Tech Features
Making Sense of Identity Threat Risks
By David Warburton, Director, F5 Labs
The growing maturity of cloud computing, including shifts towards decentralized architectures and APIs, has highlighted the complexity of managing credentials in increasingly interconnected systems. It has also underlined the importance of managing non-human entities like servers, cloud workloads, third-party services, and mobile devices.
F5 Labs’ 2023 Identity Theft Report defines identity as an artifact that an entity uses to identify itself to a digital system – such as a workload, a computer, or an organization. Examples of digital identities include username/password pairs and other personally identifiable information or cryptographic artifacts such as digital certificates.
Digital identities cannot stand on their own. They require a system to accept and validate them. In other words, for a digital identity to function there must be at least two parties involved: an entity and an identity provider (IdP) that are responsible for issuing and vetting digital identities. However, not all organizations that provide resources are IdPs—many digital services rely on third-party IdPs such as Google, Facebook, Microsoft, or Apple to vet identities.
Based on our recent analysis, the three most prominent forms of attack in the identity threat arena currently are credential stuffing, phishing, and multi-factor authentication (MFA) bypass.
Credential stuffing
Credential stuffing is an attack on digital identity in which attackers use stolen username/password combinations from one identity provider to attempt to authenticate to other identity providers for malicious purposes, such as fraud.
It is a numbers game that hinges on the fact that people reuse passwords,
but the likelihood that any single publicly compromised password will work on another single web property is still small. Making credential stuffing profitable is all about maximizing the number of attempts, which requires automation.
Phishing
Phishing is perhaps rivaled only by denial of service (DoS) attacks in being fundamentally different from other kinds of attacks. It is an attack on digital identity, to be sure, but since it usually relies on a social engineering foothold, it is even more difficult to detect or prevent than credential stuffing.
Phishing attacks have two targets: there is the end user who is in possession of a digital identity, and there is the IdP, which the attacker will abuse once they’ve gotten credentials. Depending on the motives of the attacker and the nature of the system and the data it stores, the impact of a successful phishing trip can land primarily on the user (as in the case of bank fraud), solely on the organization (as in the case of compromised employee credentials), or somewhere in the middle.
On the attacker side, phishing can range from simple, hands-off solutions for unskilled actors to custom-built frameworks including infrastructure, hosting, and code. The most hands-off setup is the Phishing-as-a-service (PhaaS) approach in which the threat actor pays to gain access to a management panel containing the stolen credentials they want, and the rest is taken care of by the “vendor.”
Dark web research indicates that the most popular subtype of phishing service is best described as phishing infrastructure development, in which aspiring attackers buy phishing platforms, infrastructure, detection evasion tools, and viable target lists, but run them on their own.
Brokering phishing traffic, or pharming, is the practice of developing infrastructure and lures for the purposes of driving phishing traffic, and then selling that traffic to other threat actors who can capitalize on the reuse of credentials and collect credentials for other purposes.
Finally, the attacker community has a niche for those who exclusively rent out hosting services for phishing.
The most important tactical development in phishing is undoubtedly the rise of reverse proxy/ man-in-the-middle phishing tools (sometimes known as real-time phishing proxies or RTPPs), the best known of which are Evilginx and Modlishka. This is largely because it grants attackers the ability to capture most multi-factor authentication codes and replay them immediately to the target site facilitating MFA bypass but also making it less likely that the user victim will detect anything is amiss.
Multi-factor authentication (MFA) bypass
Recent years have seen attackers adopt a handful of different approaches to bypassing multi-factor authentication. The differences between these approaches are largely driven by what attackers are trying to accomplish and who they are attacking.
Nowadays, the reverse proxy approach has become the new standard for phishing technology, largely because of its ability to defeat most types of MFA.
MFA bypass tactics include:
- Malware. In mid-2022, F5 malware researchers published an analysis of a new strain of Android malware named MaliBot. While it primarily targeted online banking customers in Spain and Italy when it was first discovered, it had a wide range of capabilities, including the ability to create overlays for web pages to harvest credentials, collect codes from Google’s Authenticator app, capture other MFA codes including SMS single-use codes, and steal cookies.
- Social engineering. There are several variations of social engineering for bypassing MFA. Some target the owner of the identity, and some target telecommunications companies to take control of phone accounts.
- Social Engineering for MFA Code—Automated. These are attacks in which attackers make use of “robocallers” to make phone calls to the target, emulating an identity provider and asking the victim for an MFA code or one-time password (OTP).
- Social engineering for MFA code—Human. This is the same as the above approach except that the phone calls come from humans and not an automated system.
