#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

38 C
Dubai
Wednesday, July 23, 2025

Popular:

Phish and Chips: China‑Aligned Espionage Surge Targeting Taiwan Semiconductor Industry

Between March and June 2025, Proofpoint researchers tracked three distinct China‑aligned threat actors launching spear‑phishing campaigns against Taiwanese semiconductor firms, design houses, service providers, and financial...

UAE Employees Surpass European Peers in Cyber Readiness, Cohesity Study Reveals

Dubai, 23 June 2025 - A new Cohesity study on “Employee readiness to confront cyber threats” found that full-time employees in the UAE significantly...

Breaking news:

Cisco ISE RCE Crisis: Critical Unauthenticated Vulnerabilities Demand Immediate Patch

Cisco has disclosed three unauthenticated remote code execution (RCE)...

Stay on top of what's going on with our subscription deal!

Worldwide

Emergency Alert: Critical Unauthenticated RCE Discovered in Cisco ISE/ISE‑PIC

Cisco has patched three severe unauthenticated remote code execution...

NVIDIA Warns of Rowhammer GPU Risk: Activating ECC on A6000 and Enterprise GPUs Essential

NVIDIA has published a Rowhammer Security Notice (updated 9 July 2025)...

GMX Suffers Massive $42M DeFi Hack: A Critical Wake‑Up Call for Decentralized Exchanges

On 9 July 2025, the decentralized perpetual exchange GMX-operating...

Ransomware Gang Hunters International Shuts Down and Offers Free Decryption Keys

The ransomware gang Hunters International announced on 3 July...

CVE‑2025‑20309: Cisco Unified CM Exposes Root via Static SSH Credentials

Cisco disclosed a 10.0 CVSS-critical vulnerability (CVE‑2025‑20309) in its...

PDFs: Portable Documents or Perfect Phishing Vectors?

Cybersecurity professionals are sounding the alarm: PDF attachments are...

Google Urgently Patches CVE‑2025‑6554 Zero‑Day in Chrome 138 Stable Update

On 26 June 2025, Google rapidly deployed a Stable Channel update...

French Police Arrest Five Key Operators Behind BreachForums Data-Theft Platform

On 25 June 2025, France’s specialist cybercrime unit (BL2C) detained five...

Critical TeamViewer Remote Management Flaw Allows SYSTEM‑Level File Deletion

A high‑severity vulnerability, CVE‑2025‑36537, has been identified in TeamViewer...

Featured Interviews

#Interview: Navigating Security Challenges in the IoT Era: Insights from Industry...

Middle East

AI & Cybersecurity

The Top 10s

Fortressing Your Business Data: Top 10 Most Secure ERP Systems in 2024

In today's data-driven business landscape, Enterprise Resource Planning (ERP) software plays a critical role. It manages core functionalities like finance, inventory, human...
spot_imgspot_imgspot_imgspot_img

Africa

America

Asia

How To

What Is

spot_imgspot_imgspot_imgspot_img

Europe

Oceania

ASIC Sues FIIG Securities Over Cybersecurity Failures Leading to Data Theft

The Australian Securities and Investments Commission (ASIC) has launched...

Cybersecurity Breach at the University of Notre Dame Australia: Investigation Underway

The University of Notre Dame Australia is currently investigating...

Bunnings Faces Privacy Backlash Over Facial Recognition Technology Use

Bunnings Group Limited, a prominent retail chain in Australia,...

Taking Actions To Protect Children: Australia’s Stand Against Kids Social Media Risks

The rapid rise of social media has transformed communication,...
spot_imgspot_imgspot_imgspot_img

Hacked - Breached

spot_imgspot_imgspot_imgspot_img

Zero-Day

spot_imgspot_imgspot_imgspot_img

Cryptocurrencies

spot_imgspot_imgspot_imgspot_img

Cloud Security

spot_imgspot_imgspot_imgspot_img

Ransomware

Latest Articles

10 Influential Women in Cybersecurity in the Middle East: Their Stories and Achievements

Cybersecurity is a rapidly growing industry, and women are leading the charge. In the Middle East, female cybersecurity professionals are making their mark in...

Critical Flaw in Cisco IP Phone Series Exposes Users to Command Injection Attack

A recent critical flaw in Cisco IP phone series has been discovered, leaving users vulnerable to command injection attacks. The flaw was identified by...

