#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

15 C
Dubai
Wednesday, February 5, 2025

Popular:

macOS FlexibleFerret: Further Variants of DPRK Malware Family Unearthed

The cybersecurity landscape continues to evolve, with nation-state actors increasingly targeting macOS systems. In a recent development, Apple has pushed updates to its on-device malware...

Corpolgia and Forte Secur Group Join Forces to Elevate Security Training Standards in the UAE

In a groundbreaking collaboration, Corpolgia, a leader in corporate governance under the La Stella Group, has partnered with Forte Secur Group, a globally recognized...

Breaking news:

Drones in Defense: Enhancing Security Measures with Unmanned Aerial Systems

Drones have transformed military operations by providing real-time intelligence,...

CVE-2025-0411: Ukrainian Organizations Targeted in Zero-Day Campaign and Homoglyph Attacks

In a concerning development for cybersecurity professionals worldwide, Ukrainian...

The Double-Edged Sword: When Drones Become a Threat to Security

Drones, or Unmanned Aerial Vehicles (UAVs), have revolutionized industries,...

Stay on top of what's going on with our subscription deal!

Worldwide

Toward Greater Transparency: Unveiling Cloud Service CVEs

The landscape of cybersecurity is rapidly evolving, and cloud-based...

Justice Department Seizes 39 Cybercrime Websites Selling Hacking Tools to Organized Crime Groups

In a significant international law enforcement operation, the U.S....

Aircraft Collision Avoidance Systems is Vulnerable to Un-patchable Flaws : CISA

American Cyber Défense Agency (CISA) has warned about flaws...

CVE-2024-50050: Critical Vulnerability in Meta’s Llama-Stack Puts AI Applications at Risk

Meta’s Llama-Stack, a prominent framework for developing and deploying...

Cisco Meeting Management REST API Vulnerability: Privilege Escalation Risk Exposed

On January 22, 2025, Cisco disclosed a critical vulnerability...

Establishing the Association of Information Security Professionals in the Republic of Guinea (APSI-GN)

Strengthening Cybersecurity in Guinea: A Collaborative Initiative. In an...

Corpolgia and Forte Secur Group Join Forces to Elevate Security Training Standards in the UAE

In a groundbreaking collaboration, Corpolgia, a leader in corporate...

Featured Interviews

#Interview: Navigating Security Challenges in the IoT Era: Insights from Industry...

Middle East

AI & Cybersecurity

The Top 10s

Fortressing Your Business Data: Top 10 Most Secure ERP Systems in 2024

In today's data-driven business landscape, Enterprise Resource Planning (ERP) software plays a critical role. It manages core functionalities like finance, inventory, human...
spot_imgspot_imgspot_imgspot_img

Africa

America

Asia

How To

What Is

spot_imgspot_imgspot_imgspot_img

Europe

Oceania

spot_imgspot_imgspot_imgspot_img

Hacked - Breached

spot_imgspot_imgspot_imgspot_img

Zero-Day

spot_imgspot_imgspot_imgspot_img

Cryptocurrencies

spot_imgspot_imgspot_imgspot_img

Cloud Security

spot_imgspot_imgspot_imgspot_img

Ransomware

Latest Articles

Double Trouble: Facebook Trackers Masquerading as Credit Card Skimmers

Cybercriminals are constantly devising new methods to steal your personal information. Recently, cybersecurity researchers uncovered a devious scheme involving malicious code disguised as a...

Beware of Hidden Visitors: New Android Spyware Targets South Asia

Mobile phone users in Pakistan and India are on high alert following the discovery of a new espionage campaign targeting Android devices. Cybersecurity researchers...

Invoice Intrigue: TA547 Targets German Firms with Rhadamanthys Stealer

German organizations are on high alert following a phishing campaign targeting them with a novel information stealer. The culprit? A financially motivated threat actor...

Exposed Taxi Trips: Dublin iCabbi Data Breach Leaks 300,000 Passengers’ Information

A recent data breach at iCabbi, a Dublin-based dispatch and fleet management technology provider for taxis, has exposed the personal information of nearly 300,000...

The Guardians of Cyberspace: Top 10 Cybersecurity Experts Making a Difference

The fight for a secure digital world relies on the dedication and expertise of countless individuals. These cybersecurity champions work tirelessly to develop solutions,...

Patch Now: Fortinet Addresses Critical RCE Vulnerability in FortiClientLinux

A recent security advisory from Fortinet highlights the importance of timely patching for system administrators. The advisory addresses a critical remote code execution (RCE) vulnerability...

