Artificial Intelligence is moving faster than almost any technology in history.
Organizations are racing to adopt AI, seeing it as a tool that can accelerate decision-making, improve productivity, and unlock new capabilities.
Yet, while AI is a tremendous enabler, diving in headfirst without fully understanding it carries cybersecurity and data privacy risks, and mistakes are just waiting to happen.
To understand the potential pitfalls, consider a historical analogy: when cars were first invented, society still relied on horses and carriages.
Roads, regulations, and safety systems didn't exist overnight.
Imagine if, one day, everyone suddenly switched to cars, with no driving experience, no rules of the road, and no safety measures like seat belts or airbags.
The result would have been chaos (and it was in some part of the world with cars early adopters)
That's essentially what's happening with AI today.
Organizations...
>>[READ MORE]
When Microsoft Turns Against You: Hackers Wipe Thousands of Devices
#155 - Posted on
03 April 2026 - Author: SM - Category: Hacking, Security
Microsoft Intune is used by many organisation as a security/admin tool to manage endpoints, ensure they have the correct security controls, the right level of patches, only certain authorised applications, etc.
And, as well, when an endpoint/device may get lost, it allows the company/an admin, to remotely wipe the device for security reason.
So what could go wrong?
In March 2026, Stryker Corporation learned a hard lesson: attackers don't always need malware.
By compromising admin credentials, the threat actors leveraged Microsoft Intune to remotely wipe tens of thousands of devices across the organization: laptops, servers, and mobile endpoints.
The attack caused widespread disruption to operations, from order processing to shipping.
Who would ever need to mass wipe out all endpoints in an organisation besides a hacker?
It looks like Microsoft never asked themselves that question...
Because not only is that option there by defau...
>>[READ MORE]
MAURITIUS SECURITY CLUB IS BACK - MU.SCL Season 3!
#154 - Posted on
06 March 2025 - Author: SM - Category: Conferences, Security
After many years, we are finally back!
We are happy to confirm our new meeting for the Mauritius Cyber Security Club: MU.SCL.
This FREE to attend meeting will take place at the Flying Dodo Brewing Company in Bagatelle. In there conference room upstairs.
In this new event, the following two talks will be presented:
- Talk1 - 2025 LESSONS FOR 2026 (Sylvain Martinez - ELYSIUMSECURITY): The first talk will provide an overview of the main security stories (horrors) or 2025 and what we can learn about them to make 2026 more secured.
- Talk2 - AI, ENABLER OR THREAT? (Sylvain Martinez - ELYSIUMSECURITY): The second talk will look at the latest news related to Artificial Intelligence, how it is used to enhance security protections but also used to facilitate more sofisticated attacks. We will also touch on what it may means for our future security jobs/roles!
You can register for this event, for free, on the eventbrite website:
...
>>[READ MORE]
Notepad++ and the joy of shadow IT application procurement
#153 - Posted on
06 March 2025 - Author: SM - Category: Hacking, Security
Last month the maintainer of Notepad++ published a disclosure that will make any developer or sysadmin uncomfortable.
For about six months, from June through December 2025, the software's update mechanism had been hijacked by a Chinese state-sponsored threat actor.
Every time a targeted user hit "Check for Updates", they were potentially downloading malware instead of a legitimate new version, and the installer looked and behaved exactly like the real thing.
Notepad++ is not a niche tool. It is one of the most widely installed text editors in the world, used daily by developers, system administrators, network engineers, and security professionals.
That demographic is precisely why it was targeted. In enterprise environments, these are often the most privileged users on the network. Compromise their workstation through a trusted update and you have bypassed the perimeter entirely.
The attackers did not touch a single line of Notepad++ source code. They...
>>[READ MORE]
Apple's Spyware Alerts and 2025 closing thoughts!
#152 - Posted on
30 December 2025 - Author: SM - Category: Hacking, Security
On 2 December 2025, Apple sent threat notifications to users in 84 countries - one of the largest single waves since the programme launched.
Not a security tip.
A direct, personal warning: your device may have been targeted by state-sponsored attackers. Apple reserves these alerts for situations where it believes a user is being hunted by well-resourced, sophisticated operators. Custom operations. Expensive. Almost always government-connected.
The alerts landed in the middle of a coordinated disclosure by Google, Amnesty International, and a consortium of investigative journalists focused on Intellexa - the company behind the Predator spyware platform. Already sanctioned twice by the US government, Intellexa had simply adapted: setting up shell companies to infiltrate advertising networks, and deploying a new infection method called "Aladdin" that silently compromises a device through a targeted banner ad.
There was no link to click, no file to open. Just an...
>>[READ MORE]
Cyber Security Governance resources from the UK Government
#151 - Posted on
12 November 2025 - Author: SM - Category: Guides, Security
Last month, the UK government addressed a letter to all CEOs and Chairs or leading UK companies emphasising that hostile cyber activity is increasing in frequency, sophistication, and impact. It also stated that cyber resilience is a critical enabler of economic growth and that organisations recover better when they have planned and rehearsed for worst-case disruption.
Although it references services and bills that are UK centric, there are some interesting points and information that could be considered and/or used in any country.
The letter asks companies to take three specific actions:
- Make cyber risk a Board-level priority by using the Cyber Governance Code of Practice.
- Sign up to the Early Warning service of the National Cyber Security Centre (NCSC) – a free service giving early alerts of potential attacks on your network. Your country may offer a national CERT service that is similar and if not but it could also be replaced with a
...
>>[READ MORE]
What the Salesfoce breach can teach us on Cloud/SaaS Security?
#150 - Posted on
23 October 2025 - Author: SM - Category: Hacking, Security
What Happened?
The attack ran on two front simultaneously.
- On the first, attackers quietly compromised Salesloft's GitHub repositories between March and June 2025, stealing Drift OAuth refresh tokens. Those tokens gave them persistent, legitimate-looking API access to the Salesforce environments of every company using their integration. Thousands of database queries were run in the background, pulling contact records, case data, and critically embedded credentials like AWS keys and tokens that had been pasted into support tickets.
- On the second, attackers impersonated Salesforce support staff in targeted phone calls, tricking employees into installing a malicious app that granted OAuth access and bypassed MFA entirely. This campaign hit consumer brands directly.
Once they had accumulated enough data, the group went public. On 3 October 2025, they launched a dark web site called:
Trinity of Chaos, published samples of...
>>[READ MORE]