Tag: Cybersecurity experts

Welcome New Member –  Samira Marquaille from France

Welcome New Member – Samira Marquaille from France

Please welcome our newest member from France, Samira Marquaille Samira Marquaille is an IT Project Manager with more than 20 years of experience across both public and private sectors, with a strong focus on data privacy. She is skilled at uniting teams and fostering collaboration 

Welcome Back – Michael McDonald from Australia

Welcome Back – Michael McDonald from Australia

CyAN is thrilled to welcome back Michael McDonald, an internationally respected Senior Solution Architect, startup CTO, and technical visionary whose career spans three decades, five continents, and some of the most complex, high-stakes environments in industry and government. Michael brings rare breadth and depth across 

Welcome New Member – Caroline Humer from US

Welcome New Member – Caroline Humer from US

Please welcome our newest member from the United States, Caroline Humer

As an international digital safety advocate, Caroline Humer is dynamic and motivated, with a track record of successfully fostering cross-industry engagement. Growing up in numerous global settings has honed her ability to lead global projects from ideation to execution. Caroline’s exceptional networking skills have enabled her to excel in long-term business development, ultimately helping to safeguard vulnerable populations from harm.

She is also the Co-Founder of STISA (Survivors & Tech Solving Image-based Sexual Abuse), the world’s first NGO focused on providing a voice for survivors of image-based sexual abuse. STISA is raising awareness about this pervasive online violence, fostering international collaborations with hotlines and helplines, and developing cutting-edge technology to remove IBSA content.

It’s good to have you, Caroline! We look forward to the expertise you bring and enabling you here at CyAN. Don’t hesitate to reach out or explore Caroline’s profile to grow your networks mutually.

CyAN Voices: Growing Careers Through Mentorship

CyAN Voices: Growing Careers Through Mentorship

In this mentorship story of 2025, Sumandeep Kaur shares her experience as a Web Developer and Cybersecurity Intern under the guidance of her CyAN mentor, Shantanu Bhattacharya. Empowering Early-Career Web Developer & Cybersecurity Professionals: My Journey with the CyAN Mentorship Program By Sumandeep Kaur Acknowledging 

Cyber (In)Securities – Issue 144

News

  1. Quantum computer threat spurring quiet overhaul of internet security
    Cyberscoop – Greg Otto
  2. Pro-Russia hacktivists bombard Dutch public orgs with DDoS attacks
    BleepingComputer – Bill Toulas
  3. Dems look to close the barn door after top DOGE dog has bolted
    The Register – Brandon Vigliarolo
  4. Canadian Electric Utility Hit by Cyberattack
    SecurityWeek – Eduard Kovacs
  5. Putin’s Cyberattacks on Ukraine Rise 70%, With Little Effect
    Dark Reading – Nate Nelson
  6. Claude AI Exploited to Operate 100+ Fake Political Personas
    The Hacker News – Ravie Lakshmanan
  7. HIVE0117 Group Targets Russian Firms with DarkWatchman Malware
    Security Affairs – Pierluigi Paganini
  8. Ex-NSA cyber-boss: AI will soon be a great exploit coder
    The Register – Jessica Lyons
  9. AI talent heads to EU defence startups
    InnovationAus – Supantha Mukherjee & Michael Kahn
  10. WordPress plugin disguised as security tool injects backdoor
    BleepingComputer – Bill Toulas
  11. Nebulous Mantis targets NATO-linked entities
    The Hacker News – Ravie Lakshmanan
  12. Tariffs could slow replacement of telecom networks
    Cyberscoop – Tim Starks
  13. Ex-CISA chief decries cuts as Trump demands loyalty
    The Register – Jessica Lyons
  14. FBI shares massive list of 42,000 LabHost phishing domains
    BleepingComputer – Bill Toulas
  15. Phishers exploit Iberian blackout in real-time scams
    Dark Reading – Elizabeth Montalbano
  16. DOGE is building a surveillance state
    New York Times – Julia Angwin
  17. Tech Giants propose EOL security disclosure standard
    SecurityWeek – Ryan Naraine
  18. DARPA’s AI Cyber Challenge could upend patching
    Cyberscoop – Greg Otto
  19. Indian court orders Proton Mail block over deepfake claims
    The Hacker News – Ravie Lakshmanan
  20. Pushback against US cyber coordination shake-up
    Cyberscoop – Derek B. Johnson
  21. Fuel tank monitoring systems vulnerable to disruption
    Dark Reading – Jai Vijayan
  22. Hackers ramp up scans for leaked Git secrets
    BleepingComputer – Bill Toulas
  23. France attributes 12 cyberattacks to APT28
    BleepingComputer – Sergiu Gatlan
  24. Reports uncover jailbreaks and insecure AI code
    The Hacker News – Ravie Lakshmanan
  25. Apple ‘AirBorne’ flaws allow zero-click RCE
    BleepingComputer – Sergiu Gatlan
  26. Enterprise tech dominates zero-day exploits
    The Register – Connor Jones
  27. US critical infrastructure still struggles with OT security
    Dark Reading – Becky Bracken
  28. US House criminalizes nonconsensual deepfakes
    Cyberscoop – Derek B. Johnson
  29. Chinese espionage campaign targets SentinelOne
    The Hacker News – Ravie Lakshmanan
  30. Europol creates ‘Violence-as-a-Service’ taskforce
    Infosecurity Magazine – Phil Muncaster
  31. 76% of Australian orgs faced high-impact cyber events
    itWire – Gordon Peters
  32. France says Russian hackers targeted Macron in 2017
    The Guardian – Angelique Chrisafis

