#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

36 C
Dubai
Friday, September 12, 2025

Popular:

Breaking News: Supply-Chain Breach Hits Palo Alto Networks and Zscaler via Salesloft’s Drift App

A widespread supply-chain cyberattack has unfolded, centering on OAuth tokens stolen from the Salesloft - Drift application - a third-party AI-powered sales tool that integrates...

Coordinated Brute-Force Campaign Targets Fortinet SSL VPN and FortiManager Services

On 3 August 2025, threat intelligence firm GreyNoise detected an unprecedented surge in brute-force attempts against Fortinet SSL VPNs - over 780 unique IPs...

Breaking news:

Stay on top of what's going on with our subscription deal!

Worldwide

Iran-Nexus Spear-Phishing Masquerades as Omani MFA to Target Global Governments

In August 2025, Dream’s Cyber Threat Intelligence (CTI) agents...

Malicious Versions of Nx NPM Packages Published: Developers Urged to Update Immediately

Cybersecurity researchers have discovered that malicious versions of the...

EFCC Arrests 37 Suspected Internet Fraudsters in Wukari, Taraba State

On 27 August 2025, the Economic and Financial Crimes...

PromptLock: ESET Uncovers First Known AI-Powered Ransomware

ESET researchers published on 27 August 2025 that they...

Nigeria Deports 42 Foreign Cybercriminals After Historic EFCC Raid; 150 More to Follow

On 18 August 2025, the Nigerian Immigration Service, in...

Google Play Enforces Stricter Global Licensing Rules for Cryptocurrency Apps

Google Play has introduced new, jurisdiction-specific licensing requirements for...

The Cost of a Call: How Voice Phishing Campaigns Escalated into Salesforce Data Extortion

A sophisticated cybersecurity campaign leveraging voice phishing (vishing) has...

Featured Interviews

#Interview: Navigating Security Challenges in the IoT Era: Insights from Industry...

Middle East

AI & Cybersecurity

The Top 10s

Fortressing Your Business Data: Top 10 Most Secure ERP Systems in 2024

In today's data-driven business landscape, Enterprise Resource Planning (ERP) software plays a critical role. It manages core functionalities like finance, inventory, human...
spot_imgspot_imgspot_imgspot_img

Africa

America

Asia

How To

What Is

spot_imgspot_imgspot_imgspot_img

Europe

Oceania

US Deports Notorious Australian Hacker After Landmark Cybercrime Conviction

DENVER/ADELAIDE – United States Immigration and Customs Enforcement (ICE)...

ASIC Sues FIIG Securities Over Cybersecurity Failures Leading to Data Theft

The Australian Securities and Investments Commission (ASIC) has launched...

Cybersecurity Breach at the University of Notre Dame Australia: Investigation Underway

The University of Notre Dame Australia is currently investigating...

Bunnings Faces Privacy Backlash Over Facial Recognition Technology Use

Bunnings Group Limited, a prominent retail chain in Australia,...
spot_imgspot_imgspot_imgspot_img

Hacked - Breached

spot_imgspot_imgspot_imgspot_img

Zero-Day

spot_imgspot_imgspot_imgspot_img

Cryptocurrencies

spot_imgspot_imgspot_imgspot_img

Cloud Security

spot_imgspot_imgspot_imgspot_img

Ransomware

Latest Articles

Crocodilus Mobile Malware Evolves: Banking Trojan Expands Global Reach with Enhanced Capabilities

03 June 2025 - A once regionally focused Android banking Trojan called Crocodilus has surged onto the global stage with advanced capabilities. Newly discovered...

Major Cybercrime Blow: Authorities Seize Websites Selling Hacking Tools to Cybercriminals

Global Cybercrime Disruption Hits Underground Malware Ecosystem. On 27 May 2025, a sweeping international law enforcement operation resulted in the seizure of multiple domains...

Meta’s Q1 2025 Integrity Reports Reveal Spike in Bullying Content, Rise in Global CyberTips, and New AI Moderation Tools

30 May 2025 - Meta has published its Q1 2025 Integrity Reports, revealing significant shifts in its content moderation strategy, threat disruption efforts, and...

Cybercriminals Camouflage Malware as AI Tools in Sophisticated New Campaign

A surge of new cybersecurity threats has been uncovered by Cisco Talos, revealing a campaign in which malicious actors disguise malware and ransomware as...

Victoria’s Secret Hit by Security Incident: Website, Email, and Operations Disrupted

On 28 May 2025, Victoria’s Secret & Co. suffered a significant security incident that disrupted its digital infrastructure, including website availability, internal email systems,...

Unpatched Zero-Day in TI WooCommerce Wishlist Plugin Exposes Over 100K Sites to RCE Risk

A critical unauthenticated file upload flaw in the TI WooCommerce Wishlist plugin, tracked as CVE-2025-47577, remains unpatched leaving over 100,000 WordPress e-commerce sites exposed...

