Derek B. Johnson
A legislative effort aimed at enhancing online safety for children has once again clashed with encryption advocates. The proposed measures seek to implement stricter controls on digital platforms to protect minors, but they have raised concerns about potentially undermining end-to-end encryption. Encryption advocates argue that while protecting children is paramount, the security and privacy of all users must not be compromised. This ongoing debate highlights the tension between safeguarding vulnerable internet users and maintaining robust privacy protections, emphasizing the challenge of balancing these critical interests.
Read more

DeepSeek Can Be Gently Persuaded to Spit Out Malware Code

The Register by Connor Jones
The AI tool DeepSeek, known for its data processing capabilities, has been found vulnerable to manipulation that can result in the generation of malware code. Researchers demonstrated that with specific inputs, DeepSeek could be “gently persuaded” to produce harmful code, highlighting a significant security concern. This revelation puts a spotlight on the potential dangers of AI systems when exploited by malicious actors. It raises crucial questions about the ethical development and security hardening of AI technologies, urging developers to implement more robust safeguards against such vulnerabilities.
Read more

NIST Finalizes Differential Privacy Rules to Protect Data

Dark Reading by Arielle Waldman
The US National Institute of Standards and Technology (NIST) has finalized its guidelines on differential privacy, establishing a framework designed to enhance data protection. This move aims to provide organizations with a method to share useful information while ensuring that individual data remains private and secure. The new rules advocate for incorporating differential privacy techniques into data analytics processes, effectively minimizing the risk of personal data exposure. These standards represent a significant step forward in the struggle to balance data utility and privacy, urging companies to adopt these practices to safeguard sensitive information.
Read more

Meta Warns of FreeType Vulnerability (CVE-2025-27363) With Active Exploitation Risk

The Hacker News by Ravie Lakshmanan
Meta has issued a warning about a critical vulnerability in the FreeType font rendering library, identified as CVE-2025-27363, which is currently at risk of active exploitation. This vulnerability allows attackers to execute arbitrary code through specially crafted fonts. Given the widespread use of FreeType in various software applications, the potential impact is significant. Meta urges developers and system administrators to apply the available patches immediately to mitigate the risk and prevent potential breaches that could lead to substantial data loss and system compromise.
Read more

CISA: Medusa Ransomware Hit Over 300 Critical Infrastructure Orgs

BleepingComputer by Sergiu Gatlan
The US Cybersecurity and Infrastructure Security Agency (CISA) has reported that Medusa ransomware has compromised over 300 critical infrastructure organizations across various sectors. This widespread attack underscores the growing threat of ransomware to essential services and national security. CISA is urging affected organizations to take immediate action to mitigate the damage and prevent further breaches. The advisory also calls for increased vigilance and enhanced security measures among all organizations to protect against this highly disruptive form of malware, which continues to evolve and find new targets.
Read more

Cisco Patches 10 Vulnerabilities in IOS XR

SecurityWeek by Ionut Arghire
Cisco has released patches for ten vulnerabilities in its IOS XR software, which is widely used in carrier-grade routers and networking equipment. These vulnerabilities range from high to critical severity and could allow attackers to cause denial of service, execute arbitrary commands, or escalate privileges. The announcement stresses the importance for network administrators to apply these updates promptly to prevent potential cyber attacks that could disrupt network operations. Cisco’s proactive measures reflect its commitment to maintaining the security and integrity of its products amidst an increasingly complex threat landscape.
Read more

GITLAB Addressed Critical Auth Bypass Flaws in CE and EE

Security Affairs by Pierluigi Paganini
GitLab has successfully addressed critical authentication bypass flaws affecting both its Community Edition (CE) and Enterprise Edition (EE) platforms. These vulnerabilities posed significant security risks, potentially allowing unauthorized users to gain access to private repositories and sensitive data without proper credentials. The patches were issued swiftly following the discovery, underscoring GitLab’s commitment to user security and the prompt response needed to avert potential data breaches. Users of both editions are urged to update their systems immediately to ensure they are protected against these exploits.
Read more

Garantex Crypto Exchange Admin Arrested While on Vacation

BleepingComputer by Sergiu Gatlan
A recent legislative push aimed at enhancing online safety for children has once again sparked controversy among encryption advocates. The proposed measures, which call for increased monitoring and restrictions on digital platforms, are meeting resistance from those who argue that they could undermine end-to-end encryption and infringe on privacy rights. Advocates for digital privacy assert that while protecting children online is critical, it should not come at the expense of weakening encryption, which secures communications and protects users’ data from unauthorized access. This ongoing debate highlights the challenging balance between safeguarding vulnerable populations and preserving fundamental privacy protections.
Read more

