Artificial intelligence is rapidly becoming a personal assistant for learning, productivity, creativity, and decision-making. But who gets access to powerful AI - and at what...
Cybersecurity across the Middle East & Africa is shifting from awareness campaigns to capability building. That shift requires accessible certification training, hands‑on labs, and...
Artificial intelligence is rapidly becoming a personal assistant for learning, productivity, creativity, and decision-making. But who gets access to powerful AI -...
Our inboxes are gateways to our personal and professional lives. They hold sensitive information, access credentials, and confidential communications. With phishing attacks,...
Operation Cronos, a multinational law enforcement operation launched in April 2022, recently made headlines with its significant blow to the LockBit ransomware group.
This...
A recent series of cyberattacks targeting the IT infrastructure of Malawi's Department of Immigration and Citizenship Services (DICS) has sent shockwaves through the nation....
Email fraud is on the rise globally, and Australia’s higher education sector is no exception. According to recent research by Proofpoint, Inc., a leading...
North Korean state-sponsored hacking groups have once again raised alarm bells, with a recent report by German and South Korean intelligence agencies revealing a...
A recent security alert sent shivers through the online banking community – malicious actors leveraged Google's Cloud Run service to distribute several bank trojans....
The ever-shifting terrain of cyber threats and payment transactions demands adaptability in security standards.
With the recent appointment of Gina Gobeyn as the first...
A recent discovery of a massive data leak containing sensitive voter information from Iraq has sent shockwaves through the nation and beyond.
This incident...
A recent incident in a district council, where an insider allegedly stole over 80,000 emails, serves as a stark reminder of the vulnerabilities posed...
The European Commission has launched a formal investigation into TikTok, raising concerns about child protection and privacy practices on the popular video-sharing platform.
This...
On February 19th, 2024, several prestigious UK universities faced a coordinated Distributed Denial-of-Service (DDoS) attack, disrupting internet access and impacting critical IT services.
This...
The recent arrest of three suspected cybercriminals in Biho, Benin, serves as a reminder of the ongoing battle against cyber threats worldwide.
While this...
In a significant development, the notorious LockBit ransomware operation has been dealt a major blow. Authorities in various countries collaborated to take down the...
A recent leak on GitHub has raised concerns about a potential Chinese offensive cyber operation, drawing attention to the evolving landscape of cyber threats...
The ever-expanding digital landscape, coupled with increasingly sophisticated cyber threats, makes robust cybersecurity more crucial than ever. Thankfully, numerous innovative companies are rising to...
The ever-evolving digital landscape, coupled with the rising sophistication of cyber threats, makes robust cybersecurity more crucial than ever.
Thankfully, amidst this growing concern,...
In a recent move with significant implications for the cybersecurity landscape, Google unveiled its "AI Cyber Defense Initiative" at the Munich Security Conference.
This...
Vyacheslav Penchukov, once a notorious figure on the FBI's Cyber Most Wanted List and the alleged mastermind behind the Zeus and IcedID malware operations,...
In a significant move for the cybersecurity community, Google announced the open-sourcing of Magika, its AI-powered file identification tool, on February 15, 2024.
This...
The Cybersecurity and Infrastructure Security Agency (CISA) issued a warning on February 16, 2024, urging organizations to urgently patch a vulnerability in Cisco Adaptive...