Connect with us

Tech Features

Lessons of 2023 to arm us for 2024

Published

on

Trellix picture

By: Manoj Reddy M.V, Raghav Kapoor, Shyava Tripathi, Pham Duy Phuc, Max Kersten & Adithya Chandra at the Trellix Advanced Research Center

We often treat the transition to a new year as an opportunity to consign the past to the dustbin of history and usher in some imagined future idyll. But some of us notice that the more things change, the more they stay the same.

The new year is no time for defeatism. Let us learn the lessons of 2023 to arm us for 2024. Come with me as we take a dive into a list compiled by Trellix experts of the most dangerous attack vectors threatening our digital economy right now.

Unmasking The Silent Surge in Insider Threats

In recent years, insider threats have posed a multifaceted risk that affects both public and private organizations globally. An insider threat refers to any person, — whether an employee, contractor, partner, or someone with rogue access, who had or currently has access to critical organizational assets including facilities, information, networks, and systems. Based on recent industry analysis, insider threats have increased by 47% over the last two years, incurring a totals loss of $15.38 million for the containment of these incidents.

This threat undermines the confidentiality and integrity of the organization while aiding adversaries in gathering intelligence, carrying out sabotage operations, and using subterfuge methods to achieve their nefarious objectives. As connected devices continue to proliferate, and hybrid and remote workforces persist, insider threats will only continue to grow.

The Growing Battle of the (QR) Codes

The rise of QR code-based phishing campaigns represents an alarming trend. As our daily lives become increasingly reliant on digital interactions, attackers are adapting their tactics to exploit new vulnerabilities. QR codes, originally designed for their convenience and efficiency, have become an enticing tool for cybercriminals to use as an attack vector.

One of the primary reasons behind the expected increase in QR code-focused phishing campaigns is their inherent trustworthiness. QR codes become essential in various aspects of daily life during the COVID-19 pandemic, from contactless payments to restaurant menus. As a result, people have grown accustomed to scanning QR codes without much thought, assuming they are safe. This sense of trust can be exploited by cybercriminals who embed malicious links or redirect victims to fake websites. We expect that QR codes will also be used to distribute widely recognized malware families.

The Stealthy Assault on Edge Devices

There is a somewhat stealthy shift in the threat landscape underway, centering on the often-overlooked realm of edge devices. These unassuming components, including firewalls, routers, VPNs, switches, multiplexers, and gateways are becoming the new frontier for Advanced Persistent Threat (APT) groups. What sets this apart from normal is the subtlety of the threat; it’s not about the easily foreseen IoT vulnerabilities, but rather the less conspicuous challenges posed by edge devices themselves.

Edge devices have their unique complexities. However, the issue lies in their inherent inability to detect intrusions.

Python in Excel Creates a Potential New Vector for Attacks

With Microsoft implementing default defensive measures to block internet Macros in Excel, Macro usage by threat actors has seen an expected drop. Instead, they are exploring alternative attack vectors for their latest attacks, including lesser known or underutilized ones such as OneNote documents. However, with the recent creation and release of Python in Excel, we expect this to be a potential new vector for cybercriminals.

As both attackers and defenders continue to explore the functionality of Python in Excel, it is guaranteed that bad actors will start to leverage this new technology as part of cyberattacks. As the Python code is executed in containers on Azure, it can access local files with the help of Power Query.

Turn the tables

When you know what your adversary is doing, their mask slips. They become less scary. Threat intelligence is one of the greatest weapons we have right now and will also be so in the coming year. A sense of doom can be crippling and prevent positive action. Hence, it can hasten doom. We have the knowledge and we have the tools to bring about change. Let 2024 be the year that threat actors finally taste their own medicine. And let the 2024-2025 New Year be the one where threat actors finally become the pessimists.

Tech Features

AI and Digital Currencies Transform MENA Into Rising Fintech Leader

Published

on

abstract representation of AI and digital currencies

By Naser Taher, Chairman of MultiBank Group

Naser Taher, Chairman of MultiBank Group
Naser Taher, Chairman of MultiBank Group

The Middle East and North Africa (MENA) region has become the leading laboratory for financial innovation, where artificial intelligence (AI), central bank digital currencies (CBDCs), and sovereign wealth fund (SWF) strategies converge to reshape global cash flows. According to the World Economic Forum, venture capital investments in MENA grew by about 33% a year from 2015 to 2023, with funding reaching $644 million in 2024. This surge reflects deliberate efforts to position the region as a fintech powerhouse for the new economy.

