Tag: news

Cyber (In)Securities – Issue 143

Cyber (In)Securities – Issue 143

News Cybersecurity CEO accused of running malware on hospital PC blabs about it on LinkedInThe Register – Brandon Vigliarolo Cybersecurity experts issue response to Trump order targeting Chris Krebs, SentinelOneCyberscoop – Greg Otto Marks & Spencer breach linked to Scattered Spider ransomware attackBleepingComputer – Lawrence 

Cyber (In)Securities – Issue 138

Cyber (In)Securities – Issue 138


Information Security News

  1. Disclosure Drama Clouds CrushFTP Vulnerability Exploitation
    Dark Reading – Rob Wright
  2. CISA warns of Fast Flux DNS evasion used by cybercrime gangs
    BleepingComputer – Bill Toulas
  3. Google Quick Share Bug Bypasses Allow Zero-Click File Transfer
    Dark Reading – Tara Seals
  4. China-Linked Threat Group Exploits Ivanti Bug
    Dark Reading – Jai Vijayan
  5. International intelligence agencies raise the alarm on fast flux
    Cyberscoop – Greg Otto
  6. Oracle privately confirms Cloud breach to customers
    BleepingComputer – Sergiu Gatlan
  7. T-Mobile Bug Reveals Names, Images, and Locations of Random Children
    Gizmodo – Lucas Ropek
  8. Cybersecurity professor targeted by FBI has not been detained, lawyer says
    Reuters – A.J. Vicens
  9. X (Twitter) data leak exposes 2.8 billion users in supposed “inside job”
    Proactive – Phoebe Shields
  10. New Advanced FIN7’s Anubis Backdoor Allows To Gain Full System Control On Windows
    Security Affairs – Pierluigi Paganini
  11. Genetic data site openSNP to close and delete data over privacy concerns
    BleepingComputer – Bill Toulas
  12. Crimelords at Hunters International tell lackeys ransomware too ‘risky’
    The Register – Connor Jones
  13. Royal Mail investigates data leak claims, no impact on operations
    BleepingComputer – Sergiu Gatlan
  14. Police shuts down KidFlix child sexual exploitation platform
    BleepingComputer – Sergiu Gatlan
  15. Google DeepMind Unveils Framework to Exploit AI’s Cyber Weaknesses
    SecurityWeek – Kevin Townsend
  16. Cisco warns of CSLU backdoor admin account used in attacks
    BleepingComputer – Sergiu Gatlan
  17. Hackers Could Unleash Chaos Through Backdoor in China-Made Robot Dogs
    SecurityWeek – Ryan Naraine
  18. Cybercom discovered Chinese malware in South American nations
    Defensescoop – Mark Pomerleau
  19. Data protection bill leaves room for governmental abuse, campaigners warn
    The Guardian – Rachel Hall
  20. Japan Bolsters Cybersecurity Safeguards With Cyber Defense Bill
    Dark Reading – Kristina Beek
  21. North Korean IT worker army expands operations in Europe
    BleepingComputer – Sergiu Gatlan
  22. We Smell a (DC)Rat: Revealing a Sophisticated Malware Delivery Chain
    BleepingComputer / Acronis
  23. Apple fined €150 million over App Tracking Transparency issues
    BleepingComputer – Sergiu Gatlan
  24. 81% of Australian IT leaders want more government intervention to help them manage cybersecurity
    itWire – Gordon Peters
  25. Signal downloads skyrocket in Yemen, US after leak
    Semafor – Rachyl Jones
  26. CISA spots spawn of Spawn malware targeting Ivanti flaw
    The Register – Iain Thomson

Analysis

  1. End-to-End Encryption Under Fire: The Trojan Horse of “Public Safety”
    PrivID (Substack)
  2. Oracle’s masterclass in breach comms: Deny, deflect, repeat
    The Register – Connor Jones
  3. AI Giving Rise of the ‘Zero-Knowledge’ Threat Actor
    SecurityWeek – Etay Maor
  4. How an Interdiction Mindset Can Help Win War on Cyberattack
    Dark Reading – Mike McNerney
  5. Independent tests show why orgs should use third-party cloud security services
    Cyberscoop – Matt Kapko
  6. FDA’s Critical Role in Keeping Medical Devices Secure
    Dark Reading – Morey J. Haber
  7. Lock Your Digital Doors: Why SMEs Must Get Better At Cybersecurity
    Forbes – Peter Boolkah
  8. ENISA NIS360 2024 Cybersecurity Maturity & Criticality Assessment
    ENISA
  9. Game-Changing Predictions for Cybersecurity in 2025
    Via Satellite – Annamarie Nyirady

CyAN Members: Op-Eds & Articles

  1. Backdoors, Robot Dogs, and Why Trust Must Be Built In—Not Bolted On
    Kim Chandler McDonald
  2. “What happens to Heroes?” EPISODE #3 – The Psychological Impacts of Cyberattacks
    Didier Annet (CyAN Member)
  3. CyAN Signs 3 Open Letters Against Surveillance Laws
    CyAN Blog – CyAN Staff
  4. Strengthening Global Security: Data Protection as National Imperative
    Kim Chandler McDonald

Online Safety for Kids and Teens

  1. Highlights from the latest Vys ‘Online Safety for Kids and Teens’ Biweekly Brief
    Vaishnavi J – Vyanams Strategies (CyAN Member)

Women in Tech Feature Articles

  1. How might reduced DEI measures impact women in tech?
    Silicon Republic – Laura Varley
  2. Survey Says Women Are Finding New Paths to Cybersecurity
    GovTech Today
  3. Women in tech an untapped $6.5bn opportunity
    InnovationAus – Joseph Brookes
  4. The Case for More Women in Cybersecurity: Strengthening the Industry With Diverse Talent
    Security Brief – Zoya Schaller
  5. Full Women in Tech Feature – Interviews
    CyAN

🗓️ Upcoming CyAN (and CyAN Partner) Global Events:

📍 Lisbon, Portugal

Supply Chain Cyber Security Summit (SCCS)
April 9–11

Read more

📍 Marrakesh, Morocco

GITEX AFRICA
April 14–16

Read more

📍 Singapore

GITEX ASIA
April 23–25

Read more

📍 Dubai, UAE

GISEC
May 6–8

Read more

📍 London, UK

Cyber OSPAs
May 8

Read more

📍 Dubai, UAE

CSG Awards 2025
May 7

Read more

📍 Dubai, UAE

World AI Technology Expo
May 14–15

Read more

🎉 Celebration

CyAN 10th Anniversary
(Details TBA)

📍 Berlin, Germany

GITEX Europe Messe
May 21–23

Read more

📍 Rabat, Morocco

MaTeCC
June 7–9

Read more

🌐 Online

CyAN Q2 Call (APAC + Gulf)
June 11 – 12:00 GST / 16:00 SGT / 18:00 AEST

🌐 Online

CyAN Q2 Call (EMEA + Americas)
June 11 – 20:00 GST / 18:00 CET / 17:00 UTC / 12:00 EDT

Cyber (In)Securities – Issue 134

Cyber (In)Securities – Issue 134

Information Security News Judge blocks Elon Musk’s Doge from accessing social security records The Guardian by Guardian Staff & AgenciesA federal judge has issued a restraining order preventing Elon Musk’s Department of Government Efficiency (Doge) from accessing Social Security Administration (SSA) records, citing privacy concerns 

Cyber (In)Securities – Issue 130

Information Security News House Passes Bill Requiring Federal Contractors to Implement Vulnerability Disclosure Policies SecurityWeek by Eduard KovacsThe U.S. House of Representatives has recently passed a bill that mandates federal contractors to establish vulnerability disclosure policies. This legislative move aims to strengthen the security of 

