Information Security News Ghost Ransomware Targets Orgs in 70+ CountriesDark Reading by Elizabeth MontalbanoGhost ransomware continues to pose a significant threat globally, now targeting organisations in over 70 countries. This ransomware variant is particularly insidious due to its ability to encrypt data swiftly and demand ransoms, leading to severe disruptions across multiple sectors. The widespread […]
Cybersecurity experts
Cybersecurity Developments in the Caribbean: Regional Collaboration and Strategic Growth by Dale Connell

The Caribbean is taking significant strides in enhancing its cybersecurity resilience through regional collaboration, strategic planning, and proactive policy-making. With the increasing prevalence of cyber threats, nations in the region are working together to strengthen digital security and combat cybercrime. Regional Collaboration and Cyber Resilience Strategy In January 2025, cybersecurity experts from The Bahamas, Barbados, […]
Cyber (In)Securities – Issue 125

Information Security News Joint Letter on the UK Government’s use of Investigatory Powers Act to attack End-to-End EncryptionGlobal Encryption Coalition by Ryan Polk The Global Encryption Coalition is actively opposing the UK government’s utilisation of the Investigatory Powers Act to erode end-to-end encryption, asserting that this undermines both personal privacy and national security. An open […]
Your Browser’s Betrayal:Understanding Syncjacking Attacks

In a recent feature from (In)Securities, Bill Toulas of BleepingComputer highlighted an emerging cyber threat known as “syncjacking.” This method exploits the synchronization features of browsers like Chrome to hijack user sessions across devices. By seducing users into installing malicious extensions, attackers gain access to synced data, including passwords, browsing history, and authentication tokens. With […]
Cyber (In)Securities – Issue 124

Information Security News Thai authorities detain four Europeans in ransomware crackdown Cyberscoop by Greg OttoIn a coordinated operation, Thai authorities arrested four European nationals in Phuket, suspected of orchestrating Phobos ransomware attacks. The individuals allegedly extorted approximately $16 million in Bitcoin from over 1,000 victims globally. The operation, codenamed “Phobos Aetor,” involved raids across multiple […]
Enhancing Cybersecurity: A Safer Internet Day Reflection on Protecting the Vulnerable

Safer Internet Day: A Call for Responsibility As we observe Safer Internet Day, we are reminded of our collective responsibility to foster a digital environment that is secure and respectful. This global observance not only promotes safer and more responsible use of online technology but also underscores the critical role of cybersecurity in safeguarding all […]
Australia’s Digital Destiny: Leading the Charge for Online Freedom

Introduction In today’s interconnected world, the importance of digital rights cannot be overstated. While the European Union is making commendable strides in this arena, Australia stands at a pivotal juncture to assert its leadership in championing online freedom. The nation’s commitment to democratic values, coupled with a robust technological infrastructure, uniquely positions it to influence […]
Cyber (In)Securities – Issue 123

Information Security News: Federal Judge Tightens DOGE Leash Over Critical Treasury Payment System AccessThe Register by Brandon Vigliarolo and Jessica LyonA federal judge has mandated stricter regulatory oversight on the integration of Dogecoin (DOGE) within the U.S. Treasury’s critical payment systems, following concerns about the cryptocurrency’s potential to disrupt financial stability. This decision introduces a […]
Welcome New Member – Osama Soliman from UAE

Please welcome our newest member from UAE, Osama Soliman! Osama Soliman is a seasoned GRC professional with extensive experience in risk management, internal controls, and regulatory compliance. He currently leads the Risk & Control function at a leading online food delivery platform, overseeing GRC activities across multiple markets, including Enterprise Risk Management (ERM), Technology Risk […]
Cyber (In)Securities – Issue 122

Information Security News: TSA’s Airport Facial-Recog Tech Faces Audit ProbeThe Register by Brandon VigliaroloThe U.S. Transportation Security Administration’s (TSA) facial recognition program is under audit by the Government Accountability Office (GAO) due to concerns over privacy, data security, and potential biases. The audit will assess how biometric data is collected, stored, and shared, and whether […]