That Weird CAPTCHA Could Be a Malware Trap – Here’s How to Protect Yourself

ZDNet by Lance Whitney
A recent report highlights a troubling trend where CAPTCHA tests, commonly used to verify user authenticity, are being manipulated to spread malware. Cybercriminals are crafting fake CAPTCHA screens that mimic those of legitimate websites to deceive users into downloading malicious software. This tactic not only compromises the security of the affected devices but also undermines trust in what has been a standard security measure on many online platforms. The article provides essential tips on how to identify and avoid these fraudulent CAPTCHA tests, emphasizing the importance of vigilance and updating security software regularly to protect against such sophisticated cyber threats.
Read more

Zoom Patches 4 High-Severity Vulnerabilities

SecurityWeek by Eduard Kovacs
Zoom has addressed four high-severity vulnerabilities that could have allowed attackers to compromise users’ devices and breach personal data. These security flaws were found in various components of the video conferencing software, which if exploited, could enable unauthorized remote code execution and data theft. The vulnerabilities highlight ongoing challenges in securing widely used communication tools. Zoom’s prompt release of patches reflects its commitment to user safety amidst increasing reliance on digital communication platforms. Users are strongly encouraged to update their software immediately to safeguard against potential cyber-attacks exploiting these issues.
Read more

Chinese Cyberspies Backdoor Juniper Routers for Stealthy Access

BleepingComputer by Bill Toulas
Chinese cyber espionage efforts have escalated with the discovery that state-sponsored hackers have installed backdoors in Juniper network routers. This strategic move allows for stealthy, long-term access to network traffic, enabling the interception and manipulation of data. The revelation underscores the sophistication and persistence of cyber threats posed by nation-state actors, particularly targeting critical infrastructure and corporate networks. The incident has prompted urgent calls for network administrators to conduct thorough security audits and apply necessary patches or countermeasures to mitigate the risk of such covert surveillance activities.
Read more

This is the FBI, Open Up. China’s Volt Typhoon is on Your Network

The Register by Jessica Lyons
The FBI has issued a warning about ‘Volt Typhoon,’ a sophisticated cyberattack campaign originating from China, targeting U.S. networks. This initiative involves a series of coordinated attacks designed to infiltrate critical infrastructure and exfiltrate sensitive information. The urgency of the FBI’s alert highlights the significant threat posed by these cyber incursions, which leverage advanced persistent threat (APT) tactics to gain long-term access to targeted systems. The warning serves as a critical reminder for organizations to bolster their cybersecurity defenses and remain vigilant against evolving threats from state-sponsored actors.
Read more

New North Korean Android Spyware Slips Onto Google Play

BleepingComputer by Bill Toulas
North Korean hackers have successfully infiltrated Google Play with sophisticated Android spyware, posing a significant threat to users’ data privacy. The spyware, disguised within seemingly legitimate applications, is capable of stealing a wide range of personal information, including contacts, messages, and device data. This incident highlights the ongoing challenges faced by app stores in preventing the distribution of malicious software and underscores the need for users to be vigilant about the apps they download. It also calls for enhanced security measures by digital platforms to detect and block such threats more effectively.
Read more

Trump Administration Halts Funding for Two Cybersecurity Efforts, Including One for Elections

SecurityWeek by Associated Press
The Trump administration has recently halted funding for two significant cybersecurity initiatives, including one specifically aimed at securing election systems. This decision has sparked concerns among cybersecurity experts and advocates about the potential vulnerabilities in critical infrastructure and the integrity of upcoming elections. The cessation of these funds raises questions about the commitment to combating cyber threats and maintaining robust security measures at a national level. Critics argue that this move could leave the United States more exposed to cyberattacks, particularly during sensitive electoral processes.
Read more

Over 400 IPs Exploiting Multiple SSRF Vulnerabilities in Coordinated Cyber Attack

The Hacker News by Ravie Lakshmanan
A coordinated cyber attack involving over 400 IP addresses has been exploiting multiple Server-Side Request Forgery (SSRF) vulnerabilities across various online platforms. This widespread assault highlights a growing trend where attackers manipulate web servers to send requests to internal resources, leading to data breaches and unauthorized access to sensitive information. The scale and sophistication of this attack underline the urgent need for organizations to enhance their web application security and closely monitor network activity. It also calls for the implementation of stricter security protocols to prevent such vulnerabilities from being exploited.
Read more

