There were more than 100 daily detections of ChatGPT-related malicious URLs captured from traffic seen in the Palo Alto Networks Advanced URL Filtering system.

There were more than 100 daily detections of ChatGPT-related malicious URLs captured from traffic seen in the Palo Alto Networks Advanced URL Filtering system.
A quick dive into the murky world of cyberespionage and other growing threats facing managed service providers – and their customers.
Given the potential for AI in the region and the pace at which CXOs are embracing technologies to create value and build differentiation, we can confidently say the MENA region is quickly becoming a strong contender in the global market.
Saif Rehman, Channel and Service Providers Leader, Middle East and Africa, Cisco Meraki, explains how they strive to stand apart in a crowded market.
Every communication service providers (CSPs) surveyed in the Middle East believe robust growth in traffic volumes will continue in the next 2-3 years with 36% expecting traffic to rise by over 50% up to 75%.
The leading authority on intelligent identity and access security, BeyondTrust, has released a new survey titled “Identity Issues Impact Zero …
Manufacturers’ ability to run sustainable digital operations is threatened by continued use of legacy systems, according to IDC.
This Russian-speaking actor uses a wide variety of malware implants developed at a rapid pace and in all programming languages imaginable, presumably in order to obstruct attribution.
In the wake of Earth Day 2023, Kaspersky reveals new data on the environmental impact of blocking crypto miners.
The Most Common Root Causes of Attacks Were Unpatched Vulnerabilities and Compromised Credentials, While Ransomware Continues to Be the Most Common “End Game”.
Kaspersky discovered a Qbot malware spike targeting corporate users, spread via a malicious spam-email campaign.
Sam Tayan, Head of METAP at Zoom explains how interpersonal interactions, workflows, and communication channels between workers, teams, and customers …
62% of businesses prefer a Unified AI- and ML-powered observability solution to provide a better customer experience.
Over 56% of the core routers ESET purchased from secondary market vendors contained a treasure trove of sensitive data, including corporate credentials, VPN details, cryptographic keys, and more.