According to a study by Positive Technologies, vulnerability exploitation has ranked among the top three most popular attack methods on organizations for five years running. In 2022–2023, attackers stole confidential data from over 2,700 companies worldwide, exploiting just one vulnerability.Read More…

Fedor Chunizhekov, Information Security Analyst at Positive Technologies talks about the evolving cybersecurity landscape in the region and highlights the key points from its “Cybersecurity threatscape in the Middle East” report that are impacting the Middle East. He also emphasized that to address the core security issues we need toRead More…