China-Linked Salt Typhoon breaches European Telecom via Citrix exploit Pierluigi Paganini October 21, 2025 China-linked Salt Typhoon hacked a European…
Over the summer of 2025, a novel malware family emerged following the public disclosure of the LOSTKEYS implant. This new…
GlassWorm is the world’s first self-propagating worm targeting VS Code extensions in the OpenVSX marketplace, unleashing invisible malicious payloads and…
Texas-based regional airline Envoy Air, the largest carrier operating under American Airlines, confirmed on October 17, 2025, that it fell…
We usually tell our faithful readers to install updates as soon as possible, but this time there’s an exception. Microsoft’s…
Amazon Web Services (AWS) and technology group e& have unveiled plans to equip the UAE workforce with the skills needed…
Over the past several months, cybersecurity researchers have observed a surge of fraudulent Chrome extensions masquerading as legitimate WhatsApp Web…
A recent surge in underground cybercrime chatter has shone a spotlight on Monolock Ransomware V1.0, as multiple posts on dark…
Researchers have shown how you can corrupt an AI and make it talk gibberish by tampering with just 250 documents….
Artificial intelligence (AI) holds tremendous promise for improving cyber defense and making the lives of security practitioners easier. It can…
Last week at Gitex Global 2025 in Dubai, Dell Technologies demonstrated its growing influence in the Middle East, spotlighting its…
API security has never been more important because modern APIs are operational necessities. Unfortunately, many organizations are failing to adapt…











