Stuxnet, the powerful malware that wormed its way in and hobbled Iran’s uranium enrichment efforts, infiltrated the secure networks of the nuclear program via trusted partners, newly public information reveals.
Stuxnet ‘dates back to 2005’
Researchers from Symantec have found and analysed a version of the Stuxnet cyber sabotage malware that predates previously discovered versions …
Intelligent security
Arun George, International SecOps Sales Leader, CyberRes, a Micro Focus Line of Business on the company’s participation at GITEX and how it is helping customers address the expanding cyber-attack surface.
Cyberattacks Become Part of the Military Arsenal
Cyberattacks Become Part of the Military Arsenal.
New Approaches for ‘Air Gapped’ IT and OT Environments for Critical Infrastructure
New Approaches for ‘Air Gapped’ IT and OT Environments for Critical Infrastructure.
Overcoming the cyber-pandemic with Raqmiyat
Abhijit Mahadik, Director, Cybersecurity & Infrastructure, UAE & KSA, Raqmiyat, speaks to Anita Joseph, Editor, SAME about the evolving cybersecurity landscape, the threats organisations need to watch out for and how the security priorities of organisations have shifted since the pandemic last year.
Group-IB launches regional HQ in Dubai
Group-IB launches regional HQ in Dubai. City becomes home to its MEA Threat Intelligence & Research Centre.
Bitdefender to showcase IoT security solutions at GITEX
Cybersecurity solutions provider Bitdefender protecting has announced its participation in the 39th edition of GITEX Technology Week, to be held in Dubai, UAE, from 6th to 10th October.
Tenable discovers security flaw in industrial control software
Tenable has discovered a critical vulnerability in Siemens STEP 7 TIA Portal, design and automation software for industrial control systems.
USB devices pose “serious threats” to industrial networks
Removable USB media devices such as flash drives pose a significant – and intentional – cybersecurity threat to a wide array of industrial process control networks, according to a recent study.
IoT vulnerabilities open up new possibilities to hackers
Vinod Vasudevan, Co-founder and CTO, Paladion. discusses the rise of a new era where organisations and individuals alike are exposed to security risks and vulnerabilities brought by connected technologies.
Alleged NSA hackers release stolen files to the black market
According to recent reports, hackers likely gave away hundreds of thousands of dollars in potential sales in the black market when they leaked valuable cyberweapons that were allegedly stolen from the US National Security Agency.
Are you failing Security Basics 101?
Patching, backups, firewall configuration… when it comes to security, make sure you take care of your infrastructure before you invest in next-level tools.
New opportunities
As a first-time participant at GISEC, AccessData aims to use the event as a platform to showcase its key capabilities in the security space and connect with potential customers.
‘Incredibly advanced’ hackers hit ME infrastructure
A cyber-espionage group with a toolset similar to ones used by U.S. intelligence agencies has infiltrated key institutions in countries including Iran and Russia.
Iranian hackers hit ME infrastructure for 2 years
For the past two years, a team of Iranian hackers has compromised computers and networks belonging to over 50 organisations from 16 countries, according to research from IT security firm Cylance.
Dynamic defence
After a long summer break, CNME kicked off its long-anticipated event season with the return of the fifth annual Enterprise Security 360 Roadshow. Reaching Riyadh, Dubai and Doha, the show covered a range of issues that are never far from the thoughts of Middle Eastern CIOs. CNME reports from the UAE leg of the show.
From bullets to bits
In addition to dealing with cybercriminals and hacktivists, enterprise security managers must pay increasing attention to avoid becoming collateral to nation-state cyber-warfare. Do recent high profile attacks on the region indicate that Middle Eastern businesses are at greater risk of attack, and what damage can cyber warfare inflict?
State secrets
What do Middle East governments need when it comes to security, and are newly formed government entities set to revolutionise the way that states think about security?