Artificial intelligence is rapidly becoming a personal assistant for learning, productivity, creativity, and decision-making. But who gets access to powerful AI - and at what...
Cybersecurity across the Middle East & Africa is shifting from awareness campaigns to capability building. That shift requires accessible certification training, hands‑on labs, and...
Artificial intelligence is rapidly becoming a personal assistant for learning, productivity, creativity, and decision-making. But who gets access to powerful AI -...
Our inboxes are gateways to our personal and professional lives. They hold sensitive information, access credentials, and confidential communications. With phishing attacks,...
Fortinet has confirmed active, in-the-wild abuse of FG-IR-19-283 (CVE-2020-12812), a vulnerability first disclosed in July 2020 that can allow attackers to bypass two-factor authentication...
Artificial intelligence is no longer just a workday productivity tool. In the UAE, it is rapidly becoming a holiday companion helping people plan trips,...
Phishing is no longer just about fake login pages and stolen passwords. According to new research from Proofpoint, threat actors are increasingly abusing a...
In an era where digital transformation defines national progress, cybersecurity has become the backbone of trust, resilience, and sovereignty. The UAE stands at the...
Cybersecurity across the Middle East & Africa is shifting from awareness campaigns to capability building. That shift requires accessible certification training, hands‑on labs, and...
WatchGuard has issued an urgent security advisory after confirming active exploitation of a critical vulnerability (CVE-2025-14733) affecting its widely deployed Firebox firewall appliances.
The flaw...
A flaw in UEFI firmware modules prevents proper IOMMU initialization, allowing physical attackers to bypass early-boot memory protections on affected motherboards.
A newly disclosed vulnerability...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released version 2.0 of its Cross-Sector Cybersecurity Performance Goals (CPGs), a significant update aimed at...
A new malicious campaign targeting Visual Studio Code (VS Code) extensions has been uncovered - and it's one of the most technically deceptive supply-chain...
Microsoft has rolled out its December 2025 Patch Tuesday updates, addressing critical security risks across its software ecosystem. The update resolves 57 vulnerabilities which...
AmiViz, widely recognized as one of the Middle East’s most influential cybersecurity-focused value-added distributors is gearing up for a major presence at Black Hat...
A major cybercrime campaign is sweeping across Brazil this time riding directly through victims’ WhatsApp Web sessions. Security researchers at K7 Labs revealed a...
What many hoped was a one-off incident has now escalated into one of the most sophisticated and aggressive supply-chain malware campaigns seen this year....
A newly identified Android banking trojan, Sturnus, has entered the cybercrime ecosystem with a level of sophistication that security researchers are calling “a turning...
Kenya is investigating a major cybersecurity incident after hackers infiltrated several government websites - including president.go.ke, the official portal of the Presidency - temporarily...
According to the U.S. Department of Justice, U.S. authorities have executed one of the most significant nationwide crackdowns yet on North Korea’s covert revenue-generation...