Between March and June 2025, Proofpoint researchers tracked three distinct China‑aligned threat actors launching spear‑phishing campaigns against Taiwanese semiconductor firms, design houses, service providers, and financial...
Dubai, 23 June 2025 - A new Cohesity study on “Employee readiness to confront cyber threats” found that full-time employees in the UAE significantly...
The UAE-based cybersecurity leader CPX has released a groundbreaking whitepaper, "Securing Operational Technology with Trust and Collaboration" (July...
In today's data-driven business landscape, Enterprise Resource Planning (ERP) software plays a critical role. It manages core functionalities like finance, inventory, human...
As artificial intelligence (AI) becomes increasingly integrated into our daily communication tools, ensuring the privacy and security of user data has never been more...
In the ever-evolving landscape of cybersecurity, zero-day vulnerabilities remain a formidable challenge. These are security flaws unknown to the software vendor, exploited by attackers...
In a strategic move to bolster the resilience of Congo’s digital infrastructure, the Agence de Régulation des Postes et des Communications Électroniques (ARPCE) and...
As organizations increasingly adopt Kubernetes and containerized workloads, the attack surface for cyber threats has expanded dramatically. According to Microsoft Threat Intelligence, 51% of...
The cybersecurity landscape is evolving at breakneck speed, and nowhere is this more evident than at GISEC Global 2025, the Middle East and Africa’s...
GISEC Global 2025, scheduled from May 6–8 at the Dubai World Trade Centre, is the Middle East and Africa's premier cybersecurity event, attracting over...
A Looming Threat to Critical Business Systems. On April 22, 2025, cybersecurity firm ReliaQuest revealed an active exploitation campaign targeting SAP NetWeaver, the backbone...
The Cybersecurity Event Landscape in 2025. As the global cybersecurity market surges to $300 billion (Gartner, 2025), industry events have become critical hubs for...
A Critical Orchestration Misstep in Google Cloud. In March 2025, Tenable Research uncovered ConfusedComposer, a privilege escalation vulnerability in Google Cloud Platform (GCP) that...
To Redefining Enterprise Security at Scale, Microsoft recently released its second Secure Future Initiative (SFI) progress report, detailing unprecedented advancements in securing its ecosystem,...
A critical vulnerability in InstaWP Connect, a popular WordPress plugin with over 500,000 active installations, has exposed millions of websites to remote code execution...
Where the Cybersecurity Elite Converge. GISEC Global, the Middle East and Africa’s largest cybersecurity event, returns to Dubai World Trade Centre from 6-8 May...
A Landmark Partnership for Digital Resilience. In a significant move to strengthen the United Arab Emirates' cyber defenses, the Sharjah Cyber Security Center (SCSC)...
A Vintage Cyberattack with a Malicious Aftertaste. In April 2025, cybersecurity researchers at Check Point Research (CPR) uncovered a sophisticated phishing campaign targeting European...
In a move to bolster national cyber hygiene and instill digital responsibility among the youth, Algeria’s National Agency for Information Systems Security (ANSSI), under...