Cybercriminals have launched a highly convincing phishing campaign targeting both Booking.com hotels and their guests, exploiting stolen credentials, compromised accounts, and realistic messages that appear...
In a recent security disclosure, Discord confirmed that an unauthorized party compromised one of its third-party customer service vendors, leading to the potential exposure...
China has announced sweeping amendments to its Cybersecurity Law (CSL) and launched new incident reporting rules, signaling a decisive move toward stronger...
In today's data-driven business landscape, Enterprise Resource Planning (ERP) software plays a critical role. It manages core functionalities like finance, inventory, human...
SAP has rolled out its November 2025 Security Patch Day, addressing 18 newly discovered vulnerabilities and two updates to previous advisories. The latest security...
Cybercriminals have launched a highly convincing phishing campaign targeting both Booking.com hotels and their guests, exploiting stolen credentials, compromised accounts, and realistic messages that...
At the CISO Middle East Summit 2025 – UAE Edition in Dubai, a standout session brought together two influential voices in cybersecurity: Betania ALLO,...
As global passenger numbers soar, IATA’s biometric-driven “One ID” initiative aims to replace passports and paper processes with a secure, seamless, and fully digital...
In a revealing new report, cybersecurity researchers at Proofpoint have uncovered a sophisticated espionage campaign attributed to a previously unidentified Iranian-aligned threat actor known...
China has announced sweeping amendments to its Cybersecurity Law (CSL) and launched new incident reporting rules, signaling a decisive move toward stronger governance of...
A new and highly sophisticated mobile banking Trojan, dubbed Android/BankBot-YNRK, has emerged, targeting Android users across multiple regions. The malware, analyzed in-depth by Cyfirma,...
Security researchers at TierZeroSecurity have published a proof-of-concept Beacon Object File (BOF) that can extract Microsoft Teams session cookies from a user process, enabling...
A new wave of phishing attacks is sweeping across East and Southeast Asia, targeting government and financial organizations through multilingual ZIP file lures and...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two new security flaws to its Known Exploited Vulnerabilities (KEV) Catalog, warning that attackers...
In the latest episode of the Dubai Cyber Show & Podcast Series, Ouaissou DEMBELE, Founder & CEO of Sainttly Group and Editor-in-Chief of Cybercory.com,...
In March 2025, Kaspersky researchers uncovered an advanced cyber-espionage operation that exploited a zero-day vulnerability in Google Chrome (CVE-2025-2783) to infiltrate high-profile targets. The...
In a decisive move toward enhancing its cybersecurity posture, Zimbabwe has officially signed the United Nations Convention against Cybercrime (the Hanoi Convention), a landmark...
A notorious Pakistan-linked hacking group known as TransparentTribe (APT36 or Operation C-Major) has resurfaced with a sophisticated cyber-espionage campaign targeting Indian military and government...
In a disturbing twist to the world’s most popular video platform, cybercriminals have quietly built a malware empire on YouTube. According to Check Point...
A widespread internet outage briefly shook the online world on Monday morning, disrupting some of the most popular websites and mobile applications, including Amazon,...
In a powerful move to strengthen the region’s digital resilience, the UAE Cyber Security Council has announced a strategic collaboration with Amazon Web Services...
A Deep Dive into the F5 Security Incident. Global networking and application security provider F5 has confirmed a nation-state cyberattack that compromised its internal...