Ravi Nayyar's Avatar

Ravi Nayyar

@ravirockks.bsky.social

CTI x SSC x CNI x Regulation | CTI @ CyberCX, Fellow @ASPI-org.bsky.social, Associate Fellow at the Social Cyber Institute | Blogging @atechnolegalupdate.substack.com | Cricket, #Bloods | #KalikaMataKiJai

506 Followers  |  390 Following  |  11,653 Posts  |  Joined: 23.06.2023
Posts Following

Posts by Ravi Nayyar (@ravirockks.bsky.social)

JOURNALISTS AND SUB-EDITORS OUT THERE, PLEASE DO NOT SAY โ€˜CYBER-WEAPONSโ€™.

WE DONโ€™T CALL EXPLOITS THAT.

CHEERS.

28.02.2026 09:48 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

Iโ€™m not a Doctor until the degreeโ€™s officially conferred, but it is a blessing that weโ€™re substantively done. Blimey teddy, what a ride this has been.

If you would like to read my thesis, please DM me.

Maa Saraswati Jayate!

23.02.2026 07:17 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

A massive thank you to Mum and Dad, my wonderful supervisors (Cary truly is my divine charioteer), my fabulous interviewees and all of you mob for your wisdom, humour and encouragement.

It truly takes a village and Iโ€™m privileged to count youse all as part of mine.

23.02.2026 07:17 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image

เฅ เคถเฅเคฐเฅ€เค‚ เคนเฅเคฐเฅ€เค‚ เคธเคฐเคธเฅเคตเคคเฅเคฏเฅˆ เคจเคฎเคƒเฅค

Om Shrฤซm Hrฤซm Sarasvatyai Namah

With this mantra, I invoke the Hindu goddess of learning and the arts, Maa Saraswati, and lay my now-approved PhD thesis at Her feet.

23.02.2026 07:17 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
Sydney Metro quietly abandoned M1 5G network hopes Exclusive: Seeking buyer for unused fibre backhaul.

'Supply-side constraints, including long preform manufacturing lead times, raw material export restrictions and cautious capacity expansion by manufacturers, suggest this tightness will persist for at least 18โ€“24 months ...'
www.itnews.com.au/news/sydney-...

16.02.2026 11:41 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

'... supply shortage since late 2025. Prices for mainstream optical fibre products have increased significantly, driven primarily by massive AI data centre buildouts, concurrent government broadband programs and submarine cable expansion.

16.02.2026 11:41 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

'The three leading glass manufacturers in the United States are experiencing challenges in meeting this heightened demand. Notably, one manufacturer has already sold all of its fibre inventory through the year 2026 ...

16.02.2026 11:41 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
Under Pressure: Exploring the effect of legal and criminal threats on security researchers and journalists โ€“ DataBreaches.Net "Dissent Doe," DataBreaches.net admin@databreaches.net Zack Whittaker, this.weekinsecurity.com this@weekinsecurity.com February 2026. [ Download .pdf version ]

On the reading list.
databreaches.net/2026/02/02/u...

16.02.2026 11:36 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
In Broad Daylight: U.S. Grid Exposed to Risk from PRC-Manufactured Inverter Equipment - Strider Intel The People’s Republic of China (PRC) is systematically targeting Americaโ€™s critical infrastructure as part of a long-term strategy to gain leverage i...

'... nearly half of all inverters and BESS imported into the United States between 2015 and 2024 came from a high-risk PRC manufacturer ... 86% of [surveyed] U.S. utilities ... (... about 12% of installed U.S. capacity) rely on at least one risky PRC supplier'.
www.striderintel.com/resources/in...

14.02.2026 12:04 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Default ICS Credentials Exploited in Destructive Attack on Polish Energy Facilities Polandโ€™s CERT has published a report detailing the recent attack by Russia-linked hackers on the countryโ€™s power grid.

Basics not getting implemented means your CNI is basically not in a good place.
www.securityweek.com/default-ics-...

14.02.2026 11:56 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

'Moxa NPort serial device servers ... exposed web interfaces and default credentials to access the systems and then reset them to factory settings, changed their login password, and assigned IP addresses that prevented legitimate users from accessing them'.

14.02.2026 11:56 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

'... wipers on Windows machines hosting the HMI software, which, on devices protected by default local admin credentials, caused damage.

14.02.2026 11:56 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

'... Hitachi Relion protection and control relays ... failure to disable a default FTP account (the vendor recommends disabling this account) and the use of default credentials.

'... RTUs and [HMIs] ... made by Mikronika ...protected with default credentials ...

