What's new
How Employee Unawareness Led to Coinbase Data Breach?
In the current era, where data holds immense value, a single data breach can potentially impact individuals, damage a...Read More
Pro-Houthi OilAlpha Hacker Group Targets Yemen-Related Entities, Reports
A hacker group, OilAlpha, which appears to support Houthis in Yemen has targeted humanitarian and international organizations in the...Read More
Swiss Tech Giant, ABB Hit by a Ransomware Attack
A ransomware attack disrupted business activities at Swiss-Robotic and automation major, ABB Ltd. The industrial tech behemoth confirmed on...Read More
ChatGPT: Hackers New Toy to Develop Attack Vectors
With the advent of ChatGPT, employees are using it for all their content requirements in different business operations such...Read More
What is Spear Phishing Attack and How Can It be Prevented?
The introduction of the internet has been immensely beneficial for businesses and individuals alike. We are all engaged through...Read More
DNS Tunneling: Everything You Wanted to Know
Cybercriminals can exploit the Domain Name System (DNS), a trustworthy and frequently used system on the internet. However, threat...Read More
How Middle East Can Defend Social Engineering Attacks
Social engineering attacks are a type of cyber attack that relies on human interaction to trick individuals into divulging...Read More
How is Information Security Shaping the Cyber World in the Middle...
Information security and cybersecurity have become top priorities for countries in the Middle East, as the region continues to...Read More
Zero-Day Attack: Protect Your Organization from the Unforeseen
It was in 1834 that the world’s first cybercrime took place. Two brothers used the insider contacts of the...Read More
The Rise of Cyber Espionage: How to Stay Safe in a...
The world is rapidly advancing in technology. Due to digitalization, work has become easier. Although there are many advantages,...Read More