Facebook
Instagram
Linkedin
X
Sign in
Join
Africa
America
Asia
Europe
Oceania
Worldwide
Middle East
Canada
West Africa
USA
Sign in
Welcome!
Log into your account
your username
your password
Forgot your password?
Create an account
Privacy Policy
Sign up
Welcome!
Register for an account
your email
your username
A password will be e-mailed to you.
Privacy Policy
Password recovery
Recover your password
your email
Search
#1 Middle East & Africa Trusted Cybersecurity News & Magazine |
Advertise With Us
About us
Contact us
Facebook
Instagram
Linkedin
X
Africa
America
Asia
Europe
Oceania
Worldwide
Middle East
Canada
West Africa
USA
Advertise With Us
About us
Contact us
Subscribe
Africa
America
Asia
Europe
Oceania
Worldwide
Middle East
Canada
West Africa
USA
Advertise With Us
About us
Contact us
Subscribe
Home
Topics 2
Cloud Security
Cloud Security
Cloud Security
Cloud Security
Phishing Campaign Abuses Google Cloud to Steal Microsoft 365 Credentials
Cybercory Team
-
January 7, 2026
0
Cloud Security
Phishing Campaign Abuses Google Cloud Automation to Slip Past Security Defenses
Cybercory Team
-
December 31, 2025
0
Cloud Security
Open Letter to Samsung: A Growing Outcry Over Forced Israeli-Founded Bloatware in the WANA Region
Cybercory Team
-
November 17, 2025
0
Application Security
One Token to Rule Them All: Critical Entra ID Flaw Could Have Exposed Every Tenant
Ouaissou DEMBELE
-
September 23, 2025
0
AI & Cybersecurity
Ooredoo and Qatar Airways Sign MoU to Establish Qatar as Regional AI, Cloud & Cybersecurity Innovation Hub
Ouaissou DEMBELE
-
September 1, 2025
0
Application Security
Microsoft Patches Critical Exchange Hybrid Vulnerability Allowing Cloud Privilege Escalation
Ouaissou DEMBELE
-
August 7, 2025
0
Cloud Security
Attackers Unleash TeamFiltration: Active Account Takeover Campaign Hits Over 80,000 Users Across Entra ID Ecosystems
Ouaissou DEMBELE
-
June 12, 2025
0
Advanced Persistent Threat
APT41 Unmasked: Chinese Cyber-Espionage Group Uses Google Calendar for Covert Attacks
Ouaissou DEMBELE
-
May 29, 2025
0
Application Security
Securing Kubernetes: Understanding and Mitigating Threats to Containerized Environments
Ouaissou DEMBELE
-
April 28, 2025
0
Cloud Security
ConfusedComposer: How a GCP Privilege Escalation Flaw Exposed Cloud Composer to Takeover
Ouaissou DEMBELE
-
April 23, 2025
0
1
2
3
4
Page 1 of 4