Analysis

  1. A Cybersecurity Paradox: Even Resilient Organizations Are Blind to AI Threats
    Dark Reading – Arielle Waldman
  2. New Research Reveals: 95% of AppSec Fixes Don’t Reduce Risk
    The Hacker News
  3. Debunking Security ‘Myths’ to Address Common Gaps
    Dark Reading – Arielle Waldman
  4. World Password Day 2025: Rethinking Security in the Age of MFA and Passkeys
    IT Security Guru – The Gurus
  5. ‘Source of data’: are electric cars vulnerable to cyber spies and hackers?
    The Guardian – Dan Milmo

Member Spotlights

  1. CRD #21: Security Blind Spots and Board-Level Leadership
    CyAN – Henry Röigas
  2. Online Safety for Kids and Teens: Global Platform Shifts
    CyAN – Vaishnavi J

🗓️ Upcoming CyAN (and CyAN Partner) Global Events:

GISEC Logo

📍 Dubai, UAE

GISEC
May 6–8

Read more
Cyber OSPAs Logo

📍 London, UK

Cyber OSPAs
May 8

Read more
CSG Awards Logo

📍 Dubai, UAE

CSG Awards 2025
May 7

Read more
World AI Expo Logo

📍 Dubai, UAE

World AI Technology Expo
May 14–15

Read more

🎉 Celebration

CyAN 10th Anniversary
(Details TBA)

GITEX Europe Logo

📍 Berlin, Germany

GITEX Europe Messe
May 21–23

Read more
MaTeCC Logo

📍 Rabat, Morocco

MaTeCC
June 7–9

Read more

🌐 Online

CyAN Q2 Call (APAC + Gulf)
June 11 – 12:00 GST / 16:00 SGT / 18:00 AEST

🌐 Online

CyAN Q2 Call (EMEA + Americas)
June 11 – 20:00 GST / 18:00 CET / 17:00 UTC / 12:00 EDT


Welcome New Member – Norman King from Australia

Welcome New Member – Norman King from Australia

Please welcome our newest member from Australia, Norman King! Norman has 25+ years of experience working as a technology professional. As CTO, he has been part of the leadership team at iPartners since the company began operations in 2017. He has overseen the development of 

Cyber (In)Securities – Issue 142

Cyber (In)Securities – Issue 142

News Ransomware Gangs Innovate With New Affiliate ModelsDark Reading – Alexander Culafi FBI: US lost record $16.6 billion to cybercrime in 2024BleepingComputer – Sergiu Gatlan Attackers hit security device defects hard in 2024Cyberscoop – Matt Kapko Ripple NPM supply chain attack hunts for private keysThe 

🐘 The Elephant in the Server Room: Why Nation-State Hackers Love Small Businesses

🐘 The Elephant in the Server Room: Why Nation-State Hackers Love Small Businesses

You’d think nation-state cyber attackers would be too busy targeting military secrets, critical infrastructure, or global financial systems to bother with your local optometrist, small engineering firm, or boutique consultancy.

But you’d be wrong.

