Artificial intelligence is rapidly becoming embedded in cybersecurity workflows from threat hunting to penetration testing. But relying on cloud-based AI services introduces privacy risks, data...
Abu Dhabi, UAE – 3 February 2026 – GISEC Global, the Middle East and Africa’s largest and most influential cybersecurity event, has announced the launch of the Cyber Diplomacy...
Artificial intelligence is rapidly becoming embedded in cybersecurity workflows from threat hunting to penetration testing. But relying on cloud-based AI services introduces...
Our inboxes are gateways to our personal and professional lives. They hold sensitive information, access credentials, and confidential communications. With phishing attacks,...
In a startling development that underscores the ever-present threat of cybercrime, Orange Group, a leading French telecommunications operator and digital service provider, has confirmed...
As a groundbreaking move to transform the operational technology (OT) cybersecurity landscape, CQR—Saudi Arabia’s premier OT cybersecurity firm—has successfully raised $3 million in strategic...
On February 20, 2025, in a groundbreaking move to enhance investor protection in an increasingly digital economy, the U.S. Securities and Exchange Commission (SEC)...
Recent investigations by cybersecurity experts have uncovered a sophisticated malware campaign in the Asia-Pacific (APAC) region, with a distinct focus on Chinese-speaking targets. Dubbed...
The Dubai-based cryptocurrency exchange Bybit was hit by a cyberattack, resulting in the theft of $1.5 billion worth of Ethereum (ETH), the second-largest cryptocurrency...
In a dramatic revelation that underscores the complex interplay between state directives and private cybersecurity enterprises in China, a recent data leak has exposed...
On February 18, 2025, Cloud Software Group announced the release of new builds that fix a critical vulnerability CVE-2024-12284 in the NetScaler Console and...
In March 2024, the Cyber Emergency Center confirmed a new attack campaign dubbed "RevivalStone" orchestrated by the notorious Chinese-based threat actor group, Winnti Group....
On February 11, 2025, a critical out-of-cycle security bulletin was issued concerning Juniper Networks’ Session Smart Router, Session Smart Conductor, and WAN Assurance Managed...
As cybercriminals continually refine their tactics, Android 16 is set to deliver a robust countermeasure aimed at one of the most insidious scam techniques—manipulating...
Microsoft has rolled out its February 2025 Patch Tuesday updates, addressing critical security risks across its software ecosystem. The update resolves 63 vulnerabilities which...
In a recent disclosure that has sent ripples across the cybersecurity community, a critical authentication bypass vulnerability CVE-2025-0411 has been identified in Palo Alto...
In a landmark disclosure, Microsoft Threat Intelligence has, for the first time, published its in‐depth research on a previously covert subgroup operating within the...
On February 11, 2025, in a landmark event coinciding with International Internet Safety Day, Ivory Coast took a significant step forward in national cybersecurity...
The digital age has ushered in incredible advancements in technology, and one of the most significant and alarming developments has been the rise of...
In a steadfast effort to protect its users, Apple has released iPadOS 17.7.5, a significant update addressing a critical authorization vulnerability that could be...
As the digital landscape continues to evolve, the rise of artificial intelligence and machine learning technologies has opened up new possibilities and challenges for...
The Kraken Ransomware group has reportedly compromised Cisco's internal network, stealing sensitive credentials. These credentials have been published on the group's dark web blog,...