Tag: cybersecurity

Welcome New Member – Norman King from Australia

Welcome New Member – Norman King from Australia

Please welcome our newest member from Australia, Norman King! Norman has 25+ years of experience working as a technology professional. As CTO, he has been part of the leadership team at iPartners since the company began operations in 2017. He has overseen the development of 

Cyber (In)Securities – Issue 142

Cyber (In)Securities – Issue 142

News Ransomware Gangs Innovate With New Affiliate ModelsDark Reading – Alexander Culafi FBI: US lost record $16.6 billion to cybercrime in 2024BleepingComputer – Sergiu Gatlan Attackers hit security device defects hard in 2024Cyberscoop – Matt Kapko Ripple NPM supply chain attack hunts for private keysThe 

🐘 The Elephant in the Server Room: Why Nation-State Hackers Love Small Businesses

🐘 The Elephant in the Server Room: Why Nation-State Hackers Love Small Businesses

You’d think nation-state cyber attackers would be too busy targeting military secrets, critical infrastructure, or global financial systems to bother with your local optometrist, small engineering firm, or boutique consultancy.

But you’d be wrong.

As Rob Lemos in his recent Dark Reading article “Nation-State Threats Put SMBs in Their Sights” noted, small and medium businesses (SMBs) are increasingly being caught in the crosshairs of nation-state actors. And while that sounds dramatic, it’s not exactly news to those of us who’ve been waving this red flag for a while now.

If you’ve heard me talk about data privacy, sovereignty, or security-by-design, you’ll know this has been a consistent message: Small doesn’t mean safe.
And simple doesn’t mean insignificant.

🐘 The Elephant in the Server Room

Let’s get this out of the way: Most small business owners aren’t waking up thinking about advanced persistent threats. They’re thinking about invoices, customers, staff shortages, or what fresh compliance headache might land in their inbox next.

But that’s precisely what makes them attractive to cyber operatives. Nation-state actors — whether working directly for governments or as aligned proxies — know that many SMBs:

  • Don’t have dedicated security teams
  • Rely on unpatched or outdated systems
  • Lack visibility into who accesses their data
  • Are deeply embedded in complex supply chains

And it’s that last point that’s so often overlooked. Because when a hostile actor wants to breach a major government department or multinational contractor, the front door is usually locked. So they look for a side door.

🕵 The Stepping Stones in the Spy Game

Small businesses aren’t usually attacked because of the data they hold. They’re attacked despite it — or more accurately, because of who they’re connected to.

Think of SMBs as stepping stones across a river. Alone, they may seem easy to overlook. But in the hands of a strategic adversary, they form a precise, quiet path — one that leads straight to critical infrastructure, sensitive government systems, or global defence suppliers.

Nation-state actors know this. They’ll compromise a regional software vendor with government clients. Or a boutique logistics firm that supports infrastructure projects. And then they wait.

This isn’t smash-and-grab ransomware. It’s quiet infiltration. Long-game strategy. And it works.

🧩 But Here’s the Hard Truth (and the Good News)

Small businesses can’t keep outsourcing this risk to someone else. Governments and tech giants have critical roles to play, of course. But SMBs themselves need access to practical, affordable ways to take control of their data.

I know it’s a lot. Many small business owners are already overwhelmed — especially with security solutions that feel designed for enterprises with full SOC teams and million-dollar budgets.

That’s why we designed 3 Steps Data with three very specific principles in mind:

  • Simple to use — because you shouldn’t need a cybersecurity degree to protect your business.
  • Cryptographically secure — so even if someone breaks in, they can’t read your data.
  • Zero-knowledge architecture — meaning we can’t see your data. And neither can anyone else.

We believe compliance and governance shouldn’t be a scary afterthought — they should come baked in. No back doors. No silent surveillance. No compromises.

🛡 Stop Treating SMBs as Collateral Damage

For too long, small businesses have been treated as unfortunate casualties of cyber warfare — overlooked in policy and underserved by tools.

But the truth is, SMBs are the economy. They’re the innovators, the service providers, the specialists keeping everything running in the background. And they deserve security solutions that match their importance — not just their size.

SMBs need:

  • Education that speaks business, not jargon
  • Tools built for real-world constraints
  • Transparent, auditable systems that don’t require trust, because they’re designed not to know
  • Public policy and industry support that acknowledges the role SMBs play in national resilience

🧭 A Final Thought

I’ve said it before, and I’ll keep saying it: Cybersecurity isn’t just a tech issue — it’s a business continuity issue. A trust issue. A sovereignty issue.

So next time someone suggests that nation-state hackers only go after “big targets,” remind them: the path often runs straight through the smallest players.

Let’s stop leaving our smallest businesses to fight off the world’s most resourced attackers with nothing but duct tape and good intentions.

