Artificial intelligence is rapidly becoming a personal assistant for learning, productivity, creativity, and decision-making. But who gets access to powerful AI - and at what...
Cybersecurity across the Middle East & Africa is shifting from awareness campaigns to capability building. That shift requires accessible certification training, hands‑on labs, and...
Artificial intelligence is rapidly becoming a personal assistant for learning, productivity, creativity, and decision-making. But who gets access to powerful AI -...
Our inboxes are gateways to our personal and professional lives. They hold sensitive information, access credentials, and confidential communications. With phishing attacks,...
In April 2024, a covert cyber-espionage campaign shook the Middle Eastern cybersecurity landscape. Microsoft Threat Intelligence uncovered a zero-day exploit in the widely used...
With more than two billion people around the globe participating in national elections over the last 18 months, the integrity of electoral processes has...
In the ever-evolving landscape of cybercrime, attackers are once again proving their adaptability by exploiting the latest technological trends. The rise of AI-powered content...
As cyber threats grow more sophisticated and financial institutions across the Middle East face mounting pressure to secure sensitive data, GISEC Global 2025 has...
In a bold move reinforcing Oman’s ambitions for digital transformation and sustainability, Omantel has successfully completed a pioneering trial of 5G-powered Passive Internet of...
In a landmark decision that underscores the growing scrutiny of Big Tech's data practices, Texas Attorney General Ken Paxton has secured a historic $1.375...
In the ever-evolving landscape of cyber threats, state-sponsored actors continually refine their tactics to exploit vulnerabilities and achieve their objectives. One such actor, the...
In early 2025, cybersecurity researchers at Cisco Talos uncovered a sophisticated spam campaign targeting Portuguese-speaking users in Brazil. This campaign exploited legitimate Remote Monitoring...
ACCRA, Ghana - 20 May 2025 - Ghana has officially launched Africa’s largest artificial intelligence-powered cybersecurity and digital forensics centre in Accra, a major...
In an alarming development that underscores the persistent targeting of enterprise-critical systems, CVE-2025-31324, a critical deserialization vulnerability in SAP NetWeaver Visual Composer has been...
As cyber threats continue to transcend borders with unprecedented speed and sophistication, coordinated global response has become an absolute necessity. The 2025 edition of...
Cyberjaya, Malaysia - 7 May 2025 - Somalia has signed two significant Memoranda of Understanding (MOUs) with Malaysia to strengthen its digital regulation capabilities...
In early April 2025, cybersecurity researchers uncovered a sophisticated attack by the Play ransomware group, also known as Balloonfly. This operation exploited a previously...
On May 5, 2025, Google released its monthly Android Security Bulletin, addressing 47 vulnerabilities across various components of the Android operating system. Among these,...
Day 2 of GISEC North Star, powered by CyberE71, brought together visionary founders, investors, and industry leaders under one roof, showcasing groundbreaking cybersecurity innovations...
In a landmark deal that reinforces the United Arab Emirates' growing influence in cybersecurity and artificial intelligence, Abu Dhabi-based CPX Holding announced on May...
On May 2, 2025, the Wordfence Threat Intelligence team added a new critical vulnerability to the Wordfence Intelligence vulnerability database in the OttoKit: All-in-One...
In a significant victory against online fraud, the Central Brigade for the Fight Against Cybercrime (BCLCC) in Burkina Faso has apprehended four suspected cybercriminals...