A sophisticated hack-for-hire cyber espionage campaign targeting journalists, opposition figures, and civil society in the Middle East has been uncovered highlighting how relatively simple attack...
A new and highly convincing refund scam is targeting French-speaking internet users by impersonating Avast, tricking victims into handing over full credit card details...
Our inboxes are gateways to our personal and professional lives. They hold sensitive information, access credentials, and confidential communications. With phishing attacks,...
Security researchers have identified Mirax, a sophisticated Remote Access Trojan (RAT) that is redefining mobile malware by transforming infected smartphones into residential proxy nodes,...
A newly disclosed vulnerability in Palo Alto Networks’ Cortex platforms is raising fresh concerns around the security of enterprise integrations, especially those connected to...
A sophisticated hack-for-hire cyber espionage campaign targeting journalists, opposition figures, and civil society in the Middle East has been uncovered highlighting how relatively simple...
A sophisticated social engineering campaign disguised as job interviews is quietly infiltrating the global developer community compromising open-source ecosystems and exposing a dangerous new...
A newly disclosed critical vulnerability in Cisco Smart Software Manager On-Prem (SSM On-Prem) is raising serious concerns across the cybersecurity community, with the potential...
The global cyber threat landscape is entering a new era one defined by automation, artificial intelligence, and increasingly sophisticated adversaries. The latest annual threat...
The U.S. National Institute of Standards and Technology has released a landmark new Quick-Start Guide that does something previous frameworks didn't fully do: it...
A new warning from the U.S. cybersecurity authorities has revealed a large-scale campaign by Russian intelligence-linked actors targeting commercial messaging applications (CMAs) not by...
In today’s rapidly evolving threat landscape, identity has become the new perimeter and yet, access governance remains one of the most overlooked pillars of...
A newly published threat assessment by Palo Alto Networks Unit 42 reveals a significant evolution in the tactics of the Iranian state-linked threat group...
A sophisticated malware campaign is actively targeting users through fake Telegram download websites, using advanced evasion techniques to bypass security controls and establish persistent...
In an era where digital interactions define business, governance, and daily life, identity has become the new security perimeter. Episode 12 of the Dubai...
The ongoing Iran conflict has entered a dangerous new phase one where missiles, drones, and cyberattacks are no longer separate threats, but part of...
A newly uncovered cyber-espionage campaign is drawing attention across the security community after researchers discovered a stealthy browser-based backdoor targeting Ukrainian organizations.
Security analysts from...
A new set of security vulnerabilities affecting Zoom’s widely used collaboration ecosystem has raised fresh concerns about the security posture of remote communication platforms...
Fortinet has released a new batch of security advisories addressing multiple vulnerabilities across its enterprise security ecosystem, including FortiSwitch, FortiManager, FortiAnalyzer, and FortiSandbox Cloud....