CyAN supports the effort against the UK Home Office’s attempt to force Apple to incorporate back doors in its end-to-end encryption.
security
Your Browser’s Betrayal:Understanding Syncjacking Attacks

In a recent feature from (In)Securities, Bill Toulas of BleepingComputer highlighted an emerging cyber threat known as “syncjacking.” This method exploits the synchronization features of browsers like Chrome to hijack user sessions across devices. By seducing users into installing malicious extensions, attackers gain access to synced data, including passwords, browsing history, and authentication tokens. With […]
Enhancing Cybersecurity: A Safer Internet Day Reflection on Protecting the Vulnerable

Safer Internet Day: A Call for Responsibility As we observe Safer Internet Day, we are reminded of our collective responsibility to foster a digital environment that is secure and respectful. This global observance not only promotes safer and more responsible use of online technology but also underscores the critical role of cybersecurity in safeguarding all […]
Australia’s Digital Destiny: Leading the Charge for Online Freedom

Introduction In today’s interconnected world, the importance of digital rights cannot be overstated. While the European Union is making commendable strides in this arena, Australia stands at a pivotal juncture to assert its leadership in championing online freedom. The nation’s commitment to democratic values, coupled with a robust technological infrastructure, uniquely positions it to influence […]
Cyber (In)Securities – Issue 123

Information Security News: Federal Judge Tightens DOGE Leash Over Critical Treasury Payment System AccessThe Register by Brandon Vigliarolo and Jessica LyonA federal judge has mandated stricter regulatory oversight on the integration of Dogecoin (DOGE) within the U.S. Treasury’s critical payment systems, following concerns about the cryptocurrency’s potential to disrupt financial stability. This decision introduces a […]
Beyond Data Protection Day: Safeguarding Our Digital Lives Every Day

January 28th was Data Protection Day—a global reminder that privacy isn’t just a legal formality or an operational headache. It’s a fundamental pillar of trust. If your business handles client or customer data (and let’s be honest, that includes almost every business these days), you have a responsibility to protect it. Yet, too many still […]
Beyond Data Protection Day: Safeguarding Our Digital Lives Every Day

January 28th was Data Protection Day—a global reminder that privacy isn’t just a legal formality or an operational headache. It’s a fundamental pillar of trust. If your business handles client or customer data (and let’s be honest, that includes almost every business these days), you have a responsibility to protect it. Yet, too many still […]
Cyber (In)Securities – Issue 119

Information Security News Google Cloud Links Poor Credentials to Nearly Half of All Cloud-Based AttacksBy Matt Kapko, Cybersecurity DiveRead moreGoogle Cloud has reported that nearly half of all cloud-based cyberattacks can be traced back to weak or compromised credentials. Attackers frequently exploit poor password hygiene and misconfigured access controls to infiltrate cloud environments, leading to […]
A Day in the Life of a Seasoned Security Analyst: Transforming Cybersecurity with 360Sequrity Solutions By Shantanu Bhattacharya

Let me take you on a journey through the eyes of Alex, a seasoned security analyst at SecureBank, a global financial institution. Alex’s team is responsible for protecting sensitive customer data from increasingly sophisticated cyberattacks. Every day is a battle, but this one is about to be different. The Old Normal: A Day of Chaos […]
Welcome New Member – Dale Connell from Trinidad!

Please welcome our newest member from Trinidad, Dale Connell! Dale Connell is a seasoned Cyber Risk and Technology Lead within Deloitte’s Consulting service line at the Trinidad and Tobago office. With extensive expertise in information security strategy and implementation, Dale supports organizations across various industries in developing and executing robust cybersecurity frameworks. His experience spans […]