Guest written by Greg Wiseman, senior security researcher at Rapid7 about this month’s Microsoft patches, which were released last tuesday This month sees another spate of critical fixes from Microsoft, including patches for a number of Remote Code Execution (RCE) vulnerabilities. Two of these are already known to be exploitedRead More…

Guest written by Charles Habak, Vice President and Wayne Loveless, Principal at Booz Allen Hamilton MENA. WannaCry (Wcry) represents the latest version of a growing threat called ransomware – a tailored piece of malware designed to exploit specific vulnerabilities in the operating systems of its victims’ computers. Malware outbreaks areRead More…

Guest Written By: Shadi Bakhour, B2B Business Unit Director, Canon Middle East Security is both a basic business requirement and an ongoing concern. It is something that shapes the way businesses both choose and implement technology. As modern businesses process and retain an extraordinarily high amount of sensitive documents andRead More…

Security experts from Beyond Security, a leading provider of automated security testing solutions including vulnerability assessment, released 5 effective and easy tips to follow for protecting against serious Internet security threats that can cause both financial and emotional damages: 1. Use an up-to-date and supported operating system. All victims ofRead More…