Artificial intelligence is rapidly becoming a personal assistant for learning, productivity, creativity, and decision-making. But who gets access to powerful AI - and at what...
Cybersecurity across the Middle East & Africa is shifting from awareness campaigns to capability building. That shift requires accessible certification training, hands‑on labs, and...
Artificial intelligence is rapidly becoming a personal assistant for learning, productivity, creativity, and decision-making. But who gets access to powerful AI -...
Our inboxes are gateways to our personal and professional lives. They hold sensitive information, access credentials, and confidential communications. With phishing attacks,...
The aviation industry is undergoing a digital revolution, driven by unprecedented investments in technology to enhance efficiency, sustainability, and passenger experience. According to SITA’s...
In a decisive move to bolster national and enterprise cybersecurity, the Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities Catalog...
In a startling development that underscores the ever-present threat of cybercrime, Orange Group, a leading French telecommunications operator and digital service provider, has confirmed...
As a groundbreaking move to transform the operational technology (OT) cybersecurity landscape, CQR—Saudi Arabia’s premier OT cybersecurity firm—has successfully raised $3 million in strategic...
On February 20, 2025, in a groundbreaking move to enhance investor protection in an increasingly digital economy, the U.S. Securities and Exchange Commission (SEC)...
Recent investigations by cybersecurity experts have uncovered a sophisticated malware campaign in the Asia-Pacific (APAC) region, with a distinct focus on Chinese-speaking targets. Dubbed...
The Dubai-based cryptocurrency exchange Bybit was hit by a cyberattack, resulting in the theft of $1.5 billion worth of Ethereum (ETH), the second-largest cryptocurrency...
In a dramatic revelation that underscores the complex interplay between state directives and private cybersecurity enterprises in China, a recent data leak has exposed...
On February 18, 2025, Cloud Software Group announced the release of new builds that fix a critical vulnerability CVE-2024-12284 in the NetScaler Console and...
In March 2024, the Cyber Emergency Center confirmed a new attack campaign dubbed "RevivalStone" orchestrated by the notorious Chinese-based threat actor group, Winnti Group....
On February 11, 2025, a critical out-of-cycle security bulletin was issued concerning Juniper Networks’ Session Smart Router, Session Smart Conductor, and WAN Assurance Managed...
As cybercriminals continually refine their tactics, Android 16 is set to deliver a robust countermeasure aimed at one of the most insidious scam techniques—manipulating...
Microsoft has rolled out its February 2025 Patch Tuesday updates, addressing critical security risks across its software ecosystem. The update resolves 63 vulnerabilities which...
In a recent disclosure that has sent ripples across the cybersecurity community, a critical authentication bypass vulnerability CVE-2025-0411 has been identified in Palo Alto...
In a landmark disclosure, Microsoft Threat Intelligence has, for the first time, published its in‐depth research on a previously covert subgroup operating within the...
On February 11, 2025, in a landmark event coinciding with International Internet Safety Day, Ivory Coast took a significant step forward in national cybersecurity...
The digital age has ushered in incredible advancements in technology, and one of the most significant and alarming developments has been the rise of...
In a steadfast effort to protect its users, Apple has released iPadOS 17.7.5, a significant update addressing a critical authorization vulnerability that could be...