Because when the stepping stones are this exposed,
it’s only a matter of time before someone crosses them.


About the Author:

Kim Chandler McDonald is the Co-Founder and CEO of 3 Steps Data, driving data/digital governance solutions.
She is the Global VP of CyAN, an award-winning author, storyteller, and advocate for cybersecurity, digital sovereignty, compliance, governance, and end-user empowerment.

Cyber (In)Securities – Issue 141

News Former cyber official targeted by Trump quits company over moveNBC News – Kevin Collier MITRE’s CVE program given last-minute reprieveitNews – Raphael Satter Whistle Blower: Russian Breach of US Data Through DOGENarativ – Zev Shalev Midnight Blizzard deploys GrapeLoader malwareBleepingComputer – Bill Toulas 4chan 

No Time for Antics with Semantics: Why CVEs Are Cybersecurity’s Lifeline

No Time for Antics with Semantics: Why CVEs Are Cybersecurity’s Lifeline

The cybersecurity world runs on shared language. We don’t often talk about it in those terms—but that’s exactly what the CVE (Common Vulnerabilities and Exposures) system is. A global taxonomy of flaws. A universal index of weakness. The quiet backbone that lets defenders coordinate responses 

What happens to Heroes?” EPISODE #4: The Unsung Heroes of the Digital World by Didier Annet

What happens to Heroes?” EPISODE #4: The Unsung Heroes of the Digital World by Didier Annet

The Psychological Impacts of Cyberattacks

This is the fourth episode of a story related to individuals who, in a matter of moments, transition from “employees” to “rescuers” in the immediate aftermath of a destructive cyberattack.

What I will call the “Heroes”!

Let’s Rewrite the Story of a Cyberattack – Uchrony of a losing scenario

“The problem is that sometimes operations and security don’t go together. You have to serve the business first, which is what makes the company make money. Our mission is to make operations and production work. But on top of that come the security requests. The issue is that we didn’t have the substance or the importance of what this was going to bring us. We know it’s important, but day-to-day activities take precedence..”

Excerpt From the Interview

My book is dedicated to encouraging companies to consider the human aspect in the context of cyber attacks. But coaching has only been part of my professional practice for the past 4 years. For over 25 years now, my career has been centered on helping customers strengthen their data resilience. This scenario is freely inspired by one of my corporate clients …

Typical identification factor: “It only happens to others!”

Once upon a time, there was a company with an exacerbated DNA of self-confidence, where all the energy was devoted to more business, faster, and where the only valuable thing was to say yes to business. Yes at all cost. Moreover, anyone who says no or tries to make sense is eliminated by the organization’s dynamics.

This scenario presents a lose-lose situation for the company. Despite recognizing, at the conscious level, the importance of IT security and attempting to implement a resilience strategy, the resources allotted are insufficient. The initiatives are never completed. Led by its instinct, the company prioritizes business over cybersecurity, creating a paradoxical corporate stance on cybersecurity.

This mindset frustrates those responsible for cyber resilience and embeds the notion that security measures are “costly and time consuming,” inevitably leading to internal conflicts and stress.

A losing scenario is marked by frustration among teams and between management levels due to inconsistencies between stated policies and actual practices. This creates ongoing tension around cybersecurity. Although the IT infrastructure may be effective and efficient, the company’s economic success relies on daily operations with the resources allocated at all costs to serve the client (business first). Thus, the level of cyber resilience ultimately depends on the technical staff’s motivation. Some individuals may prioritize the protection of IT systems over their own well-being and relationships, creating an unhealthy work-life balance that would need rectification.

In the face of an attack, the team’s advanced technical skills will allow for a prompt and effective response. Incident management procedures exist and are generally followed, ensuring a technologically sound reaction. However, underinvestment leads to gaps in the standard protection sequence (identification, protection, detection, response and recovery), which exacerbates both the technical and human impacts. These can range from complete system contamination to data theft and destruction.

To make up for these shortcomings, certain people may choose to become heroes, taking on additional duties and frequently going above and beyond. In contrast, others may hide their previous negligence, further exacerbating the crisis. This dynamic can happen intentionally or unintentionally.

Despite having a response strategy, these disruptions can hinder communication and objective evaluation, resulting in disputes and blunders during the rehabilitation phase.

The more significant the setbacks, the more the need for Heroes will arise. The greater the injuries, the more healing will be necessary. Each stage introduces its own disorder. During the response phase, some individuals may be marginalized and replaced by those who align more closely with management’s perspective. The technical team will execute the decisions with the help of external companies. However, there is no clear understanding of the underlying logic, leading to hesitation and indecision about the strategy. The post-crisis phase of data recovery becomes crucial if it is found that some information has been irreversibly lost. Heroes will embark on a relentless search for THE solution, striving to salvage the situation without considering the political implications.

