#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

32 C
Dubai
Friday, October 10, 2025
HomeTopics 2Cyber Attack

Cyber Attack

spot_imgspot_imgspot_imgspot_img

Code Calamity: Polyfill Supply Chain Attack Injects Malicious Code into Over 100,000 Websites

The recent Polyfill supply chain attack serves as a stark reminder of the vulnerabilities inherent in our interconnected digital world. This attack, targeting a...

A Cloud Under Threat: Major Flaw in Fluent Big Bug Platform Exposes Businesses

A recent discovery has sent shockwaves through the cybersecurity community – a critical vulnerability in the Fluent Big Bug platform, a popular bug bounty...

Hacking Escalating Tensions: Rootkit Intensifies Attacks on Egyptian Targets After Anonymous Clash

The digital landscape of Egypt has become a battleground, with reports of a renewed offensive by the cybercriminal group Rootkit targeting Egyptian firms and...

Under Siege: Australia Braces for Escalating Cyberattacks in Support of Ukraine

As the war in Ukraine rages on, a hidden battleground has emerged in the digital realm. Australia, a staunch supporter of Ukraine, has become...

Can Cyberattacks Benefit Your Competitors? A Look Beyond the Breach

Cyberattacks are undeniably devastating events, causing financial losses, reputational damage, and operational disruptions. However, in the ever-evolving world of cybersecurity, even negative events can...

Malicious Code in the Mix: Hackers Exploit GitHub Accounts in Supply Chain Attack

A recent sophisticated cyberattack campaign has sent shockwaves through the developer community. Hackers successfully hijacked several GitHub accounts, including the organization account for Top.gg, a...

75% on Alert: UK Businesses Face Rising Tide of Cyberattacks

A recent UK government survey paints a sobering picture of the cybersecurity landscape for British businesses. The survey reveals that a staggering 75% of...

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Must read

spot_imgspot_imgspot_imgspot_img