Hong Kong Cybersecurity Bill: Clarification and Controversy Surrounding the Proposed Legislation
Hong Kong’s Secretary for Security, Chris Tang Ping-keung, has addressed concerns surrounding the newly...
TikTok Faces Lawsuit for Violating Children's Privacy Laws
The U.S. Department of Justice (DoJ) and the Federal Trade Commission (FTC) have jointly filed a lawsuit...
Positive Technologies Warn Organizations of Impending Cybersecurity Threat
Positive Technologies has issued a warning to organisations, stating they have just six days until cybercriminals potentially...
The CrowdStrike Outage Saga: Legal Battles, Security Product Effectiveness, and Cybersecurity's Dirty Secret
The CrowdStrike outage saga took a turn for the worse this week,...
CODE81: Driving Innovation and Digital Transformation in Dubai
CODE81, the new player in the AI space under the Ghobash Group, is set to revolutionize the...
Advancements in Robotics: Are Humanoid Colleagues Closer Than We Think?
Advancements in robotics have been overshadowed by AI and mixed-reality headlines this year, but the...
Interview with Sandeep Johri, CEO of Checkmarx: A Dive into Cybersecurity Industry Insights
Sandeep Johri, the CEO of Checkmarx, recently sat down for a lighthearted...
Exploring the Complexity of Heap Exploitation at HitconCTF Qualifiers 2024
The HitconCTF Qualifiers 2024 recently captivated security researchers with a challenging heap exploitation task named...
Cyble Research & Intelligence Labs (CRIL) Top Vulnerabilities Report
Cyble Research & Intelligence Labs (CRIL) researchers have identified six critical vulnerabilities that security teams need...
Study Reveals Organizations' Plans to Harness Generative AI for Security Enhancement
Tenable's latest study on the adoption of generative AI (GenAI) in organisations has unveiled...
Bytecode Attackers Can Hide Malicious Code in Memory: Researchers Demonstrate at Black Hat USA
Researchers from Japan are set to unveil a groundbreaking technique at...