Generative AI (GenAI) is here to stay. Organizations around the world are enthusiastically using and investing in the technology. A …
“Businesses in UAE and KSA well positioned to capitalise on opportunities in GenAI” – Dell Technologies
Generative AI (GenAI) and AI will significantly transform industries in the future, according to UAE (95%) and KSA (100%) respondents …
Cisco report shows developers spending more time firefighting than innovating
Cisco has unveiled findings from a survey that details how software developers are spending more than 57% of their time …
Spoofing Shein for credential Harvesting
By Jeremy Fuchs, Cybersecurity Researcher/Analyst Check Point Software LTD, discusses how cybercriminals are impersonating the popular shopping app Shein and the steps you can take to become more aware.
Management ‘bought the AI hype’ but lack organisational readiness
IFS commissioned research shows value creation lags AI promise without the right planning and application.
Extreme Introduces Hub for Research, Development and Innovation in Networking
Extreme Introduces Extreme Labs: A Hub for Research, Development and Innovation in Networking.
Chainalysis report shows that crypto laundering has declined by 30%
Shining a spotlight on the laundering of cryptocurrencies, Chainalysis has revealed that such activity fell sharply, by nearly 30% last …
ESET Research discovers espionage apps on the attack in Pakistan, utilising romance scams
The campaign leveraged Google Play to distribute six malicious apps bundled with VajraSpy RAT code; six more were distributed in the wild.
New research from Qualys shows the highest risks organizations faced in 2023
Qualys, Inc (NASDAQ: QLYS), has released new research from the Qualys Threat Research Unit (TRU), delving into some of the critical vulnerabilities …
Official Python repository served cyberespionage backdoor, gathered 10,000+ downloads
ESET Research discovered 116 malicious packages in PyPI, the official repository of software for the Python programming language, uploaded across 53 projects. Victims have downloaded these packages over 10,000 times.