cybercory

#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

22 C
Dubai
Friday, February 13, 2026
cybercory
HomeTopics 5

Topics 5

spot_imgspot_imgspot_imgspot_img

The 2025 CWE Top 25: What the World’s Most Dangerous Software Weaknesses Reveal About the Future of Cybersecurity

The 2025 CWE Top 25 Most Dangerous Software Weaknesses has been released, and the message is clear: the same deeply rooted coding flaws continue...

Final Patch Tuesday of 2025: Microsoft Releases 57 Security Updates, Including Actively Exploited Zero-Day and Critical Vulnerabilities Across Windows and Chromium-Based Edge

Microsoft has rolled out its December 2025 Patch Tuesday updates, addressing critical security risks across its software ecosystem. The update resolves 57 vulnerabilities which...

Hackers Breach Multiple Kenyan Government Websites, Temporarily Seize Presidency Portal

Kenya is investigating a major cybersecurity incident after hackers infiltrated several government websites - including president.go.ke, the official portal of the Presidency - temporarily...

Google Strikes Back: A Dual Strategy of Legal Action and Legislation to Stop Global Scammers

Those fake text messages about “unpaid tolls” or “stuck delivery packages” are not harmless spam, they’re part of a massive, organized scam network defrauding...

SAP Issues 18 New Security Fixes in November Patch Day – Critical Vulnerabilities Demand Immediate Attention

SAP has rolled out its November 2025 Security Patch Day, addressing 18 newly discovered vulnerabilities and two updates to previous advisories. The latest security...

Phishing Campaigns “I Paid Twice” Target Booking.com Hotels and Customers

Cybercriminals have launched a highly convincing phishing campaign targeting both Booking.com hotels and their guests, exploiting stolen credentials, compromised accounts, and realistic messages that...

CISA Flags Two Actively Exploited Vulnerabilities in Dassault Systèmes Software

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two new security flaws to its Known Exploited Vulnerabilities (KEV) Catalog, warning that attackers...

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Must read

spot_imgspot_imgspot_imgspot_img