As Rob Lemos in his recent Dark Reading article “Nation-State Threats Put SMBs in Their Sights” noted, small and medium businesses (SMBs) are increasingly being caught in the crosshairs of nation-state actors. And while that sounds dramatic, it’s not exactly news to those of us who’ve been waving this red flag for a while now.

If you’ve heard me talk about data privacy, sovereignty, or security-by-design, you’ll know this has been a consistent message: Small doesn’t mean safe.
And simple doesn’t mean insignificant.

🐘 The Elephant in the Server Room

Let’s get this out of the way: Most small business owners aren’t waking up thinking about advanced persistent threats. They’re thinking about invoices, customers, staff shortages, or what fresh compliance headache might land in their inbox next.

But that’s precisely what makes them attractive to cyber operatives. Nation-state actors — whether working directly for governments or as aligned proxies — know that many SMBs:

  • Don’t have dedicated security teams
  • Rely on unpatched or outdated systems
  • Lack visibility into who accesses their data
  • Are deeply embedded in complex supply chains

And it’s that last point that’s so often overlooked. Because when a hostile actor wants to breach a major government department or multinational contractor, the front door is usually locked. So they look for a side door.

🕵 The Stepping Stones in the Spy Game

Small businesses aren’t usually attacked because of the data they hold. They’re attacked despite it — or more accurately, because of who they’re connected to.

Think of SMBs as stepping stones across a river. Alone, they may seem easy to overlook. But in the hands of a strategic adversary, they form a precise, quiet path — one that leads straight to critical infrastructure, sensitive government systems, or global defence suppliers.

Nation-state actors know this. They’ll compromise a regional software vendor with government clients. Or a boutique logistics firm that supports infrastructure projects. And then they wait.

This isn’t smash-and-grab ransomware. It’s quiet infiltration. Long-game strategy. And it works.

🧩 But Here’s the Hard Truth (and the Good News)

Small businesses can’t keep outsourcing this risk to someone else. Governments and tech giants have critical roles to play, of course. But SMBs themselves need access to practical, affordable ways to take control of their data.

I know it’s a lot. Many small business owners are already overwhelmed — especially with security solutions that feel designed for enterprises with full SOC teams and million-dollar budgets.

That’s why we designed 3 Steps Data with three very specific principles in mind:

  • Simple to use — because you shouldn’t need a cybersecurity degree to protect your business.
  • Cryptographically secure — so even if someone breaks in, they can’t read your data.
  • Zero-knowledge architecture — meaning we can’t see your data. And neither can anyone else.

We believe compliance and governance shouldn’t be a scary afterthought — they should come baked in. No back doors. No silent surveillance. No compromises.

🛡 Stop Treating SMBs as Collateral Damage

For too long, small businesses have been treated as unfortunate casualties of cyber warfare — overlooked in policy and underserved by tools.

But the truth is, SMBs are the economy. They’re the innovators, the service providers, the specialists keeping everything running in the background. And they deserve security solutions that match their importance — not just their size.

SMBs need:

  • Education that speaks business, not jargon
  • Tools built for real-world constraints
  • Transparent, auditable systems that don’t require trust, because they’re designed not to know
  • Public policy and industry support that acknowledges the role SMBs play in national resilience

🧭 A Final Thought

I’ve said it before, and I’ll keep saying it: Cybersecurity isn’t just a tech issue — it’s a business continuity issue. A trust issue. A sovereignty issue.

So next time someone suggests that nation-state hackers only go after “big targets,” remind them: the path often runs straight through the smallest players.

Let’s stop leaving our smallest businesses to fight off the world’s most resourced attackers with nothing but duct tape and good intentions.

Because when the stepping stones are this exposed,
it’s only a matter of time before someone crosses them.


About the Author:

Kim Chandler McDonald is the Co-Founder and CEO of 3 Steps Data, driving data/digital governance solutions.
She is the Global VP of CyAN, an award-winning author, storyteller, and advocate for cybersecurity, digital sovereignty, compliance, governance, and end-user empowerment.

Cyber (In)Securities – Issue 141

News Former cyber official targeted by Trump quits company over moveNBC News – Kevin Collier MITRE’s CVE program given last-minute reprieveitNews – Raphael Satter Whistle Blower: Russian Breach of US Data Through DOGENarativ – Zev Shalev Midnight Blizzard deploys GrapeLoader malwareBleepingComputer – Bill Toulas 4chan