HomeTopics 2

Topics 2

spot_imgspot_imgspot_imgspot_img

The Middle East’s Cybersecurity Calendar: Top 10 Must-Attend Events for Security Leaders in 2026

As cybersecurity risks grow in scale and impact, driven by AI-powered threats, geopolitical tensions, and digital transformation across public and private sectors, security events...

Phishing Campaign Abuses Google Cloud Automation to Slip Past Security Defenses

Attackers exploit trusted Google Cloud workflows to deliver convincing phishing emails at scale, targeting enterprises worldwide A newly uncovered phishing campaign has raised fresh alarms...

Critical MongoDB Flaw Lets Unauthenticated Attackers Leak Sensitive Memory Data

A quiet flaw with serious consequences - A critical security vulnerability in MongoDB is putting organizations worldwide at risk, allowing attackers to remotely leak...

Access Granted: How Device Code Phishing Is Fueling Account Takeovers

Phishing is no longer just about fake login pages and stolen passwords. According to new research from Proofpoint, threat actors are increasingly abusing a...

Malicious VS Code Extensions Hide Malware in Fake PNG File, Triggering New Supply-Chain Threat

A new malicious campaign targeting Visual Studio Code (VS Code) extensions has been uncovered - and it's one of the most technically deceptive supply-chain...

AmiViz Sets the Stage for Next-Gen Cybersecurity at Black Hat MEA 2025 with AI-Powered Innovations

AmiViz, widely recognized as one of the Middle East’s most influential cybersecurity-focused value-added distributors is gearing up for a major presence at Black Hat...

SentinelOne Sets the Stage for AI-Driven Cyber Defense at Black Hat MEA 2025

SentinelOne is gearing up to take center stage at Black Hat Middle East & Africa 2025, bringing with it a powerful message: AI is...

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Must read

spot_imgspot_imgspot_imgspot_img