McAfee has announced that it will increase investments in cyber threat research and revealed evidences that a series of Shamoon malware campaigns targeting Saudi Arabia are the work of one coordinated force of attackers.


McAfee has announced that it will increase investments in cyber threat research and revealed evidences that a series of Shamoon malware campaigns targeting Saudi Arabia are the work of one coordinated force of attackers.

Martin Hester, Head of Channels and Alliances, EMEA, Juniper Networks, explains how channel partners need to implement security that protects the business from the inside out.

The Index for the second half of 2016 demonstrated a positive trend: the number of people who are concerned about their security, and are ready to protect themselves against cyber threats, is constantly growing.

The costs associated with cyberattacks on the financial sector are rising as organizations face increasingly sophisticated threats. New research by Kaspersky …

How to survive a ransomware attack unscathed

McAfee has released its McAfee Labs Threats Report: April 2017, which details the challenges facing threat intelligence sharing efforts, probes the architecture …

Symantec has recently tied the CIA hacking tools leaked by WikiLeaks last month to a cyber espionage group responsible for at least 40 hacks in 16 countries.

Rishi Bhargava, Co-founder and VP Marketing, Demisto, gives us a lowdown on the latest threat looming in the cyberspace.

The growing importance of cyber security in Saudi Arabia was highlighted at the very start of this year when an …

WikiLeaks has recently released files that allegedly show how the CIA masked its malware attacks.

Abu Dhabi Police have arrested four hackers who stole more than AED1 million from consumers’ accounts by installing skimmer devices …

What are the top cybercrime activities businesses need to watch out for, and what can be done to combat them?

Sophos has released the findings of a regional study indicating that majority of organisations in Middle East and Africa (MEA) are recognising the benefits of integrated security.

Digital Shadows has announced new enhancements to its SearchLight digital risk management service helping organisations detect and respond to mobile application threats against their employees and consumers.

A10 Networks decrypts and Fidelis Network analyses all network traffic across all ports and protocols, and then reassembles it in real time using session-based approach.

While DNS infrastructure is inherently a vulnerable component for organisations, effective internal DNS security solutions can turn it into a great asset for securing an organisation’s networks and data.

IoT security challenges include weak authentication and authorisation protocols, insecure software, firmware with hard-coded back doors, poorly designed connectivity and communications, and little to no configurability.

Help AG has signed a reseller agreement with Menlo Security to provide consulting, implementation and support services for the vendor’s …

As mobile devices continue to proliferate, mobile security is becoming increasingly difficult to manage. Every mobile device, whether it is …

In the last year, we’ve all heard of the Mirai malware, but did you know that Mirai is Japanese …