One of the most significant developments is the strategic collaboration between the Abu Dhabi Investment Office (ADIO) and the Trump Organization to establish an AI and Web3 Free Zone. The $6.6 billion initiative aims to attract global tech firms, AI researchers, and fintech ventures to the UAE, further cementing MENA’s leadership in next-generation digital infrastructure.

Machine learning algorithms now process trades worth billions on Saudi Arabia’s Tadawul exchange daily, while automated risk assessment systems evaluate loan applications in real time from Dubai to Riyadh. Saudi Arabia’s Financial Sector Development Program has embedded AI throughout its capital markets ecosystem as part of Vision 2030’s broader economic transformation. PwC analysis projects this technological integration will generate almost $135 billion for the country’s economy by 2030, fundamentally altering how banks manage liquidity, assess credit risk, and compete regionally.

Central banks across the Gulf have moved beyond theoretical frameworks into live testing of digital currencies. The UAE’s Digital Dirham is set to enter retail circulation through licensed banks and fintech companies by late 2025, enabling near-instant cross-border payments where traditional banking requires days and charges hefty fees. Meanwhile, Saudi Arabia and the UAE have jointly piloted Project Aber, issuing a single wholesale CBDC. 

Gulf SWFs are reshaping the region’s infrastructure landscape, no longer content with simple portfolio plays. These institutions now control $4.9 trillion in assets, with projections reaching $7.3 trillion by 2030. In the first nine months of 2024, they accounted for 40% of all international SWF transactions, deploying $55 billion across 126 deals. Notably, Abu Dhabi’s Investment Authority and Saudi Arabia’s Public Investment Fund (PIF) are increasing allocations to blockchain and digital projects. In Qatar, the Qatar Investment Authority is working through the Qatar Financial Centre’s new Digital Asset Regulations 2024 to trial real-world asset tokenization.

Alongside these public sector moves; private institutions are also innovating on a scale. MultiBank’s new Electronic Communication Network (ECN) will introduce the Gulf’s first interbank trading and prime brokerage ecosystem, linking BRICS and GCC jurisdictions. Designed to compete with Western counterparts such as Bloomberg and Reuters, it connects conventional trading desks to machine-driven order routing and the MultiBank Chain’s tokenization layer. Cross-border deals become faster, safer, and more transparent, with settlements possible in gold or a mix of currencies instead of U.S. dollars alone. By opening the door to tokenized real-world assets and other decentralized products, the network sharpens the Gulf’s bid to serve as a global finance hub.

However, important challenges remain. Fintech ventures still need to navigate a maze of rules that shift from one border to the next; a single, region-wide framework would let ideas—and capital—move faster. As more money flows online, hackers gain fresh openings, and cybersecurity becomes even more critical. And while Gulf youth embrace tech with ease, the GCC needs far more specialists who can work with blockchains, train risk models, and secure CBDC payment rails. That calls for a push on everything from university courses to mid-career reskilling.

The next breakthrough won’t come from technology alone but from how well policymakers, entrepreneurs, and the sovereign heavyweights backing them work in sync. CBDC pilots are live, AI already guides trading desks, and deep pools of patient capital sit ready to fund new ideas. If the region’s key players keep pulling in the same direction, the Gulf won’t just join the digital finance conversation—it could end up leading it.

Continue Reading

Tech Features

Unleash Unmatched Cyber Defense: Sophos Firewall v21.5’s Breakthrough NDR-Essential

Published

on

Colleagues collaborating around a table in a modern office, captured candidly in natural light.
Chris McCormack, Senior Product Marketing Manager at Sophos

Sophos, a global leader in innovative security solutions for defeating cyberattacks, recently announced an update to its Sophos Firewall. Now, Sophos Firewall includes Sophos NDR Essential—free for all customers with an XStream Protection license.

With this integration, Sophos Firewall leverages two dedicated artificial intelligence engines to detect malware communications and algorithmically generated domain names. This new capability, powered by the Sophos Network Detection and Response probe, identifies previously unknown threats and complements the Active Threat Response features already in place.

Sophos Connect Integrates EntraID for SSO

The VPN client bundled with Sophos Firewall now supports EntraID (Azure AD) for single sign-on. This enhancement secures SSL and IPsec VPN connections and improves user experience by adding multi-factor authentication for both Sophos Connect and the user portal.