US Hasn’t Determined Who Was Behind Cyberattack That Caused Outage on Musk’s X

SecurityWeek by Associated Press
Officials have yet to determine who was behind the cyberattack that caused a widespread outage on X (formerly Twitter), raising concerns over the platform’s security and resilience. The disruption has fueled speculation about whether state-sponsored hackers or cybercriminal groups were responsible, particularly given the platform’s role in global communications. Experts warn that major online platforms remain attractive targets for large-scale disruptions, highlighting the need for stronger cyber defenses, rapid response mechanisms, and greater transparency when high-profile platforms face security incidents.
Read more

UK Must Pay Cyber Pros More Than Its Prime Minister, Top Civil Servant Says

The Register by Connor Jones
A top UK civil servant has advocated for paying cybersecurity professionals more than the Prime Minister to attract top talent needed for national security. This proposal highlights the critical demand for skilled cybersecurity personnel amid escalating global cyber threats. The call for competitive salaries aims to address the growing difficulty in recruiting and retaining cyber experts essential for protecting national infrastructure. The statement has sparked discussions about prioritizing investment in cybersecurity talent to strengthen the nation’s defenses against increasingly sophisticated cyberattacks.
Read more

Microsoft Patches 57 Vulnerabilities, Including 6 Zero-Days

Cyberscoop by Matt Kapko
Microsoft has released updates to patch 57 vulnerabilities, including six classified as zero-days, which were actively being exploited. This substantial update covers a broad range of issues across multiple Microsoft products, highlighting the company’s ongoing efforts to tighten security defenses against increasingly sophisticated cyber threats. The patched vulnerabilities include those that could allow attackers to execute arbitrary code, gain elevated privileges, and bypass security features. Users and organizations are urged to apply these updates immediately to protect their systems from potential exploits that could compromise data and operational security.
Read more

Apple Discloses Zero-Day Vulnerability, Releases Emergency Patches

Cyberscoop by Greg Otto
Apple has disclosed a critical zero-day vulnerability affecting several of its products and has swiftly released emergency patches to address the issue. This vulnerability, which was being actively exploited, could allow attackers to execute arbitrary code with kernel privileges, posing a severe security risk to users. The urgency of Apple’s response emphasizes the potential severity of the exploit and the necessity for users to update their devices immediately to protect against potential data breaches and system takeovers. This incident highlights the ongoing battle against cyber threats and the importance of timely software updates in maintaining device security.
Read more

‘Sloppy’ Cops Flout Tech Surveillance Laws

InnovationAus by Joseph Brookes
A recent report criticizes law enforcement agencies for their ‘sloppy’ adherence to technology surveillance laws, accusing them of flouting regulations designed to protect citizens’ privacy. The investigation highlights instances where police have improperly accessed and used surveillance tools, leading to significant concerns about oversight and accountability. This lax approach to legal compliance not only undermines public trust but also raises serious questions about the effectiveness of current regulatory frameworks in governing the use of advanced surveillance technologies by the police.
Read more

Allstate Insurance Sued for Delivering Personal Info on a Platter, in Plaintext, to Anyone Who Went Looking for It

The Register by Jessica Lyons
Allstate Insurance is facing a lawsuit after allegedly exposing customers’ personal information in plaintext, making it easily accessible to anyone who knew where to look. The lawsuit claims that highly sensitive data—including names, addresses, and policy details—was left unprotected, violating industry security standards and consumer privacy laws. Critics argue this represents a severe failure in basic cybersecurity hygiene, especially for an insurer handling vast amounts of private data. The case underscores the risks of poor data protection practices and raises questions about corporate accountability when personal information is left vulnerable to exploitation.
Read more

ANALYSIS

Strengthening the Human Firewall: Prioritizing Mental Health in Cybersecurity Teams

IT Security Guru by Jonathan Marnoch
Prioritizing mental health is crucial for enhancing the effectiveness and resilience of cybersecurity teams. Jonathan Marnoch emphasizes the need for supportive work environments that recognize the high-stress nature of cyber roles. He suggests implementing mental health strategies like regular wellness checks, mental health days, and accessible support services. These measures not only improve team well-being but also strengthen their ability to handle security threats. A comprehensive approach to mental health ensures that professionals remain equipped to uphold strong cybersecurity defenses.
Read more

