#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

34 C
Dubai
Friday, April 4, 2025

Popular:

Apple Fined €150 Million by French Competition Authority Over ATT Implementation

Apple finds itself under scrutiny once more due to its controversial privacy practices. The French competition authority, Autorité de la concurrence, has imposed a €150...

FBI Warns of Sophisticated Data Extortion Scam Targeting Corporate Executives

On March 06, 2025, the FBI’s Internet Crime Complaint Center (IC3) issued a stark warning to corporate leaders across the nation: a new data...

Breaking news:

Stay on top of what's going on with our subscription deal!

Worldwide

Oracle Cloud Hit By Alleged Data Breach Exposing 6 Millions Records

Oracle Cloud has been targeted by a threat actor,...

SonicWall Strengthens MSP Cybersecurity with SonicSentry MXDR

On March 5, 2025, SonicWall unveiled SonicSentry MXDR, a...

CrowdStrike and NVIDIA Partner to Revolutionize AI-Driven Cybersecurity

The cybersecurity landscape is evolving rapidly, with adversaries leveraging...

Google Acquires Wiz for $32 Billion: Strengthening Multicloud Security

Google has announced a landmark agreement to acquire Wiz,...

Siemens Products Exposed to Multiple Vulnerabilities: A Comprehensive Analysis

On February 11, 2025, Siemens disclosed several security vulnerabilities...

FBI Warns of Sophisticated Data Extortion Scam Targeting Corporate Executives

On March 06, 2025, the FBI’s Internet Crime Complaint...

Featured Interviews

#Interview: Navigating Security Challenges in the IoT Era: Insights from Industry...

Middle East

AI & Cybersecurity

The Top 10s

Fortressing Your Business Data: Top 10 Most Secure ERP Systems in 2024

In today's data-driven business landscape, Enterprise Resource Planning (ERP) software plays a critical role. It manages core functionalities like finance, inventory, human...
spot_imgspot_imgspot_imgspot_img

Africa

America

Asia

How To

What Is

spot_imgspot_imgspot_imgspot_img

Europe

Oceania

Bunnings Faces Privacy Backlash Over Facial Recognition Technology Use

Bunnings Group Limited, a prominent retail chain in Australia,...

Taking Actions To Protect Children: Australia’s Stand Against Kids Social Media Risks

The rapid rise of social media has transformed communication,...

Navigating Privacy and AI: Guidance from the Australian Office of Information Commissioner

As artificial intelligence (AI) technology continues to evolve and...
spot_imgspot_imgspot_imgspot_img

Hacked - Breached

spot_imgspot_imgspot_imgspot_img

Zero-Day

spot_imgspot_imgspot_imgspot_img

Cryptocurrencies

spot_imgspot_imgspot_imgspot_img

Cloud Security

spot_imgspot_imgspot_imgspot_img

Ransomware

Latest Articles

Dedalus Biologie Data Breach: Safeguarding Medical Records

Introduction: In the ever-evolving landscape of cybersecurity, Dedalus Biologie found itself at the center of a massive data breach in February 2021, shaking the...

10 Inspiring Women in Cybersecurity Leading the Charge

In the male-dominated world of cybersecurity, these 10 women are making their mark with their skills, experience, and leadership. Cybersecurity is one of the most...

10 Remarkable Women in Cybersecurity in Africa You Should Know About

Cybersecurity is a critical aspect of the modern digital world, and women are playing an essential role in securing it. In Africa, women are...

Subscribe

- Gain full access to our premium content

- Never miss a story with active notifications

- Browse free from up to 5 devices at once

Patched

spot_imgspot_imgspot_imgspot_img

Bug Bounty

Bug Bounty Bonanza: WazirX Launches Program After $230 Million Cyberattack

In the ever-changing landscape of cybersecurity, the Indian cryptocurrency...

Why Your Company Needs a Bug Bounty Program: A Proactive Approach to Cybersecurity

In today's ever-evolving digital landscape, cybersecurity threats are a...

Big Bucks for Bugs: Google’s $10 Million Bug Bounty Award and Lessons for Responsible Disclosure

In the ever-evolving battle against cybercrime, bug bounty programs...
spot_imgspot_imgspot_imgspot_img

ISC/SCADA Security

CQR Secures $3 Million Investment to Revolutionize OT Cybersecurity in Critical Infrastructure

As a groundbreaking move to transform the operational technology...

Aircraft Collision Avoidance Systems is Vulnerable to Un-patchable Flaws : CISA

American Cyber Défense Agency (CISA) has warned about flaws...
spot_imgspot_imgspot_imgspot_img

IAM