Artificial intelligence is rapidly becoming a personal assistant for learning, productivity, creativity, and decision-making. But who gets access to powerful AI - and at what...
Cybersecurity across the Middle East & Africa is shifting from awareness campaigns to capability building. That shift requires accessible certification training, hands‑on labs, and...
Artificial intelligence is rapidly becoming a personal assistant for learning, productivity, creativity, and decision-making. But who gets access to powerful AI -...
Our inboxes are gateways to our personal and professional lives. They hold sensitive information, access credentials, and confidential communications. With phishing attacks,...
To Redefining Enterprise Security at Scale, Microsoft recently released its second Secure Future Initiative (SFI) progress report, detailing unprecedented advancements in securing its ecosystem,...
A critical vulnerability in InstaWP Connect, a popular WordPress plugin with over 500,000 active installations, has exposed millions of websites to remote code execution...
Where the Cybersecurity Elite Converge. GISEC Global, the Middle East and Africa’s largest cybersecurity event, returns to Dubai World Trade Centre from 6-8 May...
A Landmark Partnership for Digital Resilience. In a significant move to strengthen the United Arab Emirates' cyber defenses, the Sharjah Cyber Security Center (SCSC)...
A Vintage Cyberattack with a Malicious Aftertaste. In April 2025, cybersecurity researchers at Check Point Research (CPR) uncovered a sophisticated phishing campaign targeting European...
In a move to bolster national cyber hygiene and instill digital responsibility among the youth, Algeria’s National Agency for Information Systems Security (ANSSI), under...
In an era where digital communication and cryptocurrency transactions are ubiquitous, the security of our devices and applications is paramount. Recent investigations have uncovered...
U.S. government is set to discontinue funding for MITRE's Common Vulnerabilities and Exposures (CVE) program, effective April 16, 2025. Since 1999, this program has...
In April 2025, cybersecurity professionals were once again reminded of a harsh truth: patching is not optional it’s a frontline defense. Fortinet, a globally...
A new cyber threat has emerged, targeting software developers through malicious Python packages. The North Korea-linked advanced persistent threat (APT) group known as Gleaming...
In April 2025, Meta Platforms announced the resumption of training its artificial intelligence (AI) models using publicly available content from adult users in the...
At GITEX Africa 2025 in Morocco, cybersecurity giant Kaspersky unveiled alarming findings from its latest Africa Cyberthreat Landscape Report, revealing a 14% increase in...
In a stark reminder of the evolving threat landscape, Palo Alto Networks has recently reported a surge in brute-force login attempts targeting PAN-OS GlobalProtect...
On April 10, 2025, Fortinet issued an urgent security advisory detailing a sophisticated post-patching exploit in FortiGate devices. Cybercriminals are leveraging a newly uncovered...
In today’s rapidly evolving digital landscape, artificial intelligence (AI) applications are pushing technological boundaries while simultaneously introducing new vulnerabilities. Recently, security researchers identified ten...
On April 11, 2025, the decentralized finance (DeFi) community was shaken by a significant exploit targeting MorphoBlue, a prominent DeFi protocol. An attacker, identified...
A critical vulnerability has been identified in the popular SureTriggers WordPress plugin, affecting over 100,000 active installations. This vulnerability enables unauthenticated attackers to create...
A significant cybersecurity incident, the U.S. Department of the Treasury's Office of the Comptroller of the Currency (OCC) disclosed that unauthorized actors had accessed...
In May 2024, Operation Endgame marked a significant milestone in the global fight against cybercrime, leading to the dismantling of major botnets such as...