Cyber (In)Securities – Issue 128

Cyber (In)Securities – Issue 128

Information Security News

89% of Enterprise GenAI Usage Is Invisible to Organizations, Exposing Critical Security Risks

The Hacker News
A new report reveals that a staggering 89% of generative AI usage within enterprises remains undetected, exposing organisations to severe security risks. This covert AI activity can lead to significant data breaches and compromise system integrity. To combat these hidden dangers, the report urges companies to implement comprehensive AI governance frameworks. These should include enhanced visibility of AI applications, robust monitoring to detect unauthorised activities, and proactive management strategies to secure digital environments effectively, ensuring that enterprises can safeguard against the escalating threat landscape.
Read more

Chinese APT Uses VPN Bug to Exploit Worldwide OT Organizations

Dark Reading by Nate Nelson
A recent cybersecurity investigation has identified that a Chinese Advanced Persistent Threat (APT) group is exploiting a vulnerability in VPN software to launch sophisticated attacks on operational technology (OT) organizations globally. This exploitation poses severe risks to critical infrastructures such as power plants and water treatment facilities. The report calls for immediate and robust security enhancements in vulnerable systems and emphasizes the necessity for continuous vigilance and updated protocols to defend against these strategically targeted cyber-espionage activities, ensuring the safety and resilience of essential services.
Read more

Beware of Fake Cybersecurity Audits: Cybercriminals Use Scams to Breach Corporate Systems

Tripwire by Graham Cluley
Corporations are increasingly victimized by cybercriminals posing as cybersecurity auditors. These fraudsters gain unauthorized access by exploiting the trust within organizations, leading to significant breaches of sensitive data. This emerging trend underscores the critical importance for companies to rigorously verify the credentials of security professionals and to continuously educate their employees about such deceptive tactics. Enhancing verification processes and employee awareness are essential steps to shield businesses from these sophisticated scams, ensuring the security and integrity of corporate information systems against potential threats.
Read more

New Apple Technology Could Allow Social Media Apps to Tell Whether Users Are Under 16

The Guardian by Josh Taylor
Apple is reportedly developing new technology that could enable social media platforms to accurately determine if users are under 16. This initiative aims to enhance online safety for minors by enforcing age-appropriate content restrictions and compliance with privacy laws. However, it raises significant privacy concerns about the extent and methods of data collection required for age verification. Advocates for digital privacy are calling for transparency and strict safeguards to ensure that these measures do not infringe on individual privacy rights, emphasizing the need for a balanced approach that protects both safety and privacy.
Read more

Hackers Can Crack Into Car Cameras in Minutes Flat

Dark Reading by Becky Bracken
Recent findings reveal a critical security flaw that allows hackers to compromise car camera systems in just minutes, posing severe privacy and safety risks to vehicle owners. This vulnerability highlights the urgent need for the automotive industry to strengthen cybersecurity measures in vehicle surveillance systems. Manufacturers are called to rapidly enhance security protocols, implement advanced protection technologies, and ensure robust safeguards are in place to prevent unauthorized access. This proactive approach is essential to protect personal data and ensure the safety of drivers and passengers in an increasingly connected world.
Read more

Signal Will Withdraw from Sweden If Encryption-Busting Laws Take Effect

The Register by Connor Jones
Signal CEO Meredith Whittaker has made clear her company has announced plans to withdraw its services from Sweden in response to proposed laws that could compromise encryption standards. The messaging app, known for its staunch privacy policies, stated that the new legislation requiring access to encrypted data would force them to cease operations in the country to protect user privacy. This move highlights the growing tension between tech companies and governments over encryption policies and the balance between security and privacy. Signal’s potential exit from Sweden underscores the significant impact such legislative changes could have on global digital communication and privacy rights.
Read more

VSCode Extensions with 9 Million Installs Pulled Over Security Risks

BleepingComputer by Bill Toulas
Several popular VSCode extensions, with a combined total of 9 million installs, have been removed from the marketplace due to severe security vulnerabilities. These extensions were found to pose risks that could potentially allow hackers to execute malicious code remotely on a user’s system. This incident highlights significant security concerns within the development tools ecosystem and emphasizes the importance of continuous vigilance in software updates and security auditing. Developers and users are urged to regularly review and update their extensions to safeguard against emerging cybersecurity threats.
Read more

With Millions of Victims, Scale of Info-Stealer Malware Laid Bare

The Register by Jessica Lyons
The scale of info-stealer malware’s impact has been laid bare, affecting millions of victims globally. This type of malware, which stealthily extracts sensitive data from users’ devices, has proven to be almost unstoppable due to its evolving nature and widespread distribution methods. The revelation underscores the persistent threat posed by these malicious programs and highlights the critical need for enhanced cybersecurity measures. Users and organizations are advised to strengthen their defenses by implementing robust security protocols and staying informed about the latest cybersecurity practices to mitigate the risk of data theft.
Read more

Karen Evans Steps Into a Leading Federal Cyber Position at CISA

CyberScoop by Tim Starks
Karen Evans has been appointed as the Executive Assistant Director for Cybersecurity at CISA, stepping into a pivotal federal role. With her extensive background in cybersecurity and government, Evans is well-prepared to steer national cybersecurity strategies during a time of increasing digital threats. Her leadership is expected to enhance CISA’s capabilities in protecting national infrastructure and improving cyber resilience across various sectors. This appointment underscores the emphasis on bolstering federal cybersecurity efforts to address both current and emerging challenges effectively.
Read more

US National Security Director Condemns UK Request for Apple Data ‘Backdoor’

The Guardian by Dara Kerr
The US national security director has strongly condemned the UK government’s request for Apple to implement a data ‘backdoor’, highlighting major privacy and cybersecurity risks. This demand could jeopardize the security of users worldwide by potentially allowing unauthorized access to sensitive personal and financial information. This critical stance reflects broader global concerns over balancing government surveillance with individual privacy rights. It underscores the urgent need for policies that protect user data while supporting legitimate national security efforts without compromising fundamental privacy principles.
Read more

Pump.fun X Account Hacked to Promote Scam Governance Token

BleepingComputer by Lawrence Abrams
The Pump.fun X account was recently compromised, sparking concerns over security on social media platforms where financial transactions are promoted. This breach led to the unauthorized promotion of a fraudulent governance token, exploiting platform vulnerabilities and potentially misleading investors. The incident highlights the critical need for robust security protocols and vigilant user education to prevent similar cybersecurity threats. It serves as a stark reminder for investors to rigorously verify the legitimacy of online investment opportunities and underscores the importance of implementing stringent digital safeguards to protect financial interactions on social media.
Read more

Bybit Declares War on North Korea’s Lazarus Crime-Ring to Regain $1.5B Stolen from Wallet

The Register by Iain Thomson
Bybit has declared a proactive stance against North Korea’s notorious Lazarus crime-ring following the theft of $1.5 billion from their digital wallet. This bold declaration marks a significant shift in how cryptocurrency exchanges are responding to cyber theft, especially those perpetrated by state-sponsored groups. Bybit’s commitment involves enhancing their security measures and collaborating with global cybersecurity experts to recover the stolen assets and prevent future incidents. This initiative reflects a growing trend among financial platforms to actively combat cyber threats and safeguard investor assets in the increasingly volatile digital currency landscape.
Read more

