Security
-
MENA Region Sees Surge in Managed Security Services Adoption: SearchInform
SearchInform, the leading information security and risk management solutions vendor, has conducted an extensive survey among organizations in the Middle…
Read More » -
Middle East Governments Face Growing Cyberattacks
In 2024, cyber criminals have shifted focus from personal data to stealing company credentials and trade secrets. One in six…
Read More » -
Skills Gap Leaves Organizations Vulnerable to Cyberattacks
Written by Rob Rashotte, Vice President, Global Training & Technical Field Enablement at Fortinet With nearly 4 million professionals needed…
Read More » -
AmiViz and runZero Partner on Network Visibility
AmiViz has announced its strategic partnership with runZero. This collaboration aims to provide unparalleled cybersecurity visibility and exposure management to…
Read More » -
ESET Uncovers ATM Theft Malware
ESET researchers uncovered a crimeware campaign that targeted clients at three Czech banks. The malware used, which ESET has named…
Read More » -
SentinelOne and Intezer Partner to Disrupt Rust Malware Ecosystem
SentinelOne and Intezer have launched a project to illuminate the blind spot surrounding Rust malware so that threat researchers can…
Read More » -
Tenable Research Identifies Critical Security Vulnerability in Microsoft Copilot Studio
Tenable has disclosed that its Tenable Research Team has discovered a critical information disclosure vulnerability in Microsoft’s Copilot Studio via…
Read More » -
UAE Student Selected for Cyber Security Training in Moscow
An international, free-of-charge program for students and young cybersecurity enthusiasts launched in Moscow on August 12, 2024. It was developed…
Read More » -
Qualys: Vulnerability Count Skyrockets by 30% in 2024
According to new research from the Qualys Threat Research Unit (TRU), between January to mid-July, the CVE count rose by…
Read More » -
Cyberattacks on Education Sector Have Surged: Check Point Research
Schools and universities, with their treasure troves of sensitive data and often insufficient cyber security measures, have become prime targets…
Read More »