Ahmad Halabi, Managing Director (UAE), Resecurity, tells Anita Joseph, Editor, Security Advisor about the company’s participation at Black Hat and …

Ahmad Halabi, Managing Director (UAE), Resecurity, tells Anita Joseph, Editor, Security Advisor about the company’s participation at Black Hat and …
Vectra, network threat detection and response (NDR) solutions provider, has disclosed that cybercriminals’ most effective weapon in a ransomware attack …
Mimecast’s Threat Intelligence Report: Black Hat Edition 2019, revealed that attackers are using either simple, opportunistic attacks or complex, targeted attacks based on necessity to impact the target.
The impact of hacked SIM cards, one of the few stalwarts in the high-tech industry that has not seen a serious exploit, could be monumental.
Millions of mobile phones may be vulnerable to spying due to the use of outdated, 1970s-era cryptography, according to new research due to be presented at the Black Hat security conference.
Oracle’s bad Java week got worse on Wednesday, after it was announced that a previously unknown flaw in the programming …
A tool for testing if Web application firewalls (WAFs) are vulnerable to around 150 protocol-level evasion techniques was released at …
GET TAHAWULTECH.COM IN YOUR INBOX