EncryptHub Breaches 618 Orgs to Deploy Info-Stealers, Ransomware

BleepingComputer by Bill Toulas
EncryptHub has been implicated in a major cybersecurity breach that impacted 618 organizations, leading to the deployment of ransomware and info-stealers across multiple sectors. This extensive breach demonstrates the vulnerabilities in digital security frameworks and the sophisticated tactics employed by cybercriminals to exploit them. The incident calls for an urgent reassessment of cybersecurity measures within affected organizations and emphasizes the necessity for continuous enhancement of defense strategies to combat the evolving landscape of cyber threats. It also highlights the importance of proactive threat detection and response protocols to mitigate the impact of such breaches.
Read more

A Major Cybersecurity Law Is Expiring Soon — Advocates Push Congress for Renewal

CyberScoop by Tim Starks
As a vital U.S. cybersecurity law approaches expiration, there is a concerted effort among advocates to secure its renewal. This legislation is foundational in fortifying national infrastructure against evolving cyber threats, enhancing public-private partnerships, and ensuring robust cyber defense mechanisms remain effective. The urgency to renew the law reflects concerns about the potential vulnerabilities that could emerge without it, emphasizing the necessity for up-to-date legal frameworks to adapt to rapidly advancing cyber tactics and maintain the United States’ leadership in cybersecurity resilience and innovation.
Read more

US Intelligence Head ‘Not Told’ About UK’s Secret Apple Data Demand

BBC by Zoe Kleinman
The head of US intelligence has publicly expressed concern over the UK’s covert request to Apple for a data ‘backdoor,’ which was not disclosed to US officials. This revelation has sparked significant international tension, highlighting the complexities of privacy, security, and transatlantic cooperation. The US intelligence leader emphasized the potential risks to global digital security and the importance of transparency in such requests, which could undermine trust among allies and jeopardize the privacy of countless users. This incident underscores the delicate balance required in government surveillance and the need for clear communication between nations on cybersecurity matters.
Read more

Fortanix Tackles Quantum Computing Threats With New Algorithms

Dark Reading by Agam Shah
Fortanix is addressing the looming threat of quantum computing to cybersecurity with innovative algorithms designed to withstand potential breaches. As quantum technology advances, traditional encryption methods are at risk of becoming obsolete, exposing critical data to new vulnerabilities. Fortanix’s proactive approach involves developing quantum-resistant algorithms that ensure data remains secure against future quantum decryption capabilities. This initiative not only highlights the importance of forward-thinking in cybersecurity but also positions Fortanix as a leader in preparing for the next generation of cyber challenges.
Read more

UPDATE: Federal Court Issues Injunction Against DOGE Based on Popular Information Report

Popular Information by Judd Legum
A federal court has issued an injunction against DOGE following a report by Popular Information, which highlighted significant regulatory concerns. This legal action reflects growing scrutiny over digital currencies and their compliance with financial regulations. The court’s decision to halt certain activities of DOGE underscores the challenges facing cryptocurrency projects in navigating the complex landscape of financial laws. This development serves as a critical reminder of the importance of regulatory compliance for cryptocurrencies and may set a precedent for how similar cases are handled in the future.
Read more

AI Tricksters Spin Up Fake DeepSeek Sites to Steal Crypto

Dark Reading by Kristina Beek
Artificial intelligence is being exploited by cybercriminals to create highly convincing fake websites that mimic the cryptocurrency analysis tool, DeepSeek. These fraudulent sites are meticulously crafted to dupe cryptocurrency enthusiasts into divulging personal and financial information, resulting in significant financial losses. This trend of AI-facilitated scams highlights a disturbing evolution in cyber fraud, signalling an urgent need for the crypto community to bolster their defences. Enhanced security protocols and heightened user education are essential to counteract the sophisticated tactics employed by these digital swindlers.
Read more

Lockbit Taunts FBI Director Kash Patel with Alleged ‘Classified’ Leak Threat

Security Affairs by Pierluigi Paganini
The Lockbit ransomware group has dramatically escalated its cyber threats by publicly targeting Kash Patel, the FBI Director, with a bold threat to leak “classified” information. This audacious move signals a significant evolution in ransomware tactics, shifting from broad-scale data extortion to directly confronting and challenging national security officials. The incident not only exposes the brazen confidence of cybercriminals but also underscores the urgent need for national security entities to enhance their defensive and responsive strategies against such politically charged cyber threats.
Read more

Xi know what you did last summer: China was all up in Republicans’ email, says book

The Register by Jessica Lyons
A startling revelation indicates that Chinese cyber espionage efforts have targeted the email communications of Republican figures, as detailed in a recent publication. This exposure not only highlights the deep reach of state-sponsored cyber operations but also raises significant concerns about the security of political communications in the U.S. The situation calls for an urgent reassessment of cybersecurity measures within political entities to safeguard sensitive communications from foreign interference, emphasising the need for robust, updated defence mechanisms in the ever-evolving landscape of global cyber warfare.
Read more

China’s Silver Fox Spoofs Medical Imaging Apps to Hijack Patients’ Computers

The Register by Jessica Lyons
Chinese cyber operators are now targeting medical imaging applications to hijack patients’ computers. This sophisticated attack not only compromises sensitive patient data but also exposes the vulnerability of healthcare systems to cyber espionage. By masquerading as legitimate medical software, Silver Fox disrupts healthcare operations and accesses confidential health records, highlighting a critical need for strengthened cybersecurity measures in medical institutions. This incident urges healthcare providers to enhance their digital defenses and implement more rigorous security protocols to protect patient information from such malicious intrusions.
Read more

Attackers Exploiting Cisco Vulnerabilities Tied to Salt Typhoon Campaign

Cybersecurity Dive by Rob Wright
The recent discovery of attackers exploiting critical vulnerabilities in Cisco products marks a significant escalation in the Salt Typhoon campaign. This sophisticated cyber operation targets essential network infrastructure, highlighting glaring security gaps that could jeopardise entire networks. The attacks not only exploit these vulnerabilities to gain unauthorised access but also pose severe risks to data integrity and operational continuity for businesses globally. This situation underscores the urgent necessity for organizations to swiftly apply security patches and adopt comprehensive cybersecurity strategies to mitigate potential damages from such pervasive and aggressive cyber threats.
Read more

Purging cyber review board was ‘a great idea,’ DHS deputy secretary nominee says

CyberScoop by Matt Bracken
The recent endorsement by a DHS deputy secretary nominee of the decision to purge the Cyber Review Board has sparked significant discussion within the cybersecurity community. This controversial stance suggests a shift towards streamlining cybersecurity governance, which some argue might sacrifice thorough oversight for efficiency. Advocates for the purge believe it will lead to more direct and agile responses to cyber threats, while critics warn that it could undermine comprehensive policy-making and weaken the nation’s cyber defences. This development calls for a balanced approach that ensures robust security without stifling innovation.
Read more

LightSpy Expands to 100+ Commands, Increasing Control Over Multiple Platforms

The Hacker News by Ravie Lakshmanan
The malware LightSpy has notably expanded its capabilities, now boasting over 100 commands that enable it to exert unprecedented control over infected devices across multiple platforms including Windows, macOS, Linux, and mobile. This enhancement significantly increases the threat level posed by LightSpy, allowing cybercriminals to execute a wider range of malicious activities, from data theft to surveillance. The evolution of LightSpy illustrates the growing sophistication of malware tools and underscores the urgent need for cross-platform security solutions to protect against versatile and adaptive cyber threats.
Read more

Palo Alto Networks Warns Hackers Attempting to Exploit a File Read Flaw in Firewalls