Lens Giant Hoya Hit with $10 Million Ransomware Demand: A Closer Look at the Attack

Japanese optics giant Hoya Corporation, a leading manufacturer of lenses and medical equipment, recently became the target of a ransomware attack. The attack disrupted...

Urgent Action: US Agencies Scramble to Contain Fallout from Microsoft Email Breach

In a recent development raising national security concerns, the Cybersecurity and Infrastructure Security Agency (CISA) issued an emergency directive to all Federal Civilian Executive...

Air Algérie Targeted: Phishing Scam or Something More Sinister?

Airline passengers are being warned about a potential cyberattack targeting Air Algérie. The reported attack involves a spoofed website, raising concerns about phishing attempts...

French Football Federation and PSG Targeted in Cyberattack: What You Need to Know

News broke recently regarding a cyberattack targeting the French Football Federation (FFF) and Paris Saint-Germain (PSG), a prominent French football club. While details are...

Urgent Patch Required: Critical Palo Alto Networks OS Flaw Under Active Attack

A recently discovered critical vulnerability in Palo Alto Networks' PAN-OS operating system is under active exploitation by attackers. This zero-day flaw, identified as CVE-2024-3400...

Africa and China: AI Collaboration with a Cybersecurity Side-Eye

China's push for increased collaboration with African nations on Artificial Intelligence (AI) offers a promising avenue for technological advancement and economic growth on the...

Funding the Future: Top 10 Cybersecurity Venture Capital Firms to Watch in 2024

The cybersecurity landscape is constantly evolving, demanding innovative solutions to combat ever-sophisticated threats. Venture Capital (VC) firms play a crucial role in fueling this...

£11.3 Billion Bonanza for Fraudsters: UK Retailers Face Mounting Losses

Retailers beware! A recent study by Adyen and the Centre for Economic Business Research (CEBR) paints a concerning picture of the financial toll fraud...

Fortress or Phoenix: Understanding Cybersecurity vs. Cyber Resilience

In today's ever-evolving digital landscape, two crucial concepts dominate the cybersecurity discourse: cybersecurity and cyber resilience. While the terms may sound similar, they represent...

Under Scrutiny: Hackers Target Human Rights Activists in Morocco and Western Sahara

Human rights activists play a vital role in holding governments accountable and advocating for justice. However, their dedication to positive change often places them...

Sticky Fingers in the Sand: Solar Spider Targets Saudi Arabian Banks with New Malware

Financial institutions around the world are constantly under siege by cybercriminals. The latest threat comes from a sophisticated group known as Solar Spider, which...

90,000 D-Link NAS Devices Under Attack: Patch Now or Face Takeover Risk

Attention home cloud storage users! Over 90,000 D-Link Network Attached Storage (NAS) devices are currently vulnerable to a critical security exploit. This puts sensitive...

LG Smart TVs Exposed: Patch Now to Avoid Takeover Risk

Attention LG Smart TV owners! A recent discovery by cybersecurity researchers reveals critical vulnerabilities in several LG webOS models, putting your smart TV at...

LG Smart TVs Exposed: Patch Now to Avoid Takeover Risk

Attention LG Smart TV owners! A recent discovery by cybersecurity researchers reveals critical vulnerabilities in several LG webOS models, putting your smart TV at...

Subscribe

- Gain full access to our premium content

- Never miss a story with active notifications

- Browse free from up to 5 devices at once

Patched

macOS FlexibleFerret: Further Variants of DPRK Malware Family Unearthed

The cybersecurity landscape continues to evolve, with nation-state actors...
spot_imgspot_imgspot_imgspot_img

Bug Bounty

Bug Bounty Bonanza: WazirX Launches Program After $230 Million Cyberattack

In the ever-changing landscape of cybersecurity, the Indian cryptocurrency...

Why Your Company Needs a Bug Bounty Program: A Proactive Approach to Cybersecurity

In today's ever-evolving digital landscape, cybersecurity threats are a...

Big Bucks for Bugs: Google’s $10 Million Bug Bounty Award and Lessons for Responsible Disclosure

In the ever-evolving battle against cybercrime, bug bounty programs...
spot_imgspot_imgspot_imgspot_img

ISC/SCADA Security

Aircraft Collision Avoidance Systems is Vulnerable to Un-patchable Flaws : CISA

American Cyber Défense Agency (CISA) has warned about flaws...

Cyber Resilience in Critical Infrastructure: Securing Essential Services Against Digital Attacks

As digital transformation reshapes industries worldwide, critical infrastructure sectors...
spot_imgspot_imgspot_imgspot_img

IAM