A new warning from the U.S. cybersecurity authorities has revealed a large-scale campaign by Russian intelligence-linked actors targeting commercial messaging applications (CMAs) not by breaking...
Dubai, UAE - February 4, 2026.Artificial intelligence is reshaping cybersecurity faster than many organizations can adapt and that reality was front and center during...
Our inboxes are gateways to our personal and professional lives. They hold sensitive information, access credentials, and confidential communications. With phishing attacks,...
The CyberQ UAE Conference, hosted by the UAE Cyber Security Council, recently set a remarkable precedent by achieving not just one, but two Guinness...
Microsoft has rolled out its November 2024 Patch Tuesday updates, addressing critical security risks across its software ecosystem. The update resolves four actively exploited...
The MOVEit vulnerability, recently exploited by a hacker known as "Nam3L3ss," has resulted in a significant data breach affecting some of the world’s largest...
Exploring the Future of Cybersecurity: Key Takeaways from CyberQ UAE’s Day 1 Practical Track. The opening day of CyberQ UAE’s Practical Track brought cybersecurity...
Cybercriminals are increasingly employing Remcos Remote Access Trojan (RAT) in targeted campaigns that exploit unsuspecting users. In a recent wave of attacks, threat actors...
A recent discovery has revealed a serious vulnerability affecting legacy D-Link NAS (Network Attached Storage) models, including DNS-320, DNS-325, DNS-340L, and others that have...
As organizations expand their digital footprint, identity security has emerged as a cornerstone in protecting assets across complex cloud environments. The Permiso Security State...
The rapid rise of social media has transformed communication, connection, and knowledge-sharing across generations. Yet, these platforms have also brought significant risks, particularly for...
As bizarre twist combining pet curiosity with cyber deception, a recent GootLoader campaign is leveraging Australians' interest in Bengal cats to deliver malware through...
In a recent security advisory, Hewlett Packard Enterprise (HPE) has issued critical patches for several vulnerabilities affecting Aruba Networking Access Points running Instant AOS-8...
On November 8, 2024, Palo Alto Networks and CISA alerted users to a critical vulnerability (CVE-2024-5910) in the Palo Alto Networks Expedition tool, potentially...
Cisco has recently disclosed a severe command injection vulnerability affecting its Unified Industrial Wireless Software, particularly when configured in Ultra-Reliable Wireless Backhaul (URWB) mode...
As remote work solidifies its role in today’s business landscape, organizations face new and complex cybersecurity challenges. A distributed workforce brings benefits in flexibility...
Recent reports indicate that MirrorFace, a China-aligned advanced persistent threat (APT) group, has broadened its scope of cyber espionage. Traditionally known for targeting Japanese...
In a significant decision that underscores growing global concerns over foreign tech investments, the Government of Canada recently ordered TikTok Technology Canada, Inc. to...
Cybersecurity experts are sounding the alarm on a new threat campaign by the North Korean-linked group BlueNoroff, which has deployed a sophisticated malware targeting...
In a rapidly evolving digital economy, remote work has opened unprecedented avenues for global talent acquisition. However, it has also given rise to unexpected...
The Cybersecurity and Infrastructure Security Agency (CISA) has announced the addition of four newly exploited vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, a...
In a strategic move to enhance the UAE's position as a global leader in artificial intelligence and cybersecurity, Grant Thornton UAE has partnered with...