Cybercrimes and information security breaches discriminate no one, and the healthcare sector is no exception. With enhanced data storage of …
Source Code is amongst the most common sensitive data shared to ChatGPT
Within the average large enterprise, sensitive data is being shared to generative AI apps every hour of the working day.
Rootkit detections in the UAE up by 167% in the first five months of 2023
This spike reflects a similar trend in the Middle East region, which projected a two-fold hike (103%) in Rootkit detections, as compared to the first five months of last year.
Cisco cybersecurity director shares five top tips to keep you secure this summer
Fady Younes, Cybersecurity Director, EMEA Service Providers and MEA, Cisco has penned a thought-leadership article that provides businesses and employees …
83% of successful cyberattacks in the Middle East had a targeted nature
Attacks on Middle Eastern government agencies are mainly carried out by APT groups (56%), covertly establishing themselves in the victim’s infrastructure for the purpose of cyberespionage.
Only 2% of organisations feel confident with current security strategies inbox
With at least 75% of Organisations Upgrading Infrastructure and 78% Increasing Security Budgets, OPSWAT’s Latest Report Highlights Disparity Between Infrastructure Upgrades, Spending and Security Improvements.
Indicator of Attack – What comes before a good old indicator?
Behavioural correlation of events from multiple sources helps to act faster, get more attack context and start looking for previously unseen activities.
How to tackle cyber threats with XDR
Vibin Shaju, VP Solutions Engineering EMEA at Trellix, explains how XDR is crucial for cybersecurity in GCC as organizations seek …
Chainalysis research finds cryptocurrency crime down but ransomware is increasing
Ransomware is the only form of cryptocurrency-related crime that has grown in 2023, with attackers on pace for their second-biggest year ever.
SMBs are still a lucrative niche for cybercriminals
Kaspersky unveils a comprehensive report highlighting the increasing peril faced by small and medium-sized businesses (SMBs) in the current cyberthreat landscape.
Pure Storage announces ground-breaking ransomware recovery SLA
Pure Storage, a leader in advanced data storage technology and services, has announced a first of its kind ransomware recovery …
Kaspersky names top factors driving APT attacks
Proper configurations of a security solution are crucial to prevent it from disabling or even abusing it – a tactic often seen to be employed by APT groups/actors.
Help AG launches new cyber defence platform, UNIFY
The UNIFY by Help AG platform unifies the capabilities of visibility, collaboration, orchestration and automation for a seamless user experience and consistent service delivery.
Kaspersky updates training software simulation
Each scenario demonstrates the cybersecurity’s true role in terms of business continuity and profitability, highlighting emerging challenges and threats.
Opinion: How can enterprises win the cybersecurity battle?
Zeki Turedi, CTO, EMEA at CrowdStrike has penned a thought leadership article which outlines how ‘identity’ holds the key to …
Malvertising delivers cryptocurrency-stealing browser extension
A series of malicious actions allow the extension to run stealthily while the user is browsing the internet. As a result, threat actors become capable of transferring the BTC from the victim’s wallet to their wallet using web injections.
What are the top-3 regions prone to mobile financial scams?
Kaspersky experts continuously monitor the mobile threat landscape and track threat trends to provide the most up-to-date intelligence about the potential dangers.
12 tips to keep your business safe from cyberattacks
According to recent research, more than 85% of companies have been the victim of a ransomware attack in the past year.
How GBS is shaping the future of enterprise in KSA
GBS’ cloud portfolio offers scalability, flexibility, cost-efficiency, and accessibility to resources on-demand,
Opinion: It’s time to say ‘hello’ to external attack surface management
OPINION: Tarek Naja, Solutions Architect, at Qualys, believes that in order to overcome the complexities that come with moving workloads …