Proofpoint researchers identified a new malware call WikiLoader. It was first identified in December 2022 being delivered by TA544, an actor that typically uses Ursnif malware to target organisations.
Enjoy The Events By The New Sandbox Game Garena Blockman GO
Enjoy The Events By The New Sandbox Game Garena Blockman GO.
Five Dubai startups receive API sandbox certification from Emirates NBD
Emirates NBD and DIFC FinTech Hive have become the first to certify five FinTech startups under API Sandbox Program.
Robo-advisory firm first to graduate from Dubai’s regulatory sandbox
Robo-advisory firm, Sarwa, has become the first participant to graduate from Dubai Financial Services Authority’s regulatory sandbox following nearly 12 months of testing.
UAE crypto firm first in MENA to receive regulatory sandbox licence
Palmex, a digital asset exchange powered by ArabianChain Technology, has become the first and only cryptocurrency exchange in the Middle East and North Africa to receive a Regulatory Sandbox License.
CBB launches regulatory sandbox for fintech startups
The Central Bank of Bahrain (CBB) has announced new regulations to create a regulatory sandbox that will allow startups and …
SonicWall promotes latest sandboxing service
SonicWall, the security branch of Dell, is encouraging CSO’s to embrace the cloud and ‘say yes’ to business initiatives at GITEX Technology Week.
McAfee acquires ValidEdge sandboxing tech
McAfee on Monday announced that it has acquired the ValidEdge anti-malware sandboxing technology from LynuxWorks in order to add a …
Google unveils stronger Flash sandbox in Chrome
Google has announced it has completed work on a stronger Flash sandbox in the Windows version of Chrome, and …
World’s Largest Bug Bounty – $650,000 Offered to Fortify Cybersecurity Standards on a Global Scale
World’s largest bug bounty: Positive Technologies offers bug hunters over $650,000 for stealing money or injecting backdoors into the code of its own products.
Cirrus Labs, Agile Transformation
Shiboo Varughese, Chief Technology Officer at CirrusLabs, outlines how they transform day-to-day operations with agility, data-driven insights, automation, and cloud solutions to meet the demands of the industry.
OPSWAT to highlight cybersecurity gaps at GITEX
As digitalisation creates more complexity between IT and OT, Critical Infrastructure Protection (CIP) leader urges proactive steps to secure what matters most.
GITEX 2023: Avaya to demonstrate Transformative AI Capabilities on Operations and Experiences
Avaya will showcase a range of use cases that highlight transformative AI capabilities in delivering outstanding customer and employee experiences …
Fortinet expands its SASE Solution
FortiSASE integration with Fortinet WLAN portfolio enables more options to securely connect remote workers and distributed edges; Digital experience monitoring innovations ensure optimal user experience end to end.
Global Cybersecurity Threat Landscape Report Q2 2023
Positive Technologies: four out of five attacks targeted in nature.
OPSWAT Survey reveals only 22% of organisations have a fully mature Threat Intelligence Program
OPSWAT’s 2023 Threat Intelligence survey highlights the urgent need for enhanced detection capabilities to combat evolving malware threats.
83% of successful cyberattacks in the Middle East had a targeted nature
Attacks on Middle Eastern government agencies are mainly carried out by APT groups (56%), covertly establishing themselves in the victim’s infrastructure for the purpose of cyberespionage.
How to tackle cyber threats with XDR
Vibin Shaju, VP Solutions Engineering EMEA at Trellix, explains how XDR is crucial for cybersecurity in GCC as organizations seek …
Help AG launches new cyber defence platform, UNIFY
The UNIFY by Help AG platform unifies the capabilities of visibility, collaboration, orchestration and automation for a seamless user experience and consistent service delivery.
Introducing content disarm and reconstruction – the zero-trust rebel that frisks every file
Instead, let us consider technology that does not rely on detection but follows zero-trust principles and assumes all files are malicious. This method works by first verifying a file’s type and identifying any embedded content. It removes any content it considers to be potentially malicious and reconstructs the file using only legitimate components. We call this sanitisation method “content disarm and reconstruction”, or CDR.