Artificial intelligence is rapidly becoming a personal assistant for learning, productivity, creativity, and decision-making. But who gets access to powerful AI - and at what...
Cybersecurity across the Middle East & Africa is shifting from awareness campaigns to capability building. That shift requires accessible certification training, hands‑on labs, and...
Artificial intelligence is rapidly becoming a personal assistant for learning, productivity, creativity, and decision-making. But who gets access to powerful AI -...
Our inboxes are gateways to our personal and professional lives. They hold sensitive information, access credentials, and confidential communications. With phishing attacks,...
A recent report by Group-IB, a cybersecurity firm, sheds light on a concerning trend: Chinese cybercriminals utilizing deepfake technology in advanced mobile banking malware...
In a significant step towards data sovereignty, Mali has regained access to its previously outsourced biometrical data and launched the "Mali Kura Biometry" platform...
Bug bounty programs reward ethical hackers for discovering and responsibly reporting vulnerabilities in software and systems. These programs play a vital role in bolstering...
Bank of America customers are being notified of a recent data breach involving Infosys McCamish Systems, a provider of services for deferred compensation plans....
In February 2024, a ransomware attack crippled over 100 Romanian hospitals, disrupting critical healthcare services and highlighting the vulnerabilities of healthcare institutions in the...
A beacon of hope emerged recently in the fight against ransomware, with researchers from Kookmin University and the Korea Internet & Security Agency (KISA)...
The fight against cyber threats requires a robust defense, and at the heart of that defense lies skilled human capital.
Morocco, under the leadership...
The Cybersecurity and Infrastructure Security Agency (CISA) recently joined forces with the Open Source Security Foundation (OpenSSF) Securing Software Repositories Working Group to release...
A recent critical vulnerability in ExpressVPN's split tunneling feature has raised concerns about user privacy.
The bug, discovered by security researcher Tobias Alberti, caused...
Canada's recent proposal to ban the Flipper Zero, a multi-functional hacking tool, has ignited a heated debate within the cybersecurity community.
The move, aimed...
Cybersecurity alarm bells are ringing as attackers continue to exploit vulnerabilities in Microsoft Azure cloud environments, specifically targeting senior executives' accounts and Microsoft 365...
French citizens are reeling after a massive data breach exposed personal information of an estimated 33 million individuals, marking the country's largest known data...
The grim reality of ransomware attacks intensified in 2023, with reports indicating that payments to cybercriminals surpassed a staggering $1 billion.
This significant milestone,...
Cybersecurity threats are an ever-present reality, and nowhere is this more evident than in the Middle East.
With a rapidly evolving digital landscape and...
In a significant blow to cybercrime, the US Department of Justice (DoJ) recently announced the dismantling of the infrastructure behind Warzone RAT, a highly...
The recent cyberattack against the Armentières hospital in France serves as a stark reminder of the growing threats facing healthcare institutions globally.
This attack,...
Over one billion cyber threats detected in a single quarter – that's the stark reality Kenyan authorities faced in Q4 2023.
This staggering figure represents...
The fight against ransomware takes a dramatic turn as the US Department of State announces a staggering $10 million reward for information leading to...
Cisco has issued a critical security advisory about two high-severity vulnerabilities affecting its Expressway series of enterprise communication devices.
These flaws, tracked as CVE-2024-20252...
Fortinet, a leading cybersecurity vendor, has issued a critical security advisory warning of a severe vulnerability in its FortiOS operating system used in its...