US Must Prioritize Cybersecurity Training for the Military’s Engineers

Cyberscoop by Alison King, Annie Fixler, and Rear Adm. (Ret.) Mark Montgomery
Addressing the increasing cyber threats requires that the U.S. military prioritize cybersecurity training for its engineers. This article discusses how bolstering the cyber training regimen for military personnel is essential to protect national security interests. It emphasizes the need for a robust educational framework that can adapt to the evolving nature of cyber threats and equip engineers with the skills necessary to defend against sophisticated cyber attacks. Enhancing this training is not just about technical skills but also about understanding the strategic implications of cyber warfare.
Read more

The CISO as Business Resilience Architect

Dark Reading by Randolph Barr
The evolving role of Chief Information Security Officers (CISOs) now encompasses being architects of business resilience, extending beyond traditional cybersecurity boundaries. This shift reflects the increasing recognition of cyber risks as fundamental business risks. CISOs are tasked with designing and implementing strategies that not only protect information assets but also ensure business continuity in the face of cyber incidents. The role demands a deep understanding of business processes, risk management, and strategic planning, making CISOs pivotal in aligning security initiatives with broader business objectives.
Read more

Navigating AI-Powered Cyber Threats in 2025: 4 Expert Security Tips for Businesses

ZDNet by Dan Patterson
As businesses face an evolving landscape of AI-powered cyber threats in 2025, experts offer crucial security tips to stay protected. The focus is on proactive defense strategies, including the integration of advanced AI tools for threat detection and response. Experts emphasize the importance of continuous training for security teams to keep pace with AI developments. They also recommend regular system audits and updates to safeguard against sophisticated AI exploits. Strengthening collaboration across industry sectors is advised to share insights and best practices in combating these next-generation threats.
Read more

Pentesters: Is AI Coming for Your Role?

by The Hacker News
The rise of AI-driven security tools has sparked debate over the future of penetration testing and whether AI could replace human pentesters. While AI excels at automating vulnerability scanning and identifying common exploits, experts argue that human intuition, creativity, and contextual understanding remain irreplaceable. Pentesters bring critical thinking and adaptive problem-solving that AI lacks, making them essential in uncovering complex security flaws. Instead of replacing pentesters, AI is expected to enhance their capabilities, allowing security professionals to focus on more advanced, high-impact testing scenarios.
Read more

Cybersecurity Can’t Wait: Modern Enterprises Must Adapt

by TripWire
Modern enterprises must adopt a proactive cybersecurity strategy to stay ahead of evolving threats. This article stresses that reactive approaches are no longer sufficient as cyberattacks grow more sophisticated and frequent. Organizations are urged to implement continuous monitoring, real-time threat detection, and adaptive security frameworks to mitigate risks effectively. Investing in employee training, strong identity management, and AI-driven security tools is also highlighted as key to strengthening overall resilience. Businesses that fail to adapt risk severe financial, operational, and reputational damage in an increasingly hostile digital landscape.
Read more

2025 Annual State of the Industry Report Summary

by Cyber Security Tribe
Traditional security measures often fall short in detecting and preventing insider threats, which pose significant risks to organizations. This article explores how insiders—whether malicious or negligent—can bypass standard security controls, making detection more challenging than external attacks. It emphasizes the need for a more proactive approach, including behavioral analytics, real-time monitoring, and zero-trust frameworks to minimize insider risk. Organizations are encouraged to foster a culture of security awareness, implement strict access controls, and continuously review security policies to adapt to evolving threats from within.
Read more

Top Cybersecurity Concerns for 2025: Considerations for the C-Suite

Forbes by Anurag Lal
The latest industry report provides a comprehensive overview of the cybersecurity landscape heading into 2025, highlighting key trends, emerging threats, and strategic priorities for businesses. Findings indicate a surge in AI-driven attacks, increased regulatory scrutiny, and a growing emphasis on resilience over mere compliance. The report stresses the need for organizations to invest in adaptive security strategies, workforce upskilling, and robust incident response frameworks. As cyber risks become more complex, businesses must shift from reactive defense to proactive risk management to stay ahead of evolving threats.
Read more

CyAN Members: Op Eds, Articles, etc:

