Cisco has disclosed three unauthenticated remote code execution (RCE) flaws-CVE‑2025‑20281, CVE‑2025‑20282, and CVE‑2025‑20337-affecting its Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE‑PIC). Scored...
On 25 June 2025, France’s specialist cybercrime unit (BL2C) detained five French nationals accused of administering BreachForums, a notorious global data-theft marketplace. This operation marks a...
The UAE-based cybersecurity leader CPX has released a groundbreaking whitepaper, "Securing Operational Technology with Trust and Collaboration" (July...
In today's data-driven business landscape, Enterprise Resource Planning (ERP) software plays a critical role. It manages core functionalities like finance, inventory, human...
A Landmark Partnership for Digital Resilience. In a significant move to strengthen the United Arab Emirates' cyber defenses, the Sharjah Cyber Security Center (SCSC)...
A Vintage Cyberattack with a Malicious Aftertaste. In April 2025, cybersecurity researchers at Check Point Research (CPR) uncovered a sophisticated phishing campaign targeting European...
In a move to bolster national cyber hygiene and instill digital responsibility among the youth, Algeria’s National Agency for Information Systems Security (ANSSI), under...
In an era where digital communication and cryptocurrency transactions are ubiquitous, the security of our devices and applications is paramount. Recent investigations have uncovered...
U.S. government is set to discontinue funding for MITRE's Common Vulnerabilities and Exposures (CVE) program, effective April 16, 2025. Since 1999, this program has...
In April 2025, cybersecurity professionals were once again reminded of a harsh truth: patching is not optional it’s a frontline defense. Fortinet, a globally...
A new cyber threat has emerged, targeting software developers through malicious Python packages. The North Korea-linked advanced persistent threat (APT) group known as Gleaming...
In April 2025, Meta Platforms announced the resumption of training its artificial intelligence (AI) models using publicly available content from adult users in the...
At GITEX Africa 2025 in Morocco, cybersecurity giant Kaspersky unveiled alarming findings from its latest Africa Cyberthreat Landscape Report, revealing a 14% increase in...
In a stark reminder of the evolving threat landscape, Palo Alto Networks has recently reported a surge in brute-force login attempts targeting PAN-OS GlobalProtect...
On April 10, 2025, Fortinet issued an urgent security advisory detailing a sophisticated post-patching exploit in FortiGate devices. Cybercriminals are leveraging a newly uncovered...
In today’s rapidly evolving digital landscape, artificial intelligence (AI) applications are pushing technological boundaries while simultaneously introducing new vulnerabilities. Recently, security researchers identified ten...
On April 11, 2025, the decentralized finance (DeFi) community was shaken by a significant exploit targeting MorphoBlue, a prominent DeFi protocol. An attacker, identified...
A critical vulnerability has been identified in the popular SureTriggers WordPress plugin, affecting over 100,000 active installations. This vulnerability enables unauthenticated attackers to create...
A significant cybersecurity incident, the U.S. Department of the Treasury's Office of the Comptroller of the Currency (OCC) disclosed that unauthorized actors had accessed...
In May 2024, Operation Endgame marked a significant milestone in the global fight against cybercrime, leading to the dismantling of major botnets such as...
In an era where generative AI and automation are transforming cybersecurity and cybercrime AkiraBot stands as a prime example of how malicious actors are...
Cybercrime has no borders, and its impact is especially felt in developing regions where digital infrastructure is evolving faster than security policies. In response,...
A sophisticated wave of ransomware activity has recently shaken multiple sectors globally, exploiting a previously unknown vulnerability in Microsoft’s Common Log File System (CLFS)....