Beware of Fake Apps on Google Play Store: 10 Apps Removed

Google Play Store, the official app store for Android devices, recently removed 10 fake apps that were designed to steal user data. The incident...

Aruba Networks Releases Critical Patch for 6 Vulnerabilities

Aruba Networks, a networking and security solutions provider, has released a patch for a critical vulnerability in its products. The advisory contains six vulnerabilities,...

WH Smith Data Breach Exposes Customer Information: What You Need to Know

UK-based retailer WH Smith recently announced a data breach that has potentially affected thousands of its customers. The company has released a statement confirming...

Top 10 Global Cybersecurity Events to Attend in 2022

As cyber threats continue to increase in frequency and complexity, the importance of cybersecurity has become more critical than ever. In order to stay ahead...

Enhancing System Security in West Asia: The Need for Stronger Defenses in 2022

In the past year, West Asia has seen a growing number of security breaches and cyber attacks, leading to significant financial losses and the...

Data Breaches in Australia: A Growing Concern in 2022

In today's digital age, the collection, storage and use of personal data have become a norm. However, with the increasing use of technology, the...

Top 10 Global Cybersecurity NGOs to Watch in 2022

Non-governmental organizations (NGOs) play a vital role in promoting cybersecurity awareness, advocating for policies that protect digital rights, and supporting vulnerable populations online. In this...

The 10 Best Secure Mobile Phones

With the increasing amount of sensitive information being stored and accessed on mobile devices, the need for secure smartphones has never been greater. From...

Boosting System Security in West Australia: A Priority for 2022

In recent years, West Australia has experienced a significant increase in cyber attacks, leading to financial losses and the compromise of sensitive information. As digital...

News Corp Reveals Two-Year-Long Data Breach: What You Need to Know

News Corp, the media conglomerate, has revealed a two-year-long data breach that could have compromised the personal and financial information of its customers. The...

Enhancing System Security in Australia: A Critical Priority in 2022

With the growing reliance on technology in all aspects of life, system security has become a top concern for organizations and individuals alike. In Australia,...

Top 10 Global Cybersecurity Magazines to Read in 2022

Here is the list of global top 10 cybersecurity Magazine 2022 1. SC Magazine: SC Magazine is a leading publication in the cybersecurity industry, featuring...

WH Smith Data Breach Exposes Customer Information: What You Need to Know

UK retailer WH Smith has recently revealed that its customer database was breached by hackers, resulting in the exposure of personal information of its...

Ensuring System Security in Europe: A Key Priority in 2022

In today's digital age, system security is an essential concern for individuals and organizations alike. In Europe, the need for robust security measures has...

LEAL Réunion hit by a cyber Attack resulting in loss of data

LEAL Réunion, a French automotive company based on the island of Réunion, was hit by a cyber attack on Monday, resulting in a significant...

Data Breaches in Europe: A Growing Concern in 2022

In today's digital age, data breaches are a common occurrence that can have serious consequences for both individuals and organizations. In Europe, the number of...

Beyond the Plugin Peril: Securing WordPress with a Minimalist Approach and Regular Vulnerability Assessments

WordPress, the world's most popular content management system (CMS), powers millions of websites. While its flexibility and ease of use are undeniable, the abundance...

API Security Flaw Found in Booking.com Can Allow Full Account Takeover

The popular travel booking website, Booking.com, has been found to have a critical API security flaw that could allow hackers to take over user...

Subscribe

- Gain full access to our premium content

- Never miss a story with active notifications

- Browse free from up to 5 devices at once

Patched

spot_imgspot_imgspot_imgspot_img

Bug Bounty

Bug Bounty Bonanza: WazirX Launches Program After $230 Million Cyberattack

In the ever-changing landscape of cybersecurity, the Indian cryptocurrency...

Why Your Company Needs a Bug Bounty Program: A Proactive Approach to Cybersecurity

In today's ever-evolving digital landscape, cybersecurity threats are a...

Big Bucks for Bugs: Google’s $10 Million Bug Bounty Award and Lessons for Responsible Disclosure

In the ever-evolving battle against cybercrime, bug bounty programs...
spot_imgspot_imgspot_imgspot_img

ISC/SCADA Security

spot_imgspot_imgspot_imgspot_img

IAM