Critical sectors in the UAE – including but not limited to finance and energy – have increased their dependency on technology and state-of-the-art ICT solutions to deliver high-quality, efficient, and effective services. In 2017, the financial cost of cybercrime totalled

A vulnerability in Cisco’s Data Center Network Manager could allow a remote attacker to gain access to sensitive information. The vulnerability was rated “High” and if exploited would allow an unauthenticated, remote attacker to conduct directory traversal attacks and gain

A new kind of ransomware has been spread by a fake Windows Activator. Although it has now been found and intercepted by 360 Security Center, many are still falling victim to it. After analysis, 360 Security found that the ransomware

Researchers used AT commands to rewrite device firmware, bypass Android security mechanisms, exfiltrate sensitive device information, and unlock screens. Attackers can use AT commands to launch several malicious functions on an array of Android devices, including extracting data, rewriting the

Recently, most of the organizations experienced severe downfall due to an undetected malware, Deeplocker, which secretly evaded even the stringent cyber security mechanisms. Deeplocker leverages the AI model to attack the target host by using indicators such as facial recognition,

A pair of Necurs botnet-fueled phishing campaigns were found targeting the banking industry this month, using Microsoft Publisher (.pub) file attachments to drop the FlawedAmmyy remote access trojan. Discovered by researchers at Cofense, the first campaign commenced on Aug. 15,

According to the company, the attackers did not access payment card data, social security numbers (SSNs) or passwords. However, they may have stolen personal information such as names, billing zip codes, phone numbers, email addresses, account numbers, and account type.

NETSCOUT SYSTEMS, INC., (NASDAQ: NTCT), a leading provider of service assurance, security, and business analytics, announced that it has been named as the best ‘Anti-DDoS Solutions Vendor of the Year’ at Frost & Sullivan’s 15th annual 2018 Asia Pacific ICT

Adobe released an out-of-band security update earlier today to address two critical remote code execution vulnerabilities impacting Adobe Photoshop CC for Microsoft Windows and Apple macOS machines. According to the security advisory published Wednesday by Adobe, its Photoshop CC software

The Apache Software Foundation has patched a critical security vulnerability which affects all versions of Apache Struts 2. Uncovered by researchers from cybersecurity firm Semmle, the security flaw is caused by the insufficient validation of untrusted user data in the

Well, there’s something quite embarrassing for Apple fans. Though Apple servers are widely believed to be unhackable, a 16-year-old high school student proved that nothing is impossible. The teenager from Melbourne, Australia, managed to break into Apple servers and downloaded

Researchers at Top10 VPN have uncovered a thriving marketplace for selling U.K. gamer logins and passwords on the popular Battle Royal-esque game “Fortnite” on the dark web. While traditional games have a pay one-off fee to access the content, Fortnite

Chinese app maker Sungy Mobile may have exposed the information of more than 50.5 million of its customers, according to researchers who were able to access dozens of the company’s databases through a pair of IP addresses that did not

Microsoft has rolled out its August Patch Tuesday fixes, addressing 19 critical vulnerabilities, including fixes for two zero-day vulnerabilities that are under active attack. Overall, the company patched a total of 60 flaws, spanning Microsoft Windows, Edge, Internet Explorer (IE),

Phishing works no matter how hard a company tries to protect its customers or employees. Security researchers have been warning of a new phishing attack that cybercriminals and email scammers are using in the wild to bypass the Advanced Threat

Illusive Networks, the award winning leader in deception-based cybersecurity, announced the availability of its FirstMove services, the industry’s first comprehensive set of professional and consulting services aimed at helping customers plan, deploy, and optimize a deception-based approach to cybersecurity. A