Cybersecurity Dive by David Jones
Palo Alto Networks has issued a critical warning about active exploitation attempts targeting a file read flaw in their firewall products. This vulnerability, if exploited, allows attackers to access sensitive data, potentially leading to further network compromises. The alert underscores the importance of immediate patching and heightened vigilance among network administrators to prevent unauthorised access. This incident serves as a stark reminder of the continuous threats facing network security infrastructure and the need for ongoing proactive measures to defend against sophisticated cyber attacks.
Read more

Concerns Over Apple’s UK iCloud Encryption Deactivation

ISMG Data Breach Today by Akshaya Asokan
Apple’s recent deactivation of iCloud’s end-to-end encryption, prompted by UK government demands, has been sharply criticised as “digitally illiterate” by Signal’s Meredith Whittaker. This decision is feared to undermine global cybersecurity, potentially affecting anyone globally who communicates with UK users. Experts warn that the UK could now effectively set a “security cap” for users worldwide, compromising digital security unknowingly. In reaction, cybersecurity expert Josh Moore has started a Change.org petition to uphold digital rights, which could lead to parliamentary debate if it reaches significant support levels.
Read more

ANALYSIS

Betting (and Losing) the Farm on Traditional Cybersecurity

Dark Reading by Maxime Lamothe-Brassard
Relying solely on traditional cybersecurity methods increasingly exposes businesses to significant vulnerabilities as cyber threats evolve. These outdated defences often fall short, leaving organisations at risk from more sophisticated cyber attacks. The pressing need for a more adaptive and proactive cybersecurity approach is evident, emphasising the integration of innovative technologies and strategies. This shift is crucial for organizations aiming to protect their digital assets effectively in a landscape where cyber risks are constantly changing, urging companies to overhaul their cybersecurity frameworks to stay ahead of threats.
Read more

Navigating a Tightening Cybersecurity Jobs Market

Forbes by Chris Dimitriadis
The cybersecurity jobs market is tightening, reflecting a growing mismatch between the supply of qualified professionals and the escalating demand for cybersecurity expertise. Organisations are now facing significant challenges in recruiting and retaining skilled personnel amid rising cyber threats. This shift necessitates not only reevaluating compensation packages but also enhancing training and development programs to attract and cultivate talent. Emphasising career development and job satisfaction could be crucial for companies aiming to secure their digital environments in this competitive landscape.
Read more

The Perfect Storm: How Could $1.4 Billion of Crypto Vanish?

PrivID (Substack)
The disappearance of $1.4 billion in cryptocurrency has created a perfect storm in the financial technology sector, exposing significant vulnerabilities within crypto exchanges and digital wallets. This incident highlights the intricate challenges of ensuring security in the largely unregulated and highly technical field of cryptocurrency. It underscores the urgent need for enhanced regulatory frameworks and advanced security measures to prevent similar incidents. As the industry grapples with these issues, stakeholders are called to prioritize transparency and strengthen cybersecurity practices to restore and maintain trust among investors.
Read more

Understanding MFA Fatigue: Why Cybercriminals Are Exploiting Human Behaviour

IT Security Guru by Kirsten Doyle
MFA fatigue is becoming a tool for cybercriminals who exploit human tendencies to bypass authentication. This involves tricking users into security lapses by exploiting their response to frequent prompts, leading to complacency. The issue underscores the need for organizations to intensify user education and enhance security protocols. By adapting to the evolving tactics of cybercriminals who leverage such human vulnerabilities, companies can better protect sensitive information. Strengthening defenses against these subtle attacks is critical in maintaining robust digital security.
Read more

Cybersecurity Risks Organizations Need to Address This Year

Security Magazine by Tim Eades
As organizations navigate through increasingly complex digital landscapes, identifying and addressing specific cybersecurity risks has never been more critical. This year, the focus shifts towards combating emerging threats that capitalise on new technologies and the expanded digital footprint of remote work. Proactive measures, including advanced threat detection systems and enhanced security protocols, are vital. Additionally, training employees to recognise phishing attempts and securing end-point devices are essential steps to mitigate risks. Organizations must stay agile, continuously updating their cybersecurity strategies to protect against the ever-evolving cyber threats.
Read more


February Feature: Securing Tomorrow: Shaping a Safer Internet Together

Safer Internet Day: The Business Model of Cyber Attacks in the Digital Era

By Saba Bagheri
Reflecting on this year’s Safer Internet Day, CyAN APAC Director Saba Bagheri delves into the evolving landscape of cyber-attacks in our increasingly digital world. Saba analyses how organized cybercrime groups have sophisticatedly adapted, utilising advanced technologies to exploit cybersecurity vulnerabilities effectively. She emphasises the urgent need for robust defensive strategies, advocating for relentless innovation in cybersecurity measures and a significant increase in user awareness. Her comprehensive insights stress the importance of a proactive approach in protecting digital infrastructures and personal data. By highlighting these ongoing challenges and solutions, Saba Bagheri calls for a united effort to shape a safer internet, ensuring it remains a secure environment for future generations.
Read more

The Industry Speaks: Safer Internet Day 2025

Cyber Daily by David Hollingworth
As part of the Safer Internet Day 2025 campaign, this article underscores the pivotal role of employees in organisational cybersecurity. It discusses the significance of regular cybersecurity training, emphasising how informed employees can act as the first line of defence against phishing, malware, and social engineering attacks. Practical measures, such as interactive training sessions and robust access controls, are presented as key strategies to create a safer internet for all. The piece ties the Safer Internet Day theme to the importance of fostering cyber awareness at every level of an organisation. By equipping employees with the knowledge and tools to navigate online risks, businesses contribute to a global culture of responsibility and safety.
Read more

Until Tech Companies Are Held Accountable, Parents Must Take Lead in Ensuring Safe Online Environments for Their Children

News Tech by Alex Cooney
This article emphasises the crucial role parents play in safeguarding their children’s online experiences, especially as legislation to hold tech companies accountable is still pending. A report from CyberSafeKids reveals that 82% of children aged 8-12 have unsupervised access to smart devices in their bedrooms, underscoring the need for increased parental engagement. The piece offers practical recommendations, such as initiating regular conversations about online activities, monitoring device usage, and establishing clear digital rules.
Read more

Safer Internet Day 2025: Tackling Abusive AI-Generated Content Risks Through Education and Empowerment

Microsoft Post by Courtney Gregoire
In light of Safer Internet Day 2025, Microsoft addresses the rising concerns over AI-generated content misuse. Their research indicates a global increase in AI usage, with 51% of individuals having used AI tools, up from 39% in 2023. However, 88% express concerns about generative AI. To combat potential abuses, Microsoft has partnered with Childnet to develop educational materials aimed at preventing the misuse of AI, including the creation of deepfakes. These resources are designed to equip schools and families with the knowledge to protect children from online risks associated with AI.
Read more

Worldwide Celebrations for Safer Internet Day 2025

European Union News
Celebrated on February 11, 2025, the 22nd edition of Safer Internet Day saw worldwide participation under the theme “Together for a Better Internet.” The event introduced “Ally,” a new mascot symbolising a tech-savvy companion for young digital users. Additionally, the AdWiseOnline campaign, “Play Smart, Spend Wisely – Mind the Hidden Costs,” was launched to educate young gamers about their rights and the recognition of manipulative in-game marketing tactics. The campaign reached over 250,000 parents and educators, emphasising the collective effort required to create a safer digital environment.
Read more

How We’re Working to Keep Students Safe in the AI Age

Google for Education by Jennifer Holland
In observance of Safer Internet Day 2025, Google for Education highlights its dedication to fostering safe and enriching learning environments amidst the rise of AI technologies. The initiative focuses on collaborating with educators, families, and students to navigate the challenges posed by generative AI. Emphasis is placed on media literacy, responsible AI usage, and overall well-being in both school and home settings, ensuring that students are equipped with the necessary tools and knowledge to thrive safely in the digital age.
Read more

