Security researchers have uncovered a technique that allows attackers to abuse Cortex XDR’s Live Response feature as a covert command-and-control (C2) channel - effectively turning...
On 28 January 2026, Abu Dhabi will host one of the most discreet yet strategically significant cybersecurity gatherings of the year. The Cyber Envoy’s...
In a year where cybercriminals increasingly weaponized artificial intelligence to launch more convincing scams and stealthier malware, Google has dramatically scaled its...
Our inboxes are gateways to our personal and professional lives. They hold sensitive information, access credentials, and confidential communications. With phishing attacks,...
The world of artificial intelligence (AI) is not immune to cyber threats. Researchers have recently discovered a novel and concerning attack method: a self-propagating...
News of a major data breach at Chunghwa Telecom, Taiwan's largest telecommunications provider, has sent shockwaves across the nation.
Suspected Chinese hackers are believed to...
The Middle East is setting the pace for email security with a surprising surge in the adoption of Domain-based Message Authentication, Reporting & Conformance...
German law enforcement continues to disrupt online criminal marketplaces with the recent takedown of "Crimemarket,” a platform facilitating the trade of drugs, weapons, and...
European consumer groups have reignited the debate surrounding online privacy with a recent complaint against Meta, the company behind Facebook, Instagram, and WhatsApp.
The...
In a proactive move to bolster cybersecurity in the United Arab Emirates (UAE), the UAE Cybersecurity Council has launched the "National Campaign for Cybersecurity."...
A recent cyberattack by the notorious Lazarus Group targeting Windows systems has raised serious concerns about a previously unknown vulnerability.
This article explores the...
Attention developers using JetBrains TeamCity On-Premises! A recent discovery of critical security vulnerabilities poses a significant risk of server takeover by malicious actors.
This...
The recent cyber attack on the Companies and Intellectual Property Commission (CIPC) of South Africa, which exposed the personal information of millions of individuals...
The cybersecurity landscape faces a renewed challenge with the resurfacing of Phobos ransomware, a strain that has been targeting critical infrastructure entities in the...
The past few days have seen a surge in cyberattacks targeting European entities, with the hacktivist collective NoName057 claiming responsibility.
This article delves into...
The recent discovery of an open-source Remote Access Trojan (RAT) named "Xeno RAT" on GitHub has sparked concerns within the cybersecurity community.
While the...
Somalia recently took a significant step towards safeguarding the privacy of its citizens with the official launch of its Data Protection Authority (DPA) on...
The National Institute of Standards and Technology (NIST) recently announced the official release of the Cybersecurity Framework (CSF) 2.0. This long-awaited update to the...
In a recent report, the White House Office of the National Cyber Director (ONCD) has stressed the critical importance of eliminating memory safety vulnerabilities...
The Gulf region is experiencing a significant shift in its approach to cybersecurity, with a rapid acceleration in the adoption of zero-trust security practices....
WordPress website owners, brace yourselves! A recent vulnerability discovered in the popular LiteSpeed Cache plugin has exposed millions of websites to potential attacks.
This...
News of the infamous LockBit ransomware group's resurgence after a brief takedown in February 2024 has sent shivers down the spines of cybersecurity professionals...
The Open Web Application Security Project (OWASP) recently released a crucial resource for organizations venturing into the exciting realm of generative AI (GAI). Their...