Trellix report highlights new programming languages in malware development, adoption of malicious GenAI, and acceleration of geopolitical threat activity.


Trellix report highlights new programming languages in malware development, adoption of malicious GenAI, and acceleration of geopolitical threat activity.

Threat Predictions for 2024: Chained AI and CaaS Operations Give Attackers More “Easy” Buttons Than Ever.

Only 26% of Surveyed Organisations Stopped Cybercriminals from Encrypting Their Data in a Ransomware Attack. This Is the Lowest Rate of Disruption in 3 Years.

With 13 immersive courses and hands-on training from industry experts, professionals can look forward to the opportunity to learn and collaborate with the global cybersecurity community.

Hackers will also exploit our trust to facilitate a cybersecurity breach. This could be something as simple as an employee clicking an untrustworthy link or sharing sensitive information with a hacker posing as someone else.

Program serves as on-ramp for launching solutions on Infor Marketplace; providing choices and innovation to Infor customers.

Positive Technologies has agreed on partnership with eight providers of cybersecurity services and solutions to develop cooperation in the region for the promotion of modern products and exchanging experience in the field of cybersecurity.

With 13 immersive courses and hands-on training from industry experts, professionals can look forward to the opportunity to learn and …

ESET Research recently observed the sudden demise of one of the most prolific Internet of Things (IoT) botnets, named Mozi, …

Maher Jadallah, Senior Director Middle East & North Africa, Tenable details their plans to empower organisations with comprehensive exposure management across an ever-expanding attack surface.

Ramzi Itani, Regional Director, Middle East at Veritas Technologies, discusses the opportunities and points of interest presented by GITEX Global 2023.

Resecurity is dedicated to safeguarding citizens and businesses in the UAE from cyber threats.

Tenable, recently announced it has been named a ‘Leader’ in the GigaOm Radar for Operational Technology (OT) Security.

Christos Tulumba, Chief Information Security Officer at Veritas Technologies, has penned a comprehensive op-ed designed to provide CISO’s with a …

Built on Cisco’s Full-Stack Observability Platform, Cisco Secure Application provides organisations with intelligent business risk insights to help them better prioritise issues, respond in real-time to revenue-impacting security risks and reduce overall organisational risk profiles.

Anita Joseph spoke to Rakesh Ragudharan, Vice President, Strategic Initiatives, Bahwan CyberTek, on how a hybrid security approach blends the …

Industry’s largest repository of threat, vulnerability and asset data enables unprecedented intelligence to quickly identify and mitigate cyber risk.

In today’s digital age, re-evaluating networks and cybersecurity operations is essential, particularly in the UAE, where the threat landscape is rapidly evolving.

Positive Technologies: four out of five attacks targeted in nature.

It Takes Less Than a Day for Attackers to Reach Active Directory—Companies’ Most Critical Asset. The Vast Majority of Ransomware Attacks Occur Outside of Business Hours.