Another complication that could exacerbate the situation is the ongoing investigation. If it turns out that the attack came from inside, this would trigger an atmosphere of distrust, secrecy, and suspicion.

Communication with customers and subcontractors will also face delays. Due to contradictory reports, there persists a cloud of uncertainty regarding the company’s trustworthiness.

Post-mortem examinations are often designed to protect a company’s image, specifically by hiding specific blunders. While this may initially seem like a deceptive tactic, it can actually enhance the company’s image of resilience. The company chooses not to disclose details of the incident, either internally or externally, in an effort to maintain its dignity.

Our heroes will find it challenging to return to normal. The human resources department will follow established procedures without acknowledging the extraordinary circumstances or the dedication displayed by some, having observed these events from a distance.

Since there is a desire to quickly move on from the incident, our heroes find themselves in a very targeted confrontation with human resources. Dismissive comments include: ‘OK, you’ve done a good job. Thank you! Here’s an extra reward to wrap things up. “Let’s get back to work.”

This response fails to adequately address the situation. Disheartened, the hero reflects on the sacrifices made for such a disappointing outcome.

The fall of the Heroes!

THINGS TO REMEMBER

Inside every company lives a silent tug-of-war: the business wants speed and innovation, security wants caution and control — and somewhere in the middle lies the fine art of staying both fast and safe.

Stay tuned for the next episode.

And don’t forget: “Cyberattacks are like glitter — once they’re in your system, they’re everywhere, and good luck getting rid of them!”


About the Author

Didier Annet is an Operational & Data Resilience Specialist and a Certified Professional Coach dedicated to empowering individuals and teams to navigate the complexities of an ever-changing digital landscape.

Find him on LinkedIn: Didier Annet

Learn more in his book:
📖 Guide de survie aux cyberattaques en entreprise et à leurs conséquences psychologiques: Que fait-on des Héros ? (French Edition) – Available on Amazon

Coming soon: The English version – “What Happens to Heroes”

Welcome New Member – Younès Felahi from Morocco

Welcome New Member – Younès Felahi from Morocco

Please welcome our newest member from Morocco, Younès Felahi 👋 Younes FELAHI, a recognized cybersecurity expert in Morocco and Africa, has over 15 years of experience in the field. He has held positions as a consultant, architect, and expert in cyber strategies, governance, risk and 

Cyber (In)Securities – Issue 140

Cyber (In)Securities – Issue 140

Information Security News Tariffs May Prompt Increase in Global CyberattacksDark Reading – Robert Lemos US Comptroller Cyber ‘Incident’ Compromises Org’s EmailsDark Reading – Kristina Beek Wyden Blocks Trump’s CISA Boss Nominee, Blames Cyber Agency for ‘Actively Hiding Info’ About Telecom InsecurityThe Register – Jessica Lyons 

