A widespread supply-chain cyberattack has unfolded, centering on OAuth tokens stolen from the Salesloft - Drift application - a third-party AI-powered sales tool that integrates...
On 3 August 2025, threat intelligence firm GreyNoise detected an unprecedented surge in brute-force attempts against Fortinet SSL VPNs - over 780 unique IPs...
A widespread supply-chain cyberattack has unfolded, centering on OAuth tokens stolen from the Salesloft - Drift application - a third-party AI-powered sales...
In today's data-driven business landscape, Enterprise Resource Planning (ERP) software plays a critical role. It manages core functionalities like finance, inventory, human...
As cyber threats continue to transcend borders with unprecedented speed and sophistication, coordinated global response has become an absolute necessity. The 2025 edition of...
Cyberjaya, Malaysia - 7 May 2025 - Somalia has signed two significant Memoranda of Understanding (MOUs) with Malaysia to strengthen its digital regulation capabilities...
In early April 2025, cybersecurity researchers uncovered a sophisticated attack by the Play ransomware group, also known as Balloonfly. This operation exploited a previously...
On May 5, 2025, Google released its monthly Android Security Bulletin, addressing 47 vulnerabilities across various components of the Android operating system. Among these,...
Day 2 of GISEC North Star, powered by CyberE71, brought together visionary founders, investors, and industry leaders under one roof, showcasing groundbreaking cybersecurity innovations...
In a landmark deal that reinforces the United Arab Emirates' growing influence in cybersecurity and artificial intelligence, Abu Dhabi-based CPX Holding announced on May...
On May 2, 2025, the Wordfence Threat Intelligence team added a new critical vulnerability to the Wordfence Intelligence vulnerability database in the OttoKit: All-in-One...
In a significant victory against online fraud, the Central Brigade for the Fight Against Cybercrime (BCLCC) in Burkina Faso has apprehended four suspected cybercriminals...
On April 7, 2025, the Cybersecurity and Infrastructure Security Agency (CISA) added a new critical vulnerability, CVE-2025-3248, to its Known Exploited Vulnerabilities (KEV) Catalog....
On April 30, 2025, a major milestone in Ivory Coast’s digital security landscape was achieved as the Autorité de Régulation des Télécommunications de Côte...
As organizations increasingly adopt cloud-native architectures, containerization has become a cornerstone of modern application deployment. However, this shift brings new security challenges that Chief...
From Smiles to Security: Microsoft’s Vision to Eliminate Passwords Gains Ground. On World Passkey Day 2024, Microsoft reaffirmed its long-standing commitment to ending the...
A Landmark GDPR Enforcement That Raises Alarms for Global Tech Giants. On May 2, 2025, the Irish Data Protection Commission (DPC) issued a record-breaking...
In a strategic move to enhance its physical security offerings and broaden its international footprint, CPX Holding, a leading provider of cyber and physical...
In a significant move to cement Nigeria’s place on the global digital privacy stage, Dr. Vincent Olatunji, the National Commissioner of the Nigeria Data...
As artificial intelligence (AI) becomes increasingly integrated into our daily communication tools, ensuring the privacy and security of user data has never been more...
In the ever-evolving landscape of cybersecurity, zero-day vulnerabilities remain a formidable challenge. These are security flaws unknown to the software vendor, exploited by attackers...
In a strategic move to bolster the resilience of Congo’s digital infrastructure, the Agence de Régulation des Postes et des Communications Électroniques (ARPCE) and...