The global cyber threat landscape is entering a new era one defined by automation, artificial intelligence, and increasingly sophisticated adversaries. The latest annual threat intelligence...
The conversation around Data Loss Prevention (DLP) is often filled with vendor promises and ambitious deployment plans. But what really happens when theory meets...
Our inboxes are gateways to our personal and professional lives. They hold sensitive information, access credentials, and confidential communications. With phishing attacks,...
The United States is stepping back from several international organizations, conventions, and cooperative frameworks - including those linked to cybersecurity and hybrid threat response...
A new phishing campaign is making the rounds globally, and it’s particularly dangerous because it hides in plain sight. By abusing legitimate Google Cloud...
At a time when cyber threats, physical security risks, and critical infrastructure vulnerabilities are converging, Intersec 2026 is set to return to Dubai with...
As cybersecurity risks grow in scale and impact, driven by AI-powered threats, geopolitical tensions, and digital transformation across public and private sectors, security events...
Class action complaints allege failure to protect sensitive patient data, raising fresh concerns over healthcare cybersecurity and third-party risk
Cognizant Technology Solutions, one of the...
Saudi Arabia’s cybersecurity sector received a major boost this week as Merak Capital announced a SAR 203 million (USD 54 million) investment in DSShield,...
Attackers exploit trusted Google Cloud workflows to deliver convincing phishing emails at scale, targeting enterprises worldwide
A newly uncovered phishing campaign has raised fresh alarms...
Kenya is moving to significantly strengthen its digital defenses with plans to establish a National Cybersecurity Agency, a move the government says will protect...
A quiet flaw with serious consequences - A critical security vulnerability in MongoDB is putting organizations worldwide at risk, allowing attackers to remotely leak...
Fortinet has confirmed active, in-the-wild abuse of FG-IR-19-283 (CVE-2020-12812), a vulnerability first disclosed in July 2020 that can allow attackers to bypass two-factor authentication...
Artificial intelligence is no longer just a workday productivity tool. In the UAE, it is rapidly becoming a holiday companion helping people plan trips,...
Phishing is no longer just about fake login pages and stolen passwords. According to new research from Proofpoint, threat actors are increasingly abusing a...
In an era where digital transformation defines national progress, cybersecurity has become the backbone of trust, resilience, and sovereignty. The UAE stands at the...
Cybersecurity across the Middle East & Africa is shifting from awareness campaigns to capability building. That shift requires accessible certification training, hands‑on labs, and...
WatchGuard has issued an urgent security advisory after confirming active exploitation of a critical vulnerability (CVE-2025-14733) affecting its widely deployed Firebox firewall appliances.
The flaw...
A flaw in UEFI firmware modules prevents proper IOMMU initialization, allowing physical attackers to bypass early-boot memory protections on affected motherboards.
A newly disclosed vulnerability...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released version 2.0 of its Cross-Sector Cybersecurity Performance Goals (CPGs), a significant update aimed at...