APT41 Unmasked: Chinese Cyber-Espionage Group Uses Google Calendar for Covert Attacks

On 23 October 2024, Google’s Threat Intelligence Group (GTIG) revealed a sophisticated campaign by Chinese state-linked threat actor APT41, leveraging Google Calendar as command-and-control...

Everest Ransomware Leaks Coca-Cola Employee Data: Middle East Staff Records Exposed Online

On 22 May 2025, cybersecurity sources confirmed a major data breach targeting Coca-Cola Company’s Middle East operations. Claimed by the Everest ransomware group, the...

Global WAAP Attacks Surge to 887.4 Billion: CDNetworks Report Warns of AI-Driven Cyber Onslaught in 2024

SINGAPORE | 28 May 2025 - CDNetworks’ 2024 State of Web Application and API Protection (WAAP) Report reveals a staggering 887.4 billion web and...

Mobile Malware Surge in the Middle East: Kaspersky Reports 43% Spike in Q1 2025

In the first quarter of 2025, mobile cyberattacks in the Middle East surged by 43%, reaching over 57,000 incidents, according to Kaspersky's latest findings....

Void Blizzard: Russia-Linked Threat Actor Escalates Cyberespionage on Critical Sectors Globally

A newly identified Russia-affiliated threat actor Void Blizzard (also tracked as LAUNDRY BEAR) has ramped up cyberespionage campaigns against key sectors across Europe, North...

Silent Ransom Group Launches Cyber Extortion Campaigns Against Law Firms Using Callback Phishing

The cyber threat actor Silent Ransom Group (SRG) also known as Luna Moth, Chatty Spider, and UNC3753 is aggressively targeting U.S. law firms with...

Russia-Aligned TAG-110 Targets Tajikistan with Macro-Enabled Word Documents

Between January and February 2025, TAG-110, a Russia-aligned cyber-espionage group linked to APT28, launched a targeted phishing campaign against Tajikistan using macro-enabled Word template...

ANSSI Elevates Cyber Defense Capabilities with FBI-Led Training

Joint cybersecurity initiative with FBI boosts Ivorian agency's technical readiness amid escalating threats From 19 to 23 May 2025, Côte d’Ivoire’s National Agency for the...

Winos 4.0 Campaign Unmasked NSIS Abuse, sRDI Shellcode, and a Stealthy Global Threat

A stealth malware campaign leveraging trojanized NSIS installers and advanced in-memory shellcode execution has been tracked by Rapid7 since February 2025. Known as “Winos...

ANSSI-CI Releases 2024 Cybercrime Report and Legal Security Guide at Côte d’Ivoire’s First Digital Rights Days

ABIDJAN, Côte d’Ivoire - 22 May 2025 - The National Agency for the Security of Information Systems of Côte d’Ivoire (ANSSI-CI) has unveiled its...

ViciousTrap Turns 15,000+ Edge Devices into Global Honeypots – New Tactics Threaten Critical Infrastructure Visibility

On 18 May 2025, threat intelligence firm Sekoia.io revealed an ongoing cyber campaign dubbed ViciousTrap, which has compromised over 15,000 edge devices worldwide primarily...

Adidas Customer Data Breach: Contact Information Stolen via Third-Party Provider

Global sportswear brand Adidas has disclosed a data breach involving unauthorized access to consumer contact information through a third-party customer service vendor. The incident...

Operation ENDGAME Strikes Again: Global Law Enforcement Breaks Ransomware Kill Chain at the Source

In a sweeping international crackdown, law enforcement agencies dismantled the infrastructure behind multiple ransomware operations from 19 to 22 May 2025. Dubbed Operation ENDGAME,...

Google Chrome Introduces AI-Powered Automatic Password Change Feature To Enhance Password Security

In a groundbreaking update announced on 15 May 2025, Google revealed a sweeping overhaul to Chrome’s identity and authentication framework introducing unified sign-in flows,...

Subscribe

- Gain full access to our premium content

- Never miss a story with active notifications

- Browse free from up to 5 devices at once

Patched

spot_imgspot_imgspot_imgspot_img

Bug Bounty

Bug Bounty Bonanza: WazirX Launches Program After $230 Million Cyberattack

In the ever-changing landscape of cybersecurity, the Indian cryptocurrency...

Why Your Company Needs a Bug Bounty Program: A Proactive Approach to Cybersecurity

In today's ever-evolving digital landscape, cybersecurity threats are a...

Big Bucks for Bugs: Google’s $10 Million Bug Bounty Award and Lessons for Responsible Disclosure

In the ever-evolving battle against cybercrime, bug bounty programs...
spot_imgspot_imgspot_imgspot_img

ISC/SCADA Security

spot_imgspot_imgspot_imgspot_img

IAM