Cyber (In)Securities – Issue 139

Cyber (In)Securities – Issue 139


Information Security News

  1. Autonomous, GenAI-Driven Attacker Platform Enters the Chat
    Dark Reading – Elizabeth Montalbano
  2. EncryptHub’s dual life: Cybercriminal vs Windows bug-bounty researcher
    BleepingComputer – Bill Toulas
  3. Voluntary ‘Pall Mall Process’ seeks to curb spyware abuses
    Cyberscoop – Tim Starks
  4. That massive GitHub supply chain attack? It all started with a stolen SpotBugs token
    The Register – Jessica Lyons
  5. EU wants to give encryption backdoors a try, despite pushback
    The Stack – Noah Bovenizer
  6. Google addresses 2 actively exploited vulnerabilities in security update
    Cyberscoop – Matt Kapko
  7. Scattered Spider’s ‘King Bob’ Pleads Guilty to Cyber Charges
    Dark Reading – Kristina Beek
  8. Malicious VSCode extensions infect Windows with cryptominers
    BleepingComputer – Bill Toulas
  9. NSW Electoral Commission asks for cyber security top-up
    itNews – Ry Crozier
  10. Chrome to patch decades-old flaw that let sites peek at your history
    The Register – Thomas Claburn
  11. UK’s attempt to keep details of Apple ‘backdoor’ case secret… denied
    The Register – Connor Jones
  12. EDR-as-a-Service Makes the Headlines in the Cybercrime Landscape
    Security Affairs – Pierluigi Paganini
  13. European Commission pushes for encryption ‘backdoors’
    Brussels Signal – Paddy Belton
  14. EU set to fine Elon Musk’s X up to $1 billion for breaking disinformation law
    Irish Star – Jeremiah Hassel
  15. E-ZPass toll payment texts return in massive phishing wave
    BleepingComputer – Bill Toulas
  16. Expert Used ChatGPT-4O to Create a Replica of His Passport in Just 5 Minutes Bypassing KYC
    Security Affairs – Pierluigi Paganini
  17. Microsoft Credits EncryptHub, Hacker Behind 618+ Breaches, for Disclosing Windows Flaws
    The Hacker News – Ravie Lakshmanan
  18. WinRAR flaw bypasses Windows Mark of the Web security alerts
    BleepingComputer – Ionut Ilascu
  19. Malicious Python Packages on PyPI Downloaded 39,000+ Times, Steal Sensitive Data
    The Hacker News – Ravie Lakshmanan
  20. Senators re-up bill to expand Secret Service’s financial cybercrime authorities
    Cyberscoop – Matt Bracken
  21. PoisonSeed phishing campaign behind emails with wallet seed phrases
    BleepingComputer – Bill Toulas
  22. Call Records of Millions Exposed by Verizon App Vulnerability
    SecurityWeek – Eduard Kovacs
  23. Trump fires Gen. Timothy Haugh from leadership of Cyber Command and NSA
    Cyberscoop – Mark Pomerleau
  24. Europcar GitLab breach exposes data of up to 200,000 customers
    BleepingComputer – Ionut Ilascu
  25. Rafts of Security Bugs Could Rain Out Solar Grids
    Dark Reading – Kristina Beek
  26. SpotBugs Access Token Theft Identified as Root Cause of GitHub Supply Chain Attack
    The Hacker News – Ravie Lakshmanan
  27. State Bar of Texas Says Personal Information Stolen in Ransomware Attack
    SecurityWeek – Ionut Arghire
  28. OPSEC Failure Exposes Coquettte’s Malware Campaigns on Bulletproof Hosting Servers
    The Hacker News – Ravie Lakshmanan
  29. Australian super funds compromised after data breach as hackers use stolen passwords
    The Guardian – Josh Taylor
  30. “Nudify” deepfakes stored unprotected online
    Malware Bytes – Pieter Arntz

Analysis

  1. PCI DSS 4.0.1: A Cybersecurity Blueprint by the Industry, for the Industry
    SecurityWeek – Kevin Townsend
  2. Intergenerational Mentoring: Key to Cybersecurity’s AI Future
    Dark Reading – Han Cho
  3. State-Sponsored AI Attacks: How Nations Are Using AI to Wage Digital War – The Weaponisation of AI in Cyber Warfare – Part 2
    PrivID (Substack)
  4. Australia’s social media ban is attracting global praise – but we’re no closer to knowing how it would work
    The Guardian – Josh Taylor
  5. Secure Communications Evolve Beyond End-to-End Encryption
    Dark Reading – Robert Lemos

CyAN Members: Op Eds, Articles, etc.

  1. Protecting the Power of AI: Strategies Against Emerging Security Risks
    RSAC Conference – Shantanu Bhattacharya
  2. Antivirus, Firewalls, and VPNs: What Do They Actually Do?
    Fel Gayanilo

🗓️ Upcoming CyAN (and CyAN Partner) Global Events:

SCCS Logo

📍 Lisbon, Portugal

Supply Chain Cyber Security Summit (SCCS)
April 9–11

Read more
GITEX AFRICA Logo

📍 Marrakesh, Morocco

GITEX AFRICA
April 14–16

Read more
GITEX ASIA Logo

📍 Singapore

GITEX ASIA
April 23–25

Read more
GISEC Logo

📍 Dubai, UAE

GISEC
May 6–8

Read more
Cyber OSPAs Logo

📍 London, UK

Cyber OSPAs
May 8

Read more
CSG Awards Logo

📍 Dubai, UAE

CSG Awards 2025
May 7

Read more
World AI Expo Logo

📍 Dubai, UAE

World AI Technology Expo
May 14–15

Read more

🎉 Celebration

CyAN 10th Anniversary
(Details TBA)

GITEX Europe Logo

📍 Berlin, Germany

GITEX Europe Messe
May 21–23

Read more
MaTeCC Logo

📍 Rabat, Morocco

MaTeCC
June 7–9

Read more

🌐 Online

CyAN Q2 Call (APAC + Gulf)
June 11 – 12:00 GST / 16:00 SGT / 18:00 AEST

🌐 Online

CyAN Q2 Call (EMEA + Americas)
June 11 – 20:00 GST / 18:00 CET / 17:00 UTC / 12:00 EDT

Behind the Keys: Women Who Secure the Future – Fatema Fardan

Behind the Keys: Women Who Secure the Future – Fatema Fardan

📄 Download Feature PDF Want to connect? Here is Fatema Fardan’s professional profile. Feel free to say hello and show your support. 🔗 Connect on LinkedIn About the Author Saba Bagheri, PhD Cyber Threat Intelligence Manager at Bupa APAC Director at the Cybersecurity Advisors Network