Other VPN-related improvements include:

  1. Intuitive interface updates: “Site-to-site” is now “policy-based,” and “route-based” tunnel interfaces are renamed for clarity.
  2. Dynamic IP pool validation: Prevents address conflicts across SSL VPN, IPsec, L2TP, and PPTP.
  3. Strict profile enforcement: Excludes default IPsec profile values to ensure algorithm synchronization and eliminate session negotiation issues.
  4. Enhanced scalability: Supports up to 3,000 route-based VPN tunnels, 1,000 SD-RED site-to-site tunnels, and 650 concurrent SD-RED devices.

Additional Management Enhancements

Furthermore, Sophos has rolled out several management improvements to streamline daily operations:

Flexible IPv6 DHCP-PD: Supports /48 to /64 prefixes for better ISP compatibility.

RA and DHCPv6 server enabled by default: Simplifies IPv6 deployments.

Resizable table columns: Improves the admin interface on ultra-wide screens.

Advanced search: SD-WAN routing and local ACL rules now support name, ID, and content-based searches.

Default configuration updates: Only the default network and MTA rules are provided; custom gateway probes and rule groups default to “None.”

Secure by Design

Moreover, Sophos continues to harden its firewall platform with a secure-by-design approach. Specifically, features are containerized, and integrity checks on critical OS files use mathematical checksums—any mismatch triggers an alert. Consequently, monitoring teams can swiftly identify potential compromises and react accordingly.

Availability

Customers can download and deploy this update manually on any Sophos Firewall with a valid license.

For more on Sophos’s Middle East strategy, check out our previous coverage:
Sophos Announces Intent to Expand Middle East Operations with New Data Center in the UAE

Continue Reading

Tech Features

Driving the Future: How Logical Data Management Powers EV Innovation in the UAE

Published

on

EV assembly line showing virtual data dashboards and logical data management overlays.
By Gabriele Obino, Regional Vice President and General Manager, Southern Europe, Middle East and CIS, Denodo

Logical data management is revolutionizing EV production in the UAE by replacing slow, siloed systems with a virtualized data layer. Consequently, manufacturers like Seres report an 88% reduction in data delivery time, empowering on-shop-floor decision-making and accelerating Industry 4.0 initiatives.

The Rise of Logical Data Management in EV Manufacturing

Under the UAE’s Operation 300bn strategy, EV production faces surging data volumes. Traditional ETL pipelines buckle under real-time demands. By contrast, logical data management—often called data virtualization—creates a semantic layer that unifies multiple stores without replication. This approach slashes latency, reduces storage overhead, and accelerates analytics across design, production, and operations.

Limitations of Traditional Data Systems for EV Production

Legacy batch-driven data warehouses delay critical actions. In a high-stakes assembly line, even millisecond lags can compromise quality or safety. Moreover, centralized silos inflate storage and governance costs, especially under strict UAE data-sovereignty laws. Static architectures simply cannot keep pace with AI-driven analytics or digital twin simulations.

Adopting Logical Data Management for Real-Time Insights

Firstly, Logical data management platforms (Denodo) let shop-floor teams query live data instantly. For example, EV manufacturer Seres cut data delivery time by 88% and built 600+ self-service analytics apps. Furthermore, virtualized data services simplify compliance with role-based security, ensuring governed access to sensitive vehicle-PII under UAE regulations.

Implementation Strategy for Logical Data Management

1-Identify critical data sources affecting safety, cost, and sustainability

2-Pilot virtualization on latency-sensitive processes such as battery-pack assembly

3-Enforce governance policies to maintain data integrity and security

4-Train non-technical staff on user-friendly analytics tools

5-Monitor production metrics improvements to scale across the factory

Additionally, regular reviews help refine and scale each phase effectively.

Future Outlook for Logical Data Management in the UAE EV Market

Looking ahead, as the EV sector grows beyond the current US$1.8 billion market, data becomes as vital as any physical component. Therefore, by valuing data on par with hardware, UAE factories can slash defects, boost efficiency, and maintain a competitive advantage. Consequently, early adopters of logical data management will lead the next wave of automotive innovation.

For more on cutting-edge EV innovations in the region, check out our feature:
NIO’s Industry-Leading Innovations Set New Benchmarks for Intelligent Premium Electric Mobility

Continue Reading

Trending

Copyright © 2023 | The Integrator