BlackSuit ransomware payment recovered in takedown operation
16
Oct
2025

Gitex 2025: Help AG aims to be global cyber force as UAE leads AI security transformation

As the United Arab Emirates (UAE) cements its position as one of the world’s most advanced cyber-resilient nations, Help AG…

Vanilla Tempest, Vice Society
16
Oct
2025

Vanilla Tempest Campaign Using Fraudulent Code-Signing Disrupted

Microsoft said it disrupted a high-volume campaign in October after discovering a coordinated effort by the ransomware group known as…

CISA Warns Of Windows Improper Access Control Vulnerability Exploited In Attacks
16
Oct
2025

CISA Warns Of Windows Improper Access Control Vulnerability Exploited In Attacks

CISA has added a critical Microsoft Windows vulnerability to its Known Exploited Vulnerabilities catalog, warning organizations that threat actors are…

Qilin Ransomware Leverages Ghost Bulletproof Hosting for Global Attacks
16
Oct
2025

Qilin Ransomware Leverages Ghost Bulletproof Hosting for Global Attacks

Qilin ransomware–an increasingly prolific ransomware-as-a-service (RaaS) operation–has intensified its global extortion campaigns by exploiting a covert network of bulletproof hosting…

New Tech Support Scam Uses Microsoft Logo to Fake Browser Lock, Steal Data
16
Oct
2025

New Tech Support Scam Uses Microsoft Logo to Fake Browser Lock, Steal Data

A new, aggressive tech support scam has been discovered by experts at the Cofense Phishing Defense Centre, who say it’s…

Mango logo
16
Oct
2025

Mango discloses data breach at third-party provider

Mango has reported a data breach at one of its external marketing service providers. The Spanish fashion retailer says that…

Beware the Hidden Costs of Pen Testing
16
Oct
2025

Beware the Hidden Costs of Pen Testing

Penetration testing helps organizations ensure IT systems are secure, but it should never be treated in a one-size-fits-all approach. Traditional…

Securing the AI era: Huawei’s cyber security strategy for the GCC
16
Oct
2025

Securing the AI era: Huawei’s cyber security strategy for the GCC

As AI and digital transformation reshape the Middle East, organisations face a dual challenge – leveraging emerging technologies while keeping…

When Authentication Fails — Exposing APIs to Risk — API Security
16
Oct
2025

When Authentication Fails — Exposing APIs to Risk — API Security

Authentication issues seem like low-level attacks. But authentication today – especially API authentication – can be more difficult than people…

Capita To pay £14 Million For Data Breach Exposes 6.6 Million Users Personal Data
16
Oct
2025

Capita To pay £14 Million For Data Breach Exposes 6.6 Million Users Personal Data

The UK’s Information Commissioner’s Office (ICO) has imposed a £14 million fine on outsourcing giant Capita following a major cyber…

Critical Samba Flaw Allows Remote Attackers to Execute Arbitrary Code
16
Oct
2025

Critical Samba Flaw Allows Remote Attackers to Execute Arbitrary Code

A newly disclosed vulnerability in Samba’s WINS server hook script enables unauthenticated attackers to run arbitrary commands on affected domain…

Roku
16
Oct
2025

Roku accused of selling children’s data to advertisers and brokers

The state of Florida has accused Roku, which powers many smart TVs and streaming devices, of selling children’s data to…