Safer Internet Day 2025: Best Practices for Businesses and Individuals

57Network by Shahirah Abdul Aziz
Small and medium-sized enterprises (SMEs) are increasingly targeted by cybercriminals due to perceived vulnerabilities. This article emphasises the need for SMEs to prioritise cybersecurity. It highlights practical steps like educating employees on safe online practices, implementing access controls, and creating incident response plans to ensure a safer internet for businesses and their customers. The article draws attention to the global message of Safer Internet Day, calling for collective action in fostering a secure online environment.
Read more

CyAN Members: Op Eds, Articles, etc:

Beyond Active Directory: The Next Step in SMB IAM Security

By Fel Gayanilo
CyAN General Secretary Fel Gayanilo discusses the evolution of identity and access management (IAM) in small to medium-sized businesses (SMBs) beyond traditional Active Directory frameworks. In his analysis, Fel highlights the emerging technologies and strategies that enhance IAM security, addressing the unique challenges faced by SMBs. Fel advocates for adaptive security measures that integrate advanced authentication mechanisms and user behaviour analytics to protect against increasingly sophisticated cyber threats. His insights emphasise the importance of evolving SMB security practices to safeguard sensitive data in a dynamic digital landscape.
Read more

CyAN Member News:

CyAN Board Member Bharat Raigangar Named Juror for 2025 SCCS & TPRM Europe Awards

CyAN Board Member and a highly accomplished leader in cybersecurity, fraud management, and risk governance, Bharat Raigangar has been selected as an esteemed juror for the 2025 SCCS & TPRM Europe Awards. These prestigious awards honour the leaders, teams, and solutions driving meaningful change in cyber resilience, risk management, and compliance. Winners will be celebrated at an exclusive networking dinner on April 10, 2025, in Lisbon.

CyAN Spotlight: FIDES Rating Nominated for RegTech Insight Awards 2025

Great news from our community! FIDES Rating, our AI-based SaaS solution for regulatory compliance, is shortlisted for the RegTech Insight Awards Europe 2025 under Best AI Solution for Regulatory Compliance. This nomination celebrates our commitment to transforming compliance with AI, enhancing efficiency and insights across regulations like DORA, NIS2, GDPR, and the AI Act. Vote for Innovation! Support FIDES in category #37 to help advance AI-driven compliance. Your vote matters!

CyAN Member Fatema Fardan Joins BIBF as a Lecturer

We at CyAN are ALWAYS overjoyed to celebrate our members’ successes and their contributions to the cybersecurity community!

With that in mind, please join us in congratulating our valued member Fatema Fardan on her new role as a Part-time Lecturer at the Bahrain Institute of Banking and Finance (BIBF)!

Starting her career in Bahrain’s banking sector as a student in their management associates program, she now returns with an impressive 16 years of experience in cybersecurity and finance. She is eager to inspire future leaders and contribute to the development of the next wave of talent in Bahrain’s financial sector.
Read more

CyAN Member Tulin Sevgin Joins the Board of Working Spirit

We’re thrilled to share that CyAN member Tulin Sevgin is starting a new chapter as a Non-Executive Board Member at Working Spirit, a charity that connects Australian military veterans with corporate career opportunities. Tulin’s extensive experience and dynamic enthusiasm have enriched our CyAN board, and we’re excited for her to bring these qualities to an organisation that plays a crucial role in supporting veterans. We are confident that Tulin will greatly contribute to Working Spirit’s growth and continued success in making a meaningful impact.
Read more

Upcoming CyAN (and CyAN Partner) Global Events

  • Breaking the Cycle: Combating Online IBSA for a Safer Digital Experience – March 6th (EST 6AM, CET 12PM, AEST 10PM)
    Register here
  • CyAN APAC: The Geopolitical Impacts of Cyber Threats – March 12, Peoplebank, Sydney
    Register here
  • Trust & Safety Forum at Forum INCYBER Europe (FIC), Lille, France – April 1-2
    Learn more
  • GITEX AFRICA, Marrakesh, Morocco – April 14-16
    Learn more
  • GITEX ASIA, Singapore (Marina Bay Sands) – April 23-25
    Learn more
  • GISEC, Dubai World Trade Center, UAE – May 6-8
    Learn more
  • The Cyber Outstanding Security Performance Awards (Cyber OSPAs), London, UK – May 8
    Learn more
  • World AI Technology Expo UAE, Dubai, UAE – May 14-15
    Learn more
  • MaTeCC: Rabat, Morocco – June 7-9, 2025
    (The third annual North Africa and beyond cybersecurity event, hosted by CyAN partner organisation École High-Tech.)
    Learn more

📄 Download the full issue of CyAN Cyber (In)Securities Issue 12
Click here to view the PDF

Cyber (In)Securities – Issue 127

Flaw found in stalkerware apps, exposing millions of people. Here’s how to find out if your phone is being spied uponBitdefender by Graham Cluley A significant security flaw discovered in stalkerware apps has exposed millions to potential spying, significantly compromising user privacy. This vulnerability allows 

Cyber (In)Securities – Issue 126

Information Security News Ghost Ransomware Targets Orgs in 70+ CountriesDark Reading by Elizabeth MontalbanoGhost ransomware continues to pose a significant threat globally, now targeting organisations in over 70 countries. This ransomware variant is particularly insidious due to its ability to encrypt data swiftly and demand 

Cyber (In)Securities – Issue 125

Information Security News

Joint Letter on the UK Government’s use of Investigatory Powers Act to attack End-to-End Encryption
Global Encryption Coalition by Ryan Polk


The Global Encryption Coalition is actively opposing the UK government’s utilisation of the Investigatory Powers Act to erode end-to-end encryption, asserting that this undermines both personal privacy and national security. An open letter, which is soliciting public signatures until February 20th, has been circulated to garner widespread support against this legislative action. The coalition is urging stakeholders from all sectors to join this campaign, emphasising the critical role of strong encryption in safeguarding secure communications and protecting digital rights against intrusive surveillance.
Read more

US lawmakers press Trump admin to oppose UK’s order for Apple iCloud backdoor
The Register by Brandon Vigliarolo


In a significant stance for digital privacy, US lawmakers are pushing back against the UK’s request for Apple to create a backdoor into its iCloud services. They argue that complying with this demand would compromise user privacy and set a dangerous precedent that could impact global digital security standards. The opposition from US lawmakers underscores the ongoing international debate over encryption and government surveillance, highlighting the delicate balance between ensuring national security and upholding individual privacy rights. They urge a reevaluation of such demands to prevent potential overreach and ensure the protection of digital liberties.
Read more

Rape under wraps: how Tinder, Hinge and their corporate owner chose profits over safety
The Guardian by Elena Dugdale


A detailed investigative report by The Guardian has unveiled significant safety failures by Tinder and Hinge, exposing how their corporate owner has consistently prioritised profit over user safety, especially in addressing incidents of rape connected to their platforms. This serious oversight has led to widespread outrage and urgent calls for reform in the online dating industry. The report underscores the critical need for immediate implementation of stricter safety measures and regulatory oversight. It advocates for a major overhaul of safety protocols on dating platforms to better protect users from potential harm and to hold companies accountable for their safety practices, thereby ensuring a safer online environment for dating app users.
Read more

The Rise of Cyber Espionage: UAV and C-UAV Technologies as Targets
Security Affairs by Pierluigi Paganini


