Regional

Advanced Spyware Targeting Users in Russia Covertly Installed on Android Devices

Recent Discovery of State-Sponsored Mobile Spyware Campaign Targeting Android Users A newly discovered mobile spyware tool, known as LianSpy, has been used by an unknown,...

STULZ expands its success in EMEA with new Center of Excellence in Dubai – Intelligent CIO Middle East

STULZ Opens New Center of Excellence in Dubai for EMEA Region Expansion STULZ, a renowned manufacturer of energy-efficient air conditioning solutions for data centers and...

Qualys introduces AI-driven Web Application Scanning (WAS) featuring API security – Intelligent CISO

Qualys Launches AI-Powered Web Application Scanning with API Security Platform Qualys, a leading cybersecurity firm, has just launched its innovative API security platform that incorporates...

Organisations Urged to Act Quickly as Cybercriminals Plan Attack in Six Days, Says Positive Technologies

Positive Technologies Warn Organizations of Impending Cybersecurity Threat Positive Technologies has issued a warning to organisations, stating they have just six days until cybercriminals potentially...

2023 Sees More Legal Records Stolen Than in Past 5 Years Together

The State of Legal Industry Cybersecurity in 2023: A Grim Outlook 2023 was a stark year for cybersecurity in the legal industry, with data breaches...

Maximizing 5G opportunities in the UAE through collaboration and innovation – Intelligent CIO Middle East

Harnessing the Potential of 5G and Beyond: Insights from Dell Technologies' Open Telecom Ecosystem Labs In a rapidly evolving digital landscape, Communication Service Providers (CSPs)...

Growing tension leads to increase in state-sponsored cyberthreats for half of businesses – Intelligent CISO

Increase in State-Sponsored Cyberthreats: UK Cyber Resilience Report 2024 In a shocking revelation, a new report has shown that almost half of businesses in the...

The Evolution of Real-Time Communication in Public Safety and Security Industries

The Future of Real-Time Communication in Public Safety and Security Sectors: Exploring the Benefits of Push-to-Talk over Cellular (PTToC) Technology In an ever-evolving world where...

Indian Postal System Users Targeted by Mobile Phishing Attack

India Post Phishing Attacks Linked to China-Based Group Smishing Triad A China-based hacking group identified as Smishing Triad has unleashed a wave of text message...

Initial Post Incident Review of Microsoft Outage Published by CrowdStrike – Intelligent CIO Middle East

CrowdStrike Identifies Defect in Rapid Response Content Leading to Microsoft Outage CrowdStrike has released a preliminary Post Incident Review (PIR) following the global Microsoft outage,...

CrowdStrike Shares Initial Findings of Post Incident Review on Worldwide Microsoft Outage – Intelligent CISO

CrowdStrike Releases Preliminary Post-Incident Review into Global Microsoft Outage In a recent preliminary Post Incident Review (PIR) conducted by CrowdStrike into the global Microsoft outage,...

Insurance sector faces greatest threat from Cyber Risk

Cyber Risk Emerges as Top Threat to Insurance Sector - Industry Insiders Cyber risk has emerged as the most significant threat to the insurance industry,...

Recent articles