Cyber Kill Chain: Breaking Down the Steps

by CyAN Gen Sec Fel Gayanilo
Fel Gayanilo provides a detailed breakdown of the Cyber Kill Chain, outlining the key stages attackers follow to infiltrate systems and execute cyber threats. From reconnaissance and weaponization to exploitation, persistence, and data exfiltration, the piece explains how understanding these steps helps organizations move from reactive defenses to proactive security strategies and minimize risks before they escalate. Fel emphasizes that effective cybersecurity requires continuous threat intelligence, early detection, and rapid response strategies to stay ahead of attackers. He highlights the importance of monitoring attacker behaviours, identifying vulnerabilities early, and implementing adaptive security measures to disrupt threats before they cause significant damage. By understanding attacker methodologies, cybersecurity teams can anticipate evolving threats, strengthen defenses, and enhance overall cyber resilience in an increasingly hostile digital environment.
Read more

“What Happens to Heroes?” – Episode #1: The Unsung Heroes of the Digital World

by Didier Annet
Didier Annet shines a light on the often-overlooked individuals who keep the digital world safe—cybersecurity professionals, analysts, and data protection officers working behind the scenes to protect sensitive systems and information. This first episode in the series explores the challenges these experts face, from the relentless pace of cyber threats to the lack of recognition for their critical contributions. Annet reflects on the emotional and ethical weight carried by those responsible for safeguarding digital infrastructure, highlighting the toll of staying ahead of attackers in an ever-evolving threat landscape. He raises important questions about how these “unsung heroes” are supported, acknowledged, and motivated in an era of constant cyber conflict, emphasizing the need for greater appreciation, resources, and mental health support to sustain their efforts.
Read more

What Do Reality TV, OSINT, and French Celebrities on the Run Have in Common? Meet CyAN Member Sylvain Hajri!


Sylvain Hajri isn’t just a rockstar within the OSINT community; he’s also the founder of the search engine Epieos and the vibrant French community OSINT FR. Beyond developing tools that empower analysts worldwide, Sylvain brings his expertise to reality TV, where he tracks celebrities on the run. His recent podcast with OSINT producer Josh Axelrod delves into his early days in OSINT, the journey of building Epieos, the ethics of creating intelligence tools, and the hunter mindset essential for top-tier investigators. This captivating conversation showcases one of CyAN’s most innovative and intriguing members—don’t miss it!
Read more

Valued CyAN Member Rupesh Shirke Elevated to IEEE Senior Member


CyAN member Rupesh Shirke has been elevated to the grade of IEEE Senior Member, an honor bestowed only on those within the global engineering and technology community who have made significant contributions to their profession. This achievement reflects his dedication, expertise, and impact in advancing technology and cybersecurity. Congratulations, Rupesh—we’re immensely proud of you!

Bharat Raigangar Recognized as a Distinguished Jury Member for the CSG Awards 2025


Bharat Raigangar, a CyAN board member, has been recognized as a distinguished jury member for the CSG Awards 2025 at Enterprise IT World MEA! With his deep expertise in IT & Security, Bharat brings invaluable insights to honor excellence in cybersecurity. His leadership and commitment to elevating industry standards make him an outstanding choice for this role, and we look forward to seeing his contributions shape the awards.
Read more


CyAN thrives because of the incredible talent, leadership, and dedication of our members, and we are proud to see them shaping the future of cybersecurity on a global stage!

Register for the event


Upcoming CyAN (and CyAN Partner) Global Events:

  • Trust & Safety Forum at Forum INCYBER Europe (FIC), Lille, France: April 1-2 Event Info
  • CyAN Quarterly Online Members Meeting (CyAN Members Only): March 19, see emails for details
  • GITEX AFRICA, Marrakesh, Morocco: April 14-16 Event Info
  • GITEX ASIA, Singapore (Marina Bay Sands): April 23-25 Event Info
  • GISEC, Dubai World Trade Center, UAE: May 6-8 Event Info
  • The Cyber Outstanding Security Performance Awards (Cyber OSPAs), London, UK: May 8 Event Info
  • World AI Technology Expo UAE, Dubai, UAE: May 14-15 Event Info
  • MaTeCC, Rabat, Morocco: June 7-9 (The third annual North Africa and beyond cybersecurity event, hosted by CyAN partner organization École High-Tech.) Event Info

Cyber (In)Securities – Issue 131

Information Security News EU Looks to Tech Sovereignty with EuroStack Amid Trade War Biometric Update by Masha BorakThe European Union is making significant strides towards tech sovereignty with the development of EuroStack, a comprehensive technology initiative aimed at reducing dependence on foreign tech giants amid