Trellix, the cybersecurity company delivering the future of extended detection and response (XDR), has announced Trellix XDR Platform for Ransomware Detection …
Veeam executive expresses concern over misuse of Generative AI
Mohamad Rizk, Regional Director, Middle East & CIS at Veeam Software, has penned his technology predictions for 2024, and has …
How telecommunications providers can best tackle DDoS attacks
In 2024, the telecommunications industry will continue to focus on technologies such as cloud computing, standalone 5G, AI, and the Internet of Things (IoT) to offer better speed, scalability, and innovation.
Opinion: Veeam CTO examines if we are winning the fight against Ransomware
Edwin Weijdema, Field CTO EMEA and Lead Cybersecurity Technologist at Veeam, has penned an exclusive op-ed for tahawultech.com, in which …
New research from Qualys shows the highest risks organizations faced in 2023
Qualys, Inc (NASDAQ: QLYS), has released new research from the Qualys Threat Research Unit (TRU), delving into some of the critical vulnerabilities …
Official Python repository served cyberespionage backdoor, gathered 10,000+ downloads
ESET Research discovered 116 malicious packages in PyPI, the official repository of software for the Python programming language, uploaded across 53 projects. Victims have downloaded these packages over 10,000 times.
Navigating the Festive Cyber Landscape: Ensuring Online Safety during Holiday Shopping
Tahawultech.com spoke to cybersecurity industry frontrunners to learn more about the pitfalls of online shopping and tips to shop safely …
Opinion: Role of AI in cybersecurity
Steven Kenny, Architect & Engineering Program Manager EMEA at Axis Communications, writes an exclusive opinion piece for Tahawultech.com on how …
Predatory SpyLoan apps: loan sharks expand range to Android, ESET Research finds
ESET researchers have observed an alarming growth in deceptive Android loan apps which present themselves as legitimate personal loan services, …
Six tips to protect your organisation from holiday scams
Attackers and bad actors will go to any lengths to get your data and hard-earned cash using techniques including phishing emails and mobile texts containing links to fake websites designed to look like legitimate brands.
Batman and Robin vs. SD-WAN and Security Service Edge: A comparison of dynamic duos
Both pairs work together to protect their domains from threats, whether it be criminals or cyber attackers. While the former is a fictional superhero duo, the latter is a powerful and practical security solution for modern networks.
Security Navigator 2024 reveals highest number of Cyber Extortion victims ever recorded
New research finds a new levelling of physical and cyber battlefields, revealing a thin line between physical war and cyber (through hacktivism)
Sophos anticipates AI-based attack techniques and prepares detections
At the Moment, Adversaries are Skeptical of AI for Cybercrime, According to Sophos Research.
2024 predictions from Veritas Technologies
Those who embrace emerging technologies to drive innovation and strengthen their security posture whilst building policies and guardrails for compliant usage, are the ones who will flourish in 2024.
5 tips to stay out of the Phishing trap
Establishing a paranoid but blame free culture that reports suspicious activity — as well as genuine mistakes — early and often helps ensure incidents (no matter how rare) are reported as soon as possible.
Cyber Risk is a Business Risk
Senior leadership must be involved in cyber-risk governance to ensure that the companywide governance plan aligns with overall corporate objectives.
Qualys helping customers to mitigate ‘risk’ in AWS marketplace
Qualys, Inc (NASDAQ: QLYS), a pioneer and leading provider of disruptive cloud-based IT, security, and compliance solutions, today announced the availability of …
Positive Technologies promotes AI and ML with 8 new partnerships
Positive Technologies has agreed on partnership with eight providers of cybersecurity services and solutions to develop cooperation in the region for the promotion of modern products and exchanging experience in the field of cybersecurity.
ESET Research: Infamous IoT botnet Mozi taken down via a kill switch
ESET Research recently observed the sudden demise of one of the most prolific Internet of Things (IoT) botnets, named Mozi, …
Innovation meets Security
Alain Penel, Vice President, Middle East, Turkey & CIS, Fortinet, discusses their vision for the future and what technologies are needed to reshape the regional tech landscape.