Dave Russell, Vice President, Enterprise Strategy at Veeam explores how zero trust security processes have evolved in recent years and how in a landscape where the benchmark for security is constantly shifting, zero trust must continue to adapt in order to survive.
Qualys announces significant upgrade to its AI-powered platform
Expanded solution brings cloud infrastructure, SaaS apps and externally exposed assets together for a unified view of risk across multi-cloud environments.
Safer Internet Day: What lies ahead?
Every day is Safer Internet Day. With data being the soul of businesses as well as virtual and vulnerable, it …
ESET Research discovers espionage apps on the attack in Pakistan, utilising romance scams
The campaign leveraged Google Play to distribute six malicious apps bundled with VajraSpy RAT code; six more were distributed in the wild.
SANS Institute to enhance Middle East Cyber Defence with SANS Abu Dhabi February 2024
Expert instructors from SANS Institute will host specialized training in ICS security, as well as the latest threat hunting and incident response tactics in the Gulf Region.
Cloudflare explores the secret to a coordinated, privacy-first security approach
Championing Privacy-First Security: Harmonizing Privacy and Security Compliance.
Infoblox uncovers VexTrio’s massive criminal affiliate program
VexTrio has surpassed its counterparts, emerging as the single most pervasive threat in customers’ networks.
Trellix has the X-Factor when its comes to advanced ransomware detection and response
Trellix, the cybersecurity company delivering the future of extended detection and response (XDR), has announced Trellix XDR Platform for Ransomware Detection …
Veeam executive expresses concern over misuse of Generative AI
Mohamad Rizk, Regional Director, Middle East & CIS at Veeam Software, has penned his technology predictions for 2024, and has …
How telecommunications providers can best tackle DDoS attacks
In 2024, the telecommunications industry will continue to focus on technologies such as cloud computing, standalone 5G, AI, and the Internet of Things (IoT) to offer better speed, scalability, and innovation.
Opinion: Veeam CTO examines if we are winning the fight against Ransomware
Edwin Weijdema, Field CTO EMEA and Lead Cybersecurity Technologist at Veeam, has penned an exclusive op-ed for tahawultech.com, in which …
New research from Qualys shows the highest risks organizations faced in 2023
Qualys, Inc (NASDAQ: QLYS), has released new research from the Qualys Threat Research Unit (TRU), delving into some of the critical vulnerabilities …
Official Python repository served cyberespionage backdoor, gathered 10,000+ downloads
ESET Research discovered 116 malicious packages in PyPI, the official repository of software for the Python programming language, uploaded across 53 projects. Victims have downloaded these packages over 10,000 times.
Navigating the Festive Cyber Landscape: Ensuring Online Safety during Holiday Shopping
Tahawultech.com spoke to cybersecurity industry frontrunners to learn more about the pitfalls of online shopping and tips to shop safely …
Opinion: Role of AI in cybersecurity
Steven Kenny, Architect & Engineering Program Manager EMEA at Axis Communications, writes an exclusive opinion piece for Tahawultech.com on how …
Predatory SpyLoan apps: loan sharks expand range to Android, ESET Research finds
ESET researchers have observed an alarming growth in deceptive Android loan apps which present themselves as legitimate personal loan services, …
Six tips to protect your organisation from holiday scams
Attackers and bad actors will go to any lengths to get your data and hard-earned cash using techniques including phishing emails and mobile texts containing links to fake websites designed to look like legitimate brands.
Batman and Robin vs. SD-WAN and Security Service Edge: A comparison of dynamic duos
Both pairs work together to protect their domains from threats, whether it be criminals or cyber attackers. While the former is a fictional superhero duo, the latter is a powerful and practical security solution for modern networks.
Security Navigator 2024 reveals highest number of Cyber Extortion victims ever recorded
New research finds a new levelling of physical and cyber battlefields, revealing a thin line between physical war and cyber (through hacktivism)
Sophos anticipates AI-based attack techniques and prepares detections
At the Moment, Adversaries are Skeptical of AI for Cybercrime, According to Sophos Research.