Unmanned Aerial Vehicles (UAVs) and Counter-Unmanned Aerial Vehicle (C-UAV) systems, pivotal for national defense and commercial industries, are facing an uptick in cyber espionage activities. These advanced technologies, integral to modern warfare and surveillance, have become prime targets for state-sponsored cyberattacks aimed at stealing sensitive data or causing operational disruptions. The growing prevalence of such espionage underscores the urgent need for nations to enhance cybersecurity measures around UAVs, encourage international cooperation on cyber defense strategies, and implement robust protocols to protect these critical technologies from foreign interference, ensuring operational security and technological integrity.
Read more

US Coast Guard Urged to Strengthen Cybersecurity Amid $2B Daily Port Risk
Tripwire by Graham Cluley


In light of increasing cyber threats targeting critical infrastructure, the US Coast Guard is urgently called to strengthen its cybersecurity frameworks. Given the agency’s role in securing ports through which goods worth over $2 billion transit daily, enhancing cyber defences is not just beneficial but essential. The necessity for these improvements comes amid reports of potential vulnerabilities that could be exploited to disrupt commercial and security operations at maritime points. Industry experts are advocating for significant investments in cybersecurity, including updated technologies and training, comprehensive threat assessments, and stronger collaborative measures with other national security agencies to safeguard against the sophisticated nature of current cyber threats.
Read more

North Korea targets crypto developers via NPM supply chain attack
The Register by Connor Jones


In a significant revelation, North Korea has been implicated in a series of cyberattacks targeting cryptocurrency developers through the NPM package manager. This method involves inserting malicious code into software dependencies, which can compromise security and steal sensitive information. These attacks not only demonstrate North Korea’s growing sophistication in cyber warfare but also highlight the vulnerabilities inherent in the software development supply chain. The international community is urged to take immediate action by implementing stricter security protocols for software development, enhancing monitoring mechanisms, and fostering collaboration between nations to counter the risks posed by such state-sponsored cyber activities.
Read more

US woman faces years in federal prison for running laptop farm for N Korean IT workers
Bitdefender by Graham Cluley


A US woman is currently facing federal prison for setting up a ‘laptop farm’ allegedly used to provide illicit technological support to North Korean IT workers, breaching international sanctions. This case underscores significant risks in cybersecurity and international relations, highlighting how individuals can contribute to global security threats through seemingly benign activities. It serves as a stark reminder of the importance of stringent enforcement of cybersecurity laws and international sanctions, ensuring that individuals and companies adhere to global norms and prevent the facilitation of unauthorised state-sponsored cyber operations.
Read more

Japan Goes on Offense With New ‘Active Cyber Defense’ Bill
Dark Reading by Nate Nelson


Japan is taking bold steps to bolster its cybersecurity stance with the proposed ‘Active Cyber Defense’ bill, allowing preemptive measures against imminent cyber threats. This legislative effort reflects a strategic pivot towards a more aggressive defense posture in cyberspace, aimed at thwarting cyberattacks before they can cause harm. The move is part of a larger national security strategy to protect critical digital infrastructure and sensitive data from increasingly sophisticated cyber threats posed by rival nations. With this proactive approach, Japan seeks to set a precedent for cybersecurity, emphasising the need for dynamic defensive capabilities and international cooperation in an era where digital threats are rapidly evolving.
Read more

zkLend loses $9.5M in crypto heist, asks hacker to return 90%
BleepingComputer by Lawrence Abrams


In a daring crypto heist, zkLend lost $9.5 million, leading the platform to unusually request the hacker to return 90% of the stolen funds. This incident spotlights the persistent vulnerabilities within cryptocurrency platforms and the unconventional methods entities might resort to when attempting to mitigate losses. The episode has sparked a broader discussion in the crypto community about the security of decentralised finance (DeFi) platforms, the ethical implications of negotiating with cybercriminals, and the need for more stringent regulatory and security measures to protect investors and maintain the integrity of the crypto market.
Read more

Hacker leaks account data of 12 million Zacks Investment users
BleepingComputer by Bill Toulas


A massive data breach at Zacks Investment resulted in the leak of personal account data for 12 million users, exposing them to potential financial and identity theft risks. This breach underscores the continuing challenges financial institutions face in safeguarding sensitive customer information against increasingly sophisticated cyber attacks. The incident has prompted calls for enhanced cybersecurity protocols, including more robust data encryption and real-time monitoring systems, to prevent future breaches and to bolster consumer confidence in the digital security measures of financial services.
Read more

RA World Ransomware Attack in South Asia Links to Chinese Espionage Toolset
The Hacker News by Ravie Lakshmanan


The RA World ransomware attack in South Asia has been linked to a toolset commonly used in Chinese espionage, suggesting a state-sponsored origin. This connection illuminates the dual-use nature of cyber tools in espionage and commercial cybercrime, highlighting significant geopolitical cybersecurity concerns. The attack not only disrupted numerous systems but also pointed to the intricate ways in which national security and cybercrime intersect. This event calls for a global reevaluation of cyber defense strategies, emphasising the need for international collaboration to address the multifaceted threats posed by state-affiliated cyber actors.
Read more

Trump to nominate Sean Cairncross as national cyber director
Cybersecurity Dive by David Jones


In a significant political move, former President Trump announced the nomination of Sean Cairncross as national cyber director, signalling a strategic focus on strengthening national cybersecurity infrastructure. Cairncross, known for his previous governmental roles, is expected to bring a robust approach to coordinating cyber defense across federal agencies. His nomination comes at a time when the U.S. faces escalating cyber threats, highlighting the administration’s commitment to bolstering cyber resilience and protecting critical information infrastructure from both domestic and foreign cyber threats.
Read more

CISA Places Election Security Staffers on Leave
Dark Reading by Kristina Beek


As the 2025 election approaches, the Cybersecurity and Infrastructure Security Agency (CISA) has controversially placed several key election security staffers on leave. This move has sparked widespread concern among cybersecurity experts and lawmakers alike, who fear it could undermine the integrity of the upcoming elections. Critics argue that the timing and lack of transparency surrounding these decisions may leave the nation’s election infrastructure vulnerable to cyberattacks, thereby threatening the democratic process. Calls are intensifying for immediate reinstatement of the staff and assurances that election security remains a top priority, emphasising the need for robust, uninterrupted protection against potential threats.
Read more

Probe finds US Coast Guard has left maritime cybersecurity adrift
The Register by Jessica Lyons


A recent investigation has revealed significant cybersecurity lapses within the US Coast Guard, raising alarms over the potential vulnerability of the United States’ maritime sector to cyber threats. The probe highlights a lack of adequate security measures and preparedness against cyberattacks that could jeopardise critical maritime operations and national security. The findings have prompted urgent calls for comprehensive updates to cybersecurity protocols and for increased funding to bolster the Coast Guard’s capacity to defend against sophisticated cyber threats. Stakeholders are urging swift action to shore up defences and ensure the safety of the maritime transport system.
Read more

Triplestrength hits victims with triple trouble: Ransomware, cloud hijacks, crypto-mining
The Register by Jessica Lyons


Triplestrength, a new malicious cyber operation, is wreaking havoc by simultaneously deploying ransomware, hijacking cloud services, and engaging in unauthorised crypto-mining. This multifaceted attack not only encrypts victim data but also commandeers cloud resources and utilises them for mining cryptocurrencies, significantly amplifying the operational and financial impact on affected organisations. The complexity and scope of these attacks underscore a growing trend of cybercriminals leveraging compound strategies to maximise their gains. Cybersecurity experts are calling for a layered defence strategy and heightened vigilance among organisations to detect and mitigate such sophisticated threats.
Read more

