Enterprise defenders using Atlassian products are facing a broad patching imperative after the company disclosed 31 high-severity and 7 critical-severity vulnerabilities affecting multiple widely deployed...
In an era where digital interactions define business, governance, and daily life, identity has become the new security perimeter. Episode 12 of the Dubai...
The rapid adoption of artificial intelligence across financial services is creating a dangerous imbalance: innovation is accelerating, but governance and cybersecurity controls...
Our inboxes are gateways to our personal and professional lives. They hold sensitive information, access credentials, and confidential communications. With phishing attacks,...
What many hoped was a one-off incident has now escalated into one of the most sophisticated and aggressive supply-chain malware campaigns seen this year....
A newly identified Android banking trojan, Sturnus, has entered the cybercrime ecosystem with a level of sophistication that security researchers are calling “a turning...
Kenya is investigating a major cybersecurity incident after hackers infiltrated several government websites - including president.go.ke, the official portal of the Presidency - temporarily...
According to the U.S. Department of Justice, U.S. authorities have executed one of the most significant nationwide crackdowns yet on North Korea’s covert revenue-generation...
Those fake text messages about “unpaid tolls” or “stuck delivery packages” are not harmless spam, they’re part of a massive, organized scam network defrauding...
SAP has rolled out its November 2025 Security Patch Day, addressing 18 newly discovered vulnerabilities and two updates to previous advisories. The latest security...
Cybercriminals have launched a highly convincing phishing campaign targeting both Booking.com hotels and their guests, exploiting stolen credentials, compromised accounts, and realistic messages that...
At the CISO Middle East Summit 2025 – UAE Edition in Dubai, a standout session brought together two influential voices in cybersecurity: Betania ALLO,...
As global passenger numbers soar, IATA’s biometric-driven “One ID” initiative aims to replace passports and paper processes with a secure, seamless, and fully digital...
In a revealing new report, cybersecurity researchers at Proofpoint have uncovered a sophisticated espionage campaign attributed to a previously unidentified Iranian-aligned threat actor known...
China has announced sweeping amendments to its Cybersecurity Law (CSL) and launched new incident reporting rules, signaling a decisive move toward stronger governance of...
A new and highly sophisticated mobile banking Trojan, dubbed Android/BankBot-YNRK, has emerged, targeting Android users across multiple regions. The malware, analyzed in-depth by Cyfirma,...
Security researchers at TierZeroSecurity have published a proof-of-concept Beacon Object File (BOF) that can extract Microsoft Teams session cookies from a user process, enabling...
A new wave of phishing attacks is sweeping across East and Southeast Asia, targeting government and financial organizations through multilingual ZIP file lures and...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two new security flaws to its Known Exploited Vulnerabilities (KEV) Catalog, warning that attackers...
In the latest episode of the Dubai Cyber Show & Podcast Series, Ouaissou DEMBELE, Founder & CEO of Sainttly Group and Editor-in-Chief of Cybercory.com,...