John Meah's profile photo

John Meah

Jersey, London, United Kingdom

Freelance Writer at Freelance

None at Techopedia

Author | Writer | Cybersecurity Consultant | Creative Thinker | Deadline-Oriented

Articles

  • 1 week ago | techopedia.com | John Meah

    Attack surface management (ASM) is shifting gears, from reactive fixes to real-time visibility across sprawling infrastructures. Think of continuous scanning, asset discovery, and threat prioritization; that’s what you get with attack surface management tools. Threats evolve fast. Ransomware-as-a-service kits are cheap and easy to deploy. Shadow IT pops up without warning. Supply chain attacks often target trusted vendors first, and then move on to you.

  • 2 weeks ago | techopedia.com | John Meah

    The European Union Agency for Cybersecurity (ENISA) became one of 453 CVE Numbering Authorities in January 2024 and launched the European Union Vulnerability Database (EUVD) as a beta product in April 2025 under the NIS2 Directive. The launch represents a major leap in Europe’s push for cybersecurity independence. The EUVD addresses growing concerns about excessive reliance on infrastructure systems outside the EU, such as MITRE’s Common Vulnerabilities and Exposures (CVE) program.

  • Feb 14, 2025 | techopedia.com | John Meah

    Today is Valentine’s Day, a time for love, flowers, and chocolates. Sadly, it’s also a money-making opportunity for fraudsters looking to scam unsuspecting victims. Romance scams and other fraudulent schemes surge around at this time of year, leaving victims emotionally and financially devastated. Techopedia explores the scope of the problem and offers strategies to combat these scams.

  • Feb 13, 2025 | techopedia.com | John Meah

    Another day, another zero-day vulnerability to keep IT security and Disaster Recovery teams up to their necks in patch management and remediation. Microsoft has disclosed a vulnerability in a core driver that affects Windows 10, Windows 11, and Windows Server versions. When Windows alerts you to a security update — hit the button immediately. The vulnerability is called CVE-2025-21418.

  • Feb 11, 2025 | techopedia.com | John Meah

    We rightly or wrongly assume that our devices are secure and that Apple’s famed “walled garden” keeps us safe. But in reality, every Apple device security update tells a hidden story: a race between hackers and engineers, between exploitation and protection. Apple has once again issued a critical security update, this time for CVE-2025-24085, a Use-After-Free (UAF) vulnerability in the Core Media framework.

Contact details

Socials & Sites

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →

X (formerly Twitter)

Followers
133
Tweets
1K
DMs Open
Yes
John Meah
John Meah @JohnMeah2016
13 May 25

$212 Billion Question: Are You Spending Your IT Budget Wisely? - https://t.co/tJQ8KaCbz6

John Meah
John Meah @JohnMeah2016
16 Apr 25

Check out my latest article: The Escalating Threat of DDoS Attacks on Esports Tournaments https://t.co/QktO69hOMA via @LinkedIn

John Meah
John Meah @JohnMeah2016
8 Apr 25

The Rise of Electric Motorhomes in the UK: A Story of Reinvention on Wheels https://t.co/lDvYMBlsEQ