- SIM swaps. In this kind of attack, a threat actor obtains a SIM card for a mobile account that they want to compromise, allowing them to assume control of the victim’s phone number, allowing them to collect OTPs sent over SMS. There are several variations of this approach.
So, what does it all mean?
Identity threats are constant and continuous. Whereas a vulnerability represents unexpected and undesirable functionality, attacks on identity represent systems working exactly as designed. They are therefore “unpatchable” not only because we can’t shut users out, but because there isn’t anything technically broken.
This brings us back to the question of what digital identity really is. To go from real, human identity to digital identity, some abstraction is inevitable (by which we mean that none of us is reducible to our username-password pairs). We often teach about this abstraction in security by breaking it down to “something we know, something we have, and something we are.” It is this abstraction between the entity and the digital identity that attackers are exploiting, and this is the fundamental basis of identity risk.
By thinking about digital identities in this way, what we are really saying is that they are
a strategic threat on par with, but fundamentally different from, vulnerability management. With nothing to patch, each malicious request needs to be dealt with individually, as it were. If modern vulnerability management is all about prioritization, modern identity risk management is essentially all about the ability to detect bots and differentiate them from real human users. The next logical step is quantifying the error rate of detecting these attacker-controlled bots. This is the basis on which we can begin to manage the risk of
the “unpatchables.”
Tech Features
How digital transformation of UAE’s industrial sector is driving ‘Net Zero 2050’ ambitions
By Ahmad Hamad Bin Fahad, CEO of DUBAL Holding
The UAE’s growth journey is led by an unwavering focus on driving digital transformation, enhancing renewable energy capacity and promoting regulatory excellence. This is best reflected in the ‘Net Zero 2050’ strategy, which aims to create 200,000 jobs across the solar, battery and hydrogen sub-sectors, combining economic and sustainability goals. Digitalisation of the industrial sector will play an important role in realising this vision by paving the way for long-term industrial competitiveness and resilience.
Smart manufacturing, AI adoption and Industry 4.0
Across the UAE, factories are being installed with smart manufacturing systems that integrate IoT sensors, predictive analytics and real-time data environments. These optimise energy usage, reduce downtime and minimise material waste, turning sustainability into a measurable, operational outcome rather than an abstract concept.
Furthermore, digitally connected factories can track emissions at every stage of production, benchmark efficiency and automate corrective actions. This is crucial to achieving the goals of ‘Operation 300bn’ and positioning the UAE as a global hub for future industries.
According to the Ministry of Industry and Advanced Technology (MoIAT), Industry 4.0 tools can increase the nation’s industrial productivity by up to 30 per cent while reducing operational costs by nearly 20 per cent through wider structural transformations. Moreover, AI adoption is set to contribute AED 335 billion to the UAE economy by 2031, as reported by the UAE Council for AI and Blockchain.
Artificial Intelligence is also redefining how industrial assets function, from power plants and smelters to logistics centres and material processing facilities. AI-enabled algorithms can even forecast equipment failures, balance energy loads and simulate entire production cycles to identify carbon-saving interventions. AI also helps enhance transparency and enforce operational discipline, promoting both sustainability and profitability.
Role of advanced automation in redefining industrial operations
Advanced automation, from robotics to autonomous transport systems, is driving sustainability by eliminating key bottlenecks that cause higher emissions. Furthermore, automated systems ensure enhanced precision, enabling industries to streamline energy usage, optimise supply chains and accelerate circular-economy practices such as recycling, material recovery and waste-to-value processes.
However, automation does not replace human capability; it merely enhances it, enabling operators to move on to high-value digital roles. It efficiently tackles repetitive, energy-intensive tasks, creating a more resilient, low-carbon industrial ecosystem. A key enabler of this transition is the rise of strategic, government-aligned investments in digital-first industrial ventures. These investments are the backbone of the nation’s industrial future as they help build advanced manufacturing platforms, AI-driven optimisation technologies, smart mobility solutions and digital energy-management systems.
By investing in companies that integrate digital tools into core industrial operations, the UAE is accelerating technology adoption at scale. These investments further position digital transformation as a strategic imperative for fulfilling the UAE’s sustainability goals while boosting economic competitiveness.
Way Forward: Shaping a resilient industrial economy
The UAE’s wise leadership remains committed to fostering an ecosystem that rewards digital innovation and AI adoption. Moreover, by directing long-term strategic capital towards transformative technologies, the nation is building an industrial sector that is both future-ready and climate-aligned.
Amid this shift, digitalisation stands out as the most critical tool for building a sustainable, net-zero industrial economy. Aligning with this, companies must embrace forward-looking strategies that can positively shape the future of the industry.
Tech Features
WOMEN LEADING THE CHARGE IN 2026

