News Former cyber official targeted by Trump quits company over moveNBC News β Kevin Collier MITRE’s CVE program given last-minute reprieveitNews β Raphael Satter Whistle Blower: Russian Breach of US Data Through DOGENarativ β Zev Shalev Midnight Blizzard deploys GrapeLoader malwareBleepingComputer β Bill Toulas 4chan taken down following major hackBleepingComputer β Sergiu Gatlan China places […]
Strategy
No Time for Antics with Semantics: Why CVEs Are Cybersecurityβs Lifeline

The cybersecurity world runs on shared language. We donβt often talk about it in those termsβbut thatβs exactly what the CVE (Common Vulnerabilities and Exposures) system is. A global taxonomy of flaws. A universal index of weakness. The quiet backbone that lets defenders coordinate responses in a coherent, time-sensitive, and standardised way. This week, we […]
What happens to Heroes?β EPISODE #4: The Unsung Heroes of the Digital World by Didier Annet

The Psychological Impacts of Cyberattacks This is the fourth episode of a story related to individuals who, in a matter of moments, transition from “employees” to “rescuers” in the immediate aftermath of a destructive cyberattack. What I will call the βHeroesβ! Let’s Rewrite the Story of a Cyberattack β Uchrony of a losing scenario βThe […]
Welcome New Member β YounΓ¨s Felahi from Morocco

Please welcome our newest member from Morocco, YounΓ¨s Felahi π Younes FELAHI, a recognized cybersecurity expert in Morocco and Africa, has over 15 years of experience in the field. He has held positions as a consultant, architect, and expert in cyber strategies, governance, risk and compliance, cyber architecture, SOC activity structuring, and management of detection […]
Cyber (In)Securities β Issue 139

Information Security News Autonomous, GenAI-Driven Attacker Platform Enters the ChatDark Reading β Elizabeth Montalbano EncryptHub’s dual life: Cybercriminal vs Windows bug-bounty researcherBleepingComputer β Bill Toulas Voluntary βPall Mall Processβ seeks to curb spyware abusesCyberscoop β Tim Starks That massive GitHub supply chain attack? It all started with a stolen SpotBugs tokenThe Register β Jessica Lyons […]
Behind the Keys: Women Who Secure the Future β Edna Conway

π Download Feature PDF Want to connect? Here is Edna Conway’s professional profile. Feel free to say hello and show your support. π Connect on LinkedIn About the Author Saba Bagheri, PhD Cyber Threat Intelligence Manager at Bupa APAC Director at the Cybersecurity Advisors Network (CyAN) She is a highly credentialed professional holding CISM, CEH, […]
Cyber (In)Securities β Issue 138

Information Security News Disclosure Drama Clouds CrushFTP Vulnerability ExploitationDark Reading β Rob Wright CISA warns of Fast Flux DNS evasion used by cybercrime gangsBleepingComputer β Bill Toulas Google Quick Share Bug Bypasses Allow Zero-Click File TransferDark Reading β Tara Seals China-Linked Threat Group Exploits Ivanti BugDark Reading β Jai Vijayan International intelligence agencies raise the […]
Behind The Keys: Women Who Secure the Future

(In)Securities Special Edition (In)Securities Special Edition Celebrating International Women in Tech Day Editor-in-Chief Kim Chandler McDonald Co-Founder and CEO of 3 Steps Data Global VP at CyAN An award-winning author and advocate for cybersecurity, compliance, and digital sovereignty. Kim drives global conversations on data governance and user empowerment. Author Saba Bagheri, PhD Cyber Threat Intelligence […]
Behind the Keys: Women Who Secure the Future β Roxanne Pashaei

π Download Feature PDF Want to connect? Here is Roxanne Pashaei’s professional profile. Feel free to say hello and show your support. π Connect on LinkedIn About the Author Saba Bagheri, PhD Cyber Threat Intelligence Manager at Bupa APAC Director at the Cybersecurity Advisors Network (CyAN) She is a highly credentialed professional holding CISM, CEH, […]
Strengthening Global Security: Data Protection as National Imperative

In my previous article, Unraveling Digital Sovereignty: The Delicate Balance of Digital Sovereignty: Insights and Imperatives, we explored the intricate balance between protecting national interests and promoting global digital cooperation. Building on that foundation, Part 2 of our series dives deeper into how nations can fortify their cybersecurity initiatives without hindering the international flow of […]