Bipartisan Senate bill would strengthen cybercrime penalties
Cyberscoop by Matt Bracken


A bipartisan effort in the US Senate has introduced a bill aimed at significantly strengthening penalties for cybercrimes, reflecting growing legislative focus on combatting cyber threats more aggressively. This bill proposes enhancements to existing laws, including tougher sentences for hackers and more substantial fines for cybercriminal enterprises. The move is seen as a response to the increasing frequency and severity of cyber attacks on national infrastructure and private entities, highlighting the need for a more robust legal framework to deter cybercriminals and protect citizens and businesses from cyber threats.
Read more

Cybersecurity experts fear Elon Musk’s DOGE may enable quantum hackers
NewScientist by Matthew Sparkes


Concerns are mounting among cybersecurity experts that the cryptocurrency DOGE, promoted by Elon Musk, could potentially be vulnerable to quantum hacking due to its cryptographic algorithms. As quantum computing advances, the fear is that these technologies could break traditional encryption methods used by cryptocurrencies, including DOGE. This vulnerability could expose users to unprecedented risks, including theft of funds and breach of transaction privacy. Experts are urging a reevaluation of cryptographic standards in cryptocurrencies to ensure they can withstand the potential future capabilities of quantum computing, thereby safeguarding investments and maintaining the security of digital financial transactions.
Read more

Russian military hackers deploy malicious Windows activators in Ukraine
BleepingComputer by Sergiu Gatlan


Russian military operatives have escalated their cyber warfare tactics by deploying malicious Windows activators in Ukraine, aiming to compromise government and critical infrastructure systems. These activators, which masquerade as legitimate software tools, are in fact laced with malware designed to infiltrate, disrupt, and spy on Ukrainian digital networks. This strategy not only undermines Ukraine’s cybersecurity but also poses a significant threat to the integrity of its national data and operational security. The international cybersecurity community is called upon to support Ukraine in enhancing its defences and to work on developing more robust mechanisms to detect and neutralise such covert cyber threats.
Read more

Adobe Plugs 45 Software Security Holes, Warns of Code Execution Risks
SecurityWeek by Ryan Naraine


Adobe has released a critical update to address 45 vulnerabilities across its range of software, which were found to potentially allow malicious code execution if exploited. This sweeping security update underscores the ongoing risks associated with software vulnerabilities and highlights the necessity for continuous vigilance by users and organisations alike. Adobe urges all users to update their software promptly to mitigate the risks of unauthorised access or data breaches. The move also prompts a broader discussion in the tech community about the importance of regular software maintenance and the implementation of proactive security measures to protect against increasingly sophisticated cyber threats.
Read more

SonicWall firewall exploit lets hackers hijack VPN sessions, patch now
BleepingComputer by Bill Toulas


A significant vulnerability has been discovered in SonicWall’s firewall appliances that could allow hackers to hijack VPN sessions and gain unauthorised access to private networks. The exploit, which affects several models of SonicWall’s hardware, has prompted urgent advisories for organisations to apply the latest patches to avoid potential security breaches. This incident raises concerns about the security of network infrastructure and the critical importance of maintaining up-to-date system patches to defend against sophisticated attacks that target core communication tools like VPNs.
Read more

Microsoft Patches ‘Wormable’ Windows Flaw and File-Deleting Zero-Day
SecurityWeek by Ryan Naraine
Microsoft has responded swiftly to patch a ‘wormable’ flaw in Windows that could allow rapid malware spread across networks, along with a zero-day vulnerability that enables unauthorised file deletion. These patches are part of Microsoft’s latest security efforts to tighten system defences and prevent potential widespread damage. The seriousness of these vulnerabilities, particularly the wormable flaw, highlights the continuous arms race in cybersecurity and the need for persistent updates and user awareness to safeguard personal and organisational data from evolving cyber threats.
Read more

Threat Actors Exploit ClickFix to Deploy NetSupport RAT in Latest Cyber Attacks
The Hacker News by Ravie Lakshmanan


Threat actors are exploiting a software vulnerability in ClickFix to deploy the NetSupport Remote Access Trojan (RAT), marking a significant escalation in cyber-attack complexity. This tactic allows hackers to gain control over victims’ systems, enabling data theft, surveillance, and further malicious activities. The use of ClickFix, a widely used utility tool, as a conduit for such attacks highlights the need for robust endpoint security and user education to identify and mitigate threats from seemingly innocuous software applications. Cybersecurity professionals emphasise the importance of comprehensive security strategies that include regular software audits and updates to combat such versatile cyber threats.
Read more

OpenAI Finds No Evidence of Breach After Hacker Offers to Sell 20 Million Credentials
SecurityWeek by Eduard Kovacs


In a recent security scare, a hacker claimed to have access to 20 million user credentials from OpenAI services. However, after thorough investigations, OpenAI announced that they found no evidence of a data breach, attributing the claim possibly to previously compromised data from other sources. This incident has heightened awareness around data security, prompting OpenAI to reassure users of their stringent security measures and encourage stronger password practices and multi-factor authentication. It also serves as a reminder for all organisations to continually assess and update their security protocols to protect against evolving cyber threats.
Read more

iOS 18.3.1 patches an ‘extremely sophisticated attack’ – and more
ZDNet by Adrian Kingsley-Hughes


Apple has released an update for iOS 18.3.1, patching what it describes as an ‘extremely sophisticated attack’ that could have compromised user data. This patch addresses a critical vulnerability that allowed attackers to execute arbitrary code on devices without user interaction. The swift response by Apple highlights the ongoing arms race between technology companies and cybercriminals, underscoring the importance of regular software updates in maintaining security and user trust. Apple’s proactive measures are crucial in defending against these sophisticated attacks that target personal and corporate data.
Read more

Medibank link emerges in multi-country action against ZServers
itNews by Eleanor Dickinson


In a coordinated multi-country law enforcement effort, significant ties have been uncovered between Medibank and the notorious ZServers hosting service, known for facilitating Lockbit ransomware attacks. This revelation points to broader cybersecurity vulnerabilities within corporate networks that could be exploited by ransomware syndicates. The international crackdown reflects a growing trend of cross-border collaborations to combat cybercrime, emphasising the need for enhanced security measures and greater transparency in corporate IT environments to prevent such vulnerabilities from being exploited.
Read more

VeraCore zero-day vulnerabilities exploited in supply chain attacks
Cybersecurity Dive by Rob Wright


Recent discoveries have revealed that VeraCore’s software contains zero-day vulnerabilities that have been actively exploited in several supply chain attacks. These vulnerabilities allowed attackers to infiltrate logistics networks, causing widespread disruption and highlighting significant risks in supply chain security. The incident has prompted urgent calls for software vendors to prioritise the security of their products by implementing comprehensive vulnerability management programs and for businesses to conduct regular security assessments to mitigate the risk of similar attacks affecting their operations.
Read more

Australia, US, UK target ZServers over Lockbit ransomware attacks
itNews


In a significant international law enforcement effort, agencies from Australia, the US, and the UK have coordinated to target Zservers, a notorious platform known for facilitating Lockbit ransomware attacks. This joint operation reflects a robust global stance against cybercriminals who leverage ransomware to disrupt and extort businesses and government agencies worldwide. By dismantling a key node in the ransomware ecosystem, this collaborative action aims to disrupt the operations of cybercriminals significantly, enhance global cybersecurity resilience, and set a precedent for future international cooperation against digital threats.
Read more

