Keysight Op-Ed: Three ways enterprises can reduce cyber risks.
A10 Networks reveal the best practices for preventing Botnet attacks
Amr Alashaal, Regional Vice President – Middle East at A10 Networks, highlights the security ramifications and impact that Log4j is …
Individuals found to be the top attack sector for cybercriminals – New research from Trellix
Individuals found to be the top attack sector for cybercriminals – New research from Trellix.
ServiceNow announces latest release of Now Platform aimed at driving productivity, scaling automation & creating better experiences
ServiceNow announces latest release of Now Platform aimed at driving productivity, scaling automation & creating better experiences.
Kaspersky empowers its Digital Footprint Intelligence
Kaspersky empowers its Digital Footprint Intelligence with a service for taking down malicious domains.
Cybercriminals use new tactics to attack industrial organisations
Cybercriminals use new tactics to attack industrial organisations – all in a hunt for corporate credentials.
AvosLocker Ransomware Uses AnyDesk in Safe Mode to Launch Attacks, Sophos Reports
AvosLocker Ransomware Uses AnyDesk in Safe Mode to Launch Attacks, Sophos Reports.
AvosLocker ransomware uses AnyDesk in safe mode to launch attacks: Sophos Report
Sophos, a global leader in next-generation cybersecurity, today released new research about AvosLocker ransomware in an article titled,“AvosLocker Remotely Accesses …
The Ongoing Evolution of Modern Ransomware
The Ongoing Evolution of Modern Ransomware.
Why Attackers are Focusing on Low-Volume Persistent DDoS Attacks
A10 Networks: Why Attackers are Focusing on Low-Volume Persistent DDoS Attacks.
Esharah Etisalat Security Solution highlights its latest mission critical solutions
Nitya Ravi of CPI speaks to Mr. Ali Bahlooq, General Manager of Esharah Etisalat Security Solutions about the innovative solutions they offer to the organisations.
Remote Code Execution: The new cybersecurity battleground
By Satya Gupta, Co-founder and Chief Technology Officer, Virsec This week CheckPoint published a new report that chronicled the UAE …
Sophos acquires Braintrace to boost adaptive cybersecurity ecosystem
Sophos, a global leader in next-generation cybersecurity, has announced that it has acquired Braintrace, enhancing its Adaptive Cybersecurity Ecosystem with …
Sophos unveils XGS series firewall appliances with Transport Layer Security (TLS) inspection
Sophos, a global leader in next-generation cybersecurity, has unveiled the new XGS Series firewall appliances with unrivaled performance and advanced …
Cybereason Discovers Global Botnet Campaign Leveraging Microsoft Exchange Vulnerability
Cybereason Discovers Global Botnet Campaign Leveraging Microsoft Exchange Vulnerability. The Prometei Botnet crosses many industries and countries globally; Victims are random, making the botnet more dangerous and widespread.
Moro Hub deploys Google Cloud’s Anthos in partnership with Atos
Moro Hub deploys Google Cloud’s Anthos in the Middle East’s first Green Data Centre in partnership with Atos. This engagement brings Google Anthos to Moro Hub’s Green Data Centre.
AVEVA, Building smart cities for a more sustainable future
Data-powered insights deliver more resilient infrastructure and shape a more sustainable future, leaving smart cities poised to rise to even …
Sophos Uncovers New Evasion Techniques Used to Bypass Security
Sophos Uncovers New Delivery and Evasion Techniques Used By Agent Tesla to Bypass Security.
Cybereason uncovers malware involved in targeted cybercrime
Cybereason Uncovers New Malware Arsenal Abusing Facebook and Dropbox in Middle East Espionage Campaign
The case for behavior-based threat detection
Ammar Enaya, Regional Director – METNA, Vectra, explains how focusing on attacker behavior can improve threat detection.