Find

November 21, 2024

HP Wolf Security Unveils Advanced PC Protection Against Physical Cyberattacks 

HP Inc. (NYSE: HPQ) has introduced the HP Enterprise Security Edition, […]
by News Desk | 2 min read
November 20, 2024

Hackers Target IT Specialists to Launch Larger Cyberattacks

Positive Technologies’ latest study on the Q3 2024 cybersecurity threatscape […]
by News Desk | 2 min read
October 3, 2024

78% of Middle East Businesses Expect Cyberattacks, Only 46% Prepared

A new study by Cloudflare, Inc. (NYSE: NET) reveals that […]
by News Desk | 2 min read
July 2, 2024

96% of Organizations Vulnerable to Cyberattacks, Report Reveals

96% of Organizations Vulnerable to Cyberattacks, Reveals Positive Technologies’ Penetration […]
by News Desk | 2 min read
March 28, 2024

Middle East Faces Surge in Cyberattacks on Telecom and Military Sectors

Cyber attackers have intensified their focus on key sectors in […]
by News Desk | 2 min read
December 18, 2023

Organizations face doubled successful cyberattacks: Positive Technologies

Positive Technologies, a player in proactive cybersecurity, has conducted an […]
by News Desk | 2 min read
December 14, 2023

40% of Cyberattacks Breach Saudi Organizations: Tenable Study

Tenable®, the company specializing in Exposure Management, emphasized today that […]
by News Desk | 2 min read
November 7, 2023

Surge in Cyberattacks Threatens Gamers in 2023

The global gaming community, comprising nearly half of the world’s […]
by News Desk | 3 min read
October 12, 2023

Cloudflare’s Fight Against Record-Scale Cyberattacks

Cloudflare, Inc. (NYSE: NET), the foremost connectivity cloud company, has […]
by News Desk | 2 min read
September 21, 2023

Africa Reports Highest Number of Industrial System Cyberattacks in H1 2023

In the first half of 2023, Africa stood out as one of the regions most heavily targeted by cyberattacks on industrial systems, according to a report from Kaspersky's ICS CERT. Across the globe, 34% of Industrial Control System (ICS) computers faced and successfully blocked various types of malicious threats during this period.
by News Desk | 2 min read