ANALYSIS

How Public & Private Sectors Can Better Align Cyber Defense
Dark Reading by Chris Henderson


The necessity for improved alignment between public and private sectors in cyber defense strategies is becoming increasingly critical as cyber threats evolve. This article explores this topic, advocating for a more integrated approach where governmental agencies and private companies share intelligence, tools, and strategies to combat cyber threats effectively. It goes on to suggest establishing formal frameworks and partnerships that facilitate real-time data exchange and collaborative response mechanisms. Such integration is intended to enhance the overall security posture of both sectors, enabling more agile and effective responses to cyber incidents and reducing the impact of breaches.
Read more

3 Ways Nonprofits Can Strengthen Their Cybersecurity in 2025
Biz Tech by Matt Morgan


As nonprofits become increasingly reliant on digital technologies, ‘Biz Tech’ outlines three strategic ways these organisations can enhance their cybersecurity in 2025. First, adopting a tailored cybersecurity framework that addresses specific vulnerabilities unique to the nonprofit sector. Second, investing in comprehensive staff training to recognise and respond to cyber threats proactively. Third, forming partnerships with technology firms to access cutting-edge security tools at reduced costs. These measures are crucial for safeguarding sensitive data, maintaining donor trust, and ensuring the continuity of services amidst a landscape of escalating cyber risks.
Read more

Top cybersecurity trends to watch in 2025
JP Morgan


JP Morgan’s report on the top cybersecurity trends for 2025 provides crucial insights for organisations aiming to stay ahead of emerging threats. Highlighting the integration of artificial intelligence in threat detection and response, the expansion of data privacy regulations, and the adoption of zero-trust security architectures, the report emphasises the need for businesses to adapt swiftly. These trends are expected to define the cybersecurity landscape, necessitating strategic adjustments in corporate security policies and IT infrastructures to mitigate risks and comply with new regulatory requirements effectively.
Read more

WTF? Why the cybersecurity sector is overrun with acronyms
CSO Australia by Lee-Anne Goodman


CSO Australia critically examines the pervasive use of acronyms within the cybersecurity sector, arguing that this jargon complicates communication and can alienate newcomers or non-specialists. The article calls for a paradigm shift towards clearer, more accessible language that facilitates understanding and collaboration across diverse stakeholders. By standardising terminology and simplifying explanations, the cybersecurity community can enhance operational efficiency, improve stakeholder engagement, and foster a more inclusive environment that attracts a broader range of talent and expertise.
Read more

How fake security reports are swamping open-source projects, thanks to AI
ZDNet by Steven Vaughan-Nichols


ZDNet explores a troubling trend where artificial intelligence is being used to generate fake security reports, overwhelming open-source projects with fraudulent vulnerability claims. Steven Vaughan-Nichols details how these AI-generated reports, which often appear technically plausible, can deceive project maintainers, leading to unnecessary alarms and wasted resources. This surge in fake reports not only strains the open-source community but also risks undermining trust in genuine security warnings. The article calls for enhanced verification processes and AI detection tools to combat this new form of cyber deception, urging the community to develop strategies to distinguish between legitimate and AI-generated reports to maintain the integrity of open-source software development.
Read more

Protecting Your Software Supply Chain: Assessing the Risks Before Deployment
The Hacker News


The importance of securing the software supply chain has never been more critical, as highlighted in a comprehensive analysis by The Hacker News. This article details strategies for assessing and mitigating risks before software deployment, emphasising the need for rigorous security audits and vulnerability assessments throughout the development lifecycle. By integrating these practices, companies can prevent the infiltration of malicious code and unauthorised access, safeguarding their operations from the ground up. The piece advocates for a holistic approach, combining technology solutions with staff training and robust policy frameworks to create a resilient defense against evolving cyber threats.
Read more

Zero Trust: Redefining cybersecurity for the modern era
Intelligent CISO by Alasdair Anderson


Intelligent CISO delves into the Zero Trust security model, advocating for its adoption as the foundation for modern cybersecurity strategies. This approach, which assumes that threats could be internal as well as external, requires verification at every step of digital interactions, fundamentally changing how organisations secure their IT environments. The article explains how Zero Trust architectures can prevent data breaches by continuously authenticating user identities and access rights, thereby minimising the risk of insider threats and external attacks. Implementing Zero Trust not only enhances security but also aligns with evolving regulatory landscapes and technological advancements.
Read more

Major Cyber Attacks in Review: January 2025
SOC Radar


SOC Radar’s report on major cyber attacks in January 2025 provides a sobering overview of the cybersecurity challenges faced globally. It details significant incidents that have impacted government agencies, enterprises, and non-profits, illustrating the sophisticated tactics used by cybercriminals. The analysis stresses the urgency for organisations to adopt proactive defense strategies, such as advanced threat detection systems and incident response plans, to mitigate the impacts of such attacks. The report serves as a call to action for heightened vigilance and strategic planning in the face of the dynamic and persistent threat landscape.
Read more

CyAN Members: Op Eds, Articles, etc:

Your Browser’s Betrayal: Understanding Syncjacking Attacks
Kim Chandler McDonald


In an insightful piece by CyAN Global VP Kim Chandler McDonald, the concept of ‘syncjacking,’ a new form of cyber attack that exploits browser synchronisation features to steal personal information, is thoroughly examined. This article explores how attackers manipulate synced data across devices to gain unauthorised access to sensitive information, compromising user privacy and security. McDonald provides practical advice on how to protect oneself from such attacks, including the use of more secure synchronisation methods and regular audits of sync settings. The piece highlights the need for continuous education on emerging cyber threats to keep personal and organisational data safe.
Read more

CyAN Members: News

  • CyAN board member Gergely Dzsinich will discuss global privacy law and cyber topics affecting the EU, the USA, and China at the International Air Transport Association (IATA) World Legal Symposium in Shanghai, 18-20 February. His talk will specifically address issues like data transfers and the unique topic of biometrics.
  • CyAN Member Yedhu Krishna Menon will be presenting on the topic of “Future of Cybersecurity in Nth Party Supply Chain” — exploring the importance of CollaborativeDefense in managing security risks across extended supply chains at the Third-Party Risk Management (TPRM) Conference in Riyadh, Saudi Arabia, on May 7th and 8th!
    More info

Upcoming CyAN Global Events:

  • Breaking the Cycle: Combating Online IBSA for a Safer Digital Experience – Webinar, March 6th (EST 6AM, CET 12PM, AEST 10PM)
    Read more
  • CyAN APAC: The Geopolitical Impacts of Cyber Threats: From Espionage to Influence – Keynote by Dan Elliot, March 12, Peoplebank, Sydney (save the date, general release tickets available soon!)
  • GITEX AFRICA, Marrakesh, Morocco: 14-16 April
    Read more
  • GITEX ASIA, Singapore (Marina Bay Sands): 23-25 April
    Read more
  • GISEC, Dubai Word Trade Center, Dubai, UAE: 6th to 8th May
    Read more
  • The Cyber Outstanding Security Performance Awards (Cyber OSPAs), May 8, London, UK
    Read more
  • MaTeCC, Rabat, Morocco: 7-9 June, 2025 (The third annual North Africa and beyond cybersecurity event, hosted by CyAN partner organisation École High-Tech.)
    Read more

Cyber (In)Securities – Issue 124

Information Security News Thai authorities detain four Europeans in ransomware crackdown Cyberscoop by Greg OttoIn a coordinated operation, Thai authorities arrested four European nationals in Phuket, suspected of orchestrating Phobos ransomware attacks. The individuals allegedly extorted approximately $16 million in Bitcoin from over 1,000 victims