14.02.2026 11:56 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

'... [Hitachi Energy] RTU560 [RTUs] .... default credentials ... a security feature meant to prevent malicious firmware updates had not been enabled, but even if it had been enabled the devices were affected by CVE-2024-2617, a known flaw allowing unsigned firmware updates.

14.02.2026 11:56 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

'... each of the targeted facilities had Fortinet FortiGate devices exposed to the internet, using default credentials and lacking [MFA] ... the initial attack vector.

14.02.2026 11:56 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
Software and AI Agent Identity and Authorization | NCCoE For well over a decade, code-based systems have been used to enable automation, cloud workloads, and the deployment of APIs. However, with the advancement of software and AI agentsโ€”systems that have t...

'... standards-based approaches to identify, manage, and authorize access and actions taken by software agents, including AI agents, and provide practical guidelines for organizations to securely implement AI agents ...'

Consultation's on.
www.nccoe.nist.gov/projects/sof...

14.02.2026 11:48 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
BOD 26-02: Mitigating Risk From End-of-Support Edge Devices | CISA This page contains a web-friendly version of the Cybersecurity and Infrastructure Security Agencyโ€™s Binding Operational Directive 26-02: Mitigating Risk From

By the way, cricket fans, 'The Edge' is a fantastic doco on the Andy Flower period for the England Men's team.
www.cisa.gov/news-events/...

14.02.2026 11:47 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

'... CISA developed an EOS Edge Device List ... This Directive requires federal agencies to use this information to identify and remediate vulnerabilities within the first three months ... also specifies long-term requirements ...'

14.02.2026 11:47 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

'This Directive aligns with OMBโ€™s Circular A-1301, Managing Information as a Strategic Resource ... A-130 requires that โ€œunsupported information systems and system components are phased out as rapidly as possible ...โ€

14.02.2026 11:47 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
Strengthening supply-chain security in Open VSX The Open VSX Registry is core infrastructure in the developer supply chain, delivering extensions developers download, install, and rely on every day. As the ecosystem grows, maintaining that trust ma...

[Awesome to see OpenSSF back this security uplift for a crucial part of the OSS community.]
blogs.eclipse.org/post/christo...

14.02.2026 11:33 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

'Move toward enforcement in March, once weโ€™re confident the system behaves predictably and fairly

'We would also like to thank Alpha-Omega for supporting this work, and for their broader support of the Eclipse Foundationโ€™s security initiatives'.

14.02.2026 11:33 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

'Together, weโ€™re introducing a new, extensible verification framework.

'Begin monitoring newly published extensions in February, without blocking publication

'Use this monitoring period to tune checks, reduce false positives, and improve feedback

14.02.2026 11:33 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

'The Open VSX Registry is core infrastructure in the developer supply chain, delivering extensions developers download, install, and rely on every day.

'To address this, we are taking a more proactive approach by adding security checks before extensions are published ...

14.02.2026 11:33 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
Risky Bulletin: Plone CMS stops supply-chain attack In other news: France raids Twitter's offices; OpenClaw malicious skills explode; Notepad++ incident linked to Chinese APT.

'It is unclear how the attacker gained access to the compromised dev's personal access token, but the user said the attacker had access to the token for two months before the force-push operations'.
news.risky.biz/risky-bullet...

14.02.2026 11:21 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

'The attacker managed to get their hands on the developer's GitHub personal access token and force-pushed the malicious code hidden after a lot of whitespace.

'... the code targeted other developers working with Plone, and not visitors of Plone-based websites.

14.02.2026 11:21 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

'A threat actor inserted malicious code in five of the organization's repositories but the modifications were spotted before they made it to any official release.

14.02.2026 11:21 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
Commission strengthens EU cybersecurity resilience and capabilities Europe faces daily cyber and hybrid attacks on essential services and democratic institutions, carried out by sophisticated state and criminal groups. The European Commission has today proposed a new ...

'ENISA will also develop a Union approach to provide better vulnerabilities management services to stakeholders. It will operate the single-entry point for incident reporting proposed in the Digital Omnibus'.
ec.europa.eu/commission/p...

14.02.2026 11:12 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

'[ENISA] issuing early alerts of cyber threats and incidents. In cooperation with Europol and Computer Security Incident Response Teams, it will support companies in responding to and recovering from ransomware attacks.

14.02.2026 11:12 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

'... simplify jurisdictional rules, streamline the collection of data on ransomware attacks and facilitate the supervision of cross-border entities with ENISA's reenforced coordinating role.

14.02.2026 11:12 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

'Targeted amendments to the NIS2 Directive aim to increase legal clarity ... new category of small mid-cap enterprises to lower compliance costs for 22,500 companies ...

14.02.2026 11:12 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0