OPSWAT’s 2023 Threat Intelligence survey highlights the urgent need for enhanced detection capabilities to combat evolving malware threats.

OPSWAT’s 2023 Threat Intelligence survey highlights the urgent need for enhanced detection capabilities to combat evolving malware threats.
MoustachedBouncer is a threat group, recently discovered by ESET researchers, which specialises in the espionage of foreign embassies, including European ones, in Belarus. It is very likely aligned with Belarus interests.
Trellix Advanced Research Centre’s investigation exposes serious vulnerabilities in CyberPower’s DCIM platform and Dataprobe’s iBoot PDU, highlighting potential unauthorized access …
To stay competitive, it’s essential for organisations to adopt AI technology while safeguarding against potential risks. By taking these steps now, companies can ensure they’re able to reap the full benefits of AI while minimising exposure.
Proofpoint researchers identified a new malware call WikiLoader. It was first identified in December 2022 being delivered by TA544, an actor that typically uses Ursnif malware to target organisations.
Cybercrimes and information security breaches discriminate no one, and the healthcare sector is no exception. With enhanced data storage of …
Within the average large enterprise, sensitive data is being shared to generative AI apps every hour of the working day.
This spike reflects a similar trend in the Middle East region, which projected a two-fold hike (103%) in Rootkit detections, as compared to the first five months of last year.
Fady Younes, Cybersecurity Director, EMEA Service Providers and MEA, Cisco has penned a thought-leadership article that provides businesses and employees …
Attacks on Middle Eastern government agencies are mainly carried out by APT groups (56%), covertly establishing themselves in the victim’s infrastructure for the purpose of cyberespionage.
With at least 75% of Organisations Upgrading Infrastructure and 78% Increasing Security Budgets, OPSWAT’s Latest Report Highlights Disparity Between Infrastructure Upgrades, Spending and Security Improvements.
Behavioural correlation of events from multiple sources helps to act faster, get more attack context and start looking for previously unseen activities.
Vibin Shaju, VP Solutions Engineering EMEA at Trellix, explains how XDR is crucial for cybersecurity in GCC as organizations seek …
Ransomware is the only form of cryptocurrency-related crime that has grown in 2023, with attackers on pace for their second-biggest year ever.
Kaspersky unveils a comprehensive report highlighting the increasing peril faced by small and medium-sized businesses (SMBs) in the current cyberthreat landscape.
Pure Storage, a leader in advanced data storage technology and services, has announced a first of its kind ransomware recovery …
Proper configurations of a security solution are crucial to prevent it from disabling or even abusing it – a tactic often seen to be employed by APT groups/actors.
The UNIFY by Help AG platform unifies the capabilities of visibility, collaboration, orchestration and automation for a seamless user experience and consistent service delivery.
Each scenario demonstrates the cybersecurity’s true role in terms of business continuity and profitability, highlighting emerging challenges and threats.
Zeki Turedi, CTO, EMEA at CrowdStrike has penned a thought leadership article which outlines how ‘identity’ holds the key to …