Artificial intelligence is rapidly becoming a personal assistant for learning, productivity, creativity, and decision-making. But who gets access to powerful AI - and at what...
Cybersecurity across the Middle East & Africa is shifting from awareness campaigns to capability building. That shift requires accessible certification training, hands‑on labs, and...
Artificial intelligence is rapidly becoming a personal assistant for learning, productivity, creativity, and decision-making. But who gets access to powerful AI -...
Our inboxes are gateways to our personal and professional lives. They hold sensitive information, access credentials, and confidential communications. With phishing attacks,...
The CrowdStrike catastrophe that took down 8.5 million Windows PCs and servers in July through multiple blue screens of death across the Globe became...
The United States Attorney’s Office has unsealed an indictment against Joanna Smith-Griffin, the CEO and founder of AllHere Education, Inc., an artificial intelligence (AI)...
Bunnings Group Limited, a prominent retail chain in Australia, has been found guilty of breaching privacy laws through its use of facial recognition technology....
The Cybersecurity and Infrastructure Security Agency (CISA) has announced the launch of its new Learning Management System (LMS), which has replaced the Federal Virtual...
Cybercrime is an ever-evolving threat, with Africa being one of the most vulnerable regions due to its rapid digitalization and growing industrial sectors. To...
The electronic security sector is the backbone of safeguarding digital assets, critical infrastructure, and sensitive information in today's interconnected world. As cyber threats become...
As the global shopping frenzy of Black Friday approaches, cybercriminals are poised to exploit the increased online activity. In 2024, a financially motivated Chinese...
In October 2019, Facebook Inc. and its subsidiary WhatsApp Inc. filed a high-profile lawsuit against NSO Group Technologies Limited and Q Cyber Technologies Limited....
In an age where every online service, app, and website demands your email address, managing privacy and spam has become increasingly challenging. Google is...
In a major stride for global cybersecurity, the UAE Cyber Security Council recently conducted an insightful session on the Crystal Ball platform with representatives...
The CyberQ UAE Conference, hosted by the UAE Cyber Security Council, recently set a remarkable precedent by achieving not just one, but two Guinness...
Microsoft has rolled out its November 2024 Patch Tuesday updates, addressing critical security risks across its software ecosystem. The update resolves four actively exploited...
The MOVEit vulnerability, recently exploited by a hacker known as "Nam3L3ss," has resulted in a significant data breach affecting some of the world’s largest...
Exploring the Future of Cybersecurity: Key Takeaways from CyberQ UAE’s Day 1 Practical Track. The opening day of CyberQ UAE’s Practical Track brought cybersecurity...
Cybercriminals are increasingly employing Remcos Remote Access Trojan (RAT) in targeted campaigns that exploit unsuspecting users. In a recent wave of attacks, threat actors...
A recent discovery has revealed a serious vulnerability affecting legacy D-Link NAS (Network Attached Storage) models, including DNS-320, DNS-325, DNS-340L, and others that have...
As organizations expand their digital footprint, identity security has emerged as a cornerstone in protecting assets across complex cloud environments. The Permiso Security State...
The rapid rise of social media has transformed communication, connection, and knowledge-sharing across generations. Yet, these platforms have also brought significant risks, particularly for...