Artificial intelligence is rapidly becoming a personal assistant for learning, productivity, creativity, and decision-making. But who gets access to powerful AI - and at what...
Cybersecurity across the Middle East & Africa is shifting from awareness campaigns to capability building. That shift requires accessible certification training, hands‑on labs, and...
Artificial intelligence is rapidly becoming a personal assistant for learning, productivity, creativity, and decision-making. But who gets access to powerful AI -...
Our inboxes are gateways to our personal and professional lives. They hold sensitive information, access credentials, and confidential communications. With phishing attacks,...
The financially motivated threat actor group, Magnet Goblin, has once again made headlines by deploying a new Linux variant of their custom malware, NerbianRAT....
A recently disclosed critical vulnerability in Fortinet's FortiOS operating system poses a serious threat to organizations using Fortinet SSL VPNs. This flaw, identified as...
Microsoft recently disclosed a data breach impacting a small percentage of its employees, primarily those working in cybersecurity and legal departments.
The attack, attributed...
Deepfakes, once primarily associated with humorous celebrity parodies, have evolved into a sophisticated tool for malicious actors.
Companies across various sectors are increasingly becoming...
The notorious Black Cat (also known as ALPHV) ransomware group has seemingly disappeared from the online landscape. Their servers, used to communicate with infected...
American Express (Amex) recently issued a security alert notifying cardholders of a data breach that potentially exposed their information through a third-party service provider....
Ransomware attacks, where malicious actors encrypt a victim's data and demand a ransom for its decryption, have become a major concern for individuals and...
The Cybersecurity and Infrastructure Security Agency (CISA) recently issued three critical advisories highlighting vulnerabilities in widely used Industrial Control Systems (ICS) components.
These vulnerabilities,...
In a concerning development, a recent cyberattack severely disrupted the operations of Change Healthcare, the largest healthcare payment system in the United States. This...
Cybersecurity concerns are heightened as the notorious cybercrime groups GhostSec and Stormous join forces to launch double-extortion ransomware attacks across over 15 countries.
This collaboration...
Apple has released security patches to address critical zero-day vulnerabilities impacting various iPhone, iPad, and Mac models.
These vulnerabilities, actively exploited in the wild,...
VMware, a leading provider of virtualization software, recently released security patches to address critical vulnerabilities affecting its popular products, ESXi, Workstation, and Fusion.
These...
In a significant move, the United States Department of Justice (DOJ) has taken down the infrastructure behind Predator, a powerful spyware tool used to...
The recent news that hackers behind the February 2024 attack on Change Healthcare, a major healthcare IT provider, allegedly received a $22 million ransom...
In a landmark agreement, the UAE Cyber Security Council and the International Telecommunication Union (ITU) have joined forces to enhance global cybersecurity capacity. This...
The Cybersecurity and Infrastructure Security Agency (CISA) recently added a single new entry to its Known Exploited Vulnerabilities (KEV) Catalog, raising concerns about the...
Cybersecurity researchers have identified a concerning tactic employed by the cybercriminal group TA577, highlighting a potential vulnerability within the NTLM (NT LAN Manager) authentication...
The world of artificial intelligence (AI) is not immune to cyber threats. Researchers have recently discovered a novel and concerning attack method: a self-propagating...
News of a major data breach at Chunghwa Telecom, Taiwan's largest telecommunications provider, has sent shockwaves across the nation.
Suspected Chinese hackers are believed to...
The Middle East is setting the pace for email security with a surprising surge in the adoption of Domain-based Message Authentication, Reporting & Conformance...