Across the technology landscape, women continue to shape innovation with resilience, curiosity, and vision. Their diverse perspectives—shaped by unique journeys, challenges, and triumphs, remind us that progress in tech is driven not only by expertise, but by the voices that dare to redefine what’s possible. This collection of insights amplifies those voices, celebrating the power of women who lead, inspire, and transform the future of technology.
International Women’s Day Comments

Sumaiya Muhammad, Sr. Marketing Specialist at Alteryx –
“My professional journey has evolved across hardware, software, telecom, and now data automation at Alteryx. Working across these domains has strengthened my adaptability and deepened my understanding of how data drives real business value. According to Alteryx research, 48% of leaders plan to increase spending on AI infrastructure and tools, signalling how rapidly enterprise priorities are shifting and how significant it is for women to build confidence in data and AI. A challenge I have consistently faced is navigating constant change in an industry where innovation cycles move quickly. I have realised that continuous learning and investing in upskilling is crucial in this industry.
This International Women’s Day, I encourage aspiring women professionals to step forward boldly and actively shape the future of technology.”
Merhan Gaballah, Construction Technology & PropTech Consultant at PlanRadar –

Throughout my career in construction technology and PropTech, my journey has evolved from commercial roles into strategic advisory positions supporting digital transformation across the GCC.
One of the key challenges has been building credibility in traditionally male-dominated environments, where technical leadership is often predefined. Overcoming this required resilience, preparation, and consistently delivering measurable impact.
Today, I see strong momentum for women in tech. Digital transformation is redefining leadership, placing greater value on collaboration, adaptability, and data-driven thinking—areas where diverse perspectives are essential.
On International Women’s Day, I hope we move beyond recognition toward sustained inclusion, where women are not highlighted as exceptions, but empowered as equal contributors shaping the future of technology.
Alexandra Gartrell, VP and EMEA Legal Lead at Cloudera –

“This year’s International Women’s Day theme, Give to Gain, is a reminder that investing in women’s advancement at work delivers returns for everyone. Diverse teams broaden talent pipelines, improve decision-making, and build workplaces where people are more engaged and more likely to stay.
AI systems inherit the assumptions of the environments that build them. When development teams skew toward a single demographic, bias doesn’t only show up in datasets. It can also appear in which problems are prioritised, how success is defined, which edge cases are tested, and what risks are accepted. In the agentic era, autonomy raises the stakes: small weaknesses in data, design, or oversight can be amplified once decisions are made at scale.
As AI becomes embedded across core business functions, coding ability is no longer the sole marker of technical contribution. Engineers need business acumen, communication skills, and the ability to collaborate across functions because responsible AI depends on context and judgment, not just models.
True inclusion means having diverse voices shape product direction and decision rights and not just representation in organisational charts. Practically, this means auditing datasets for representation gaps, testing models for unequal outcomes, stress-testing edge cases, and involving a diverse panel of human reviewers throughout the AI lifecycle.
According to Cloudera’s WLIT 2025 report, 91% of women leaders in the Middle East remain optimistic that gender equality in AI leadership will improve within five years. When women are given resources, opportunities, and authority in AI development, organisations gain better AI systems that work for everyone. In the agentic era, diversity in leadership and oversight should be treated as part of AI risk management.
Organizations that formalize cross-functional approaches, create transition pathways, and recognize emotional intelligence as a technical capability will build better AI and advance gender equity.”

Fatma Al Naggar, Senior Relationship Manager, Saxo Bank MENA –
“In times of uncertainty, women have consistently proven to be natural problem-solvers and stabilisers, leading their homes, workplaces, and communities with empathy, adaptability, and a profound sense of responsibility.
While women naturally take on the role of emotional anchors due to their deep attunement to the needs of others, it is crucial that providing this support never comes at the expense of their own well-being. Sustainable resilience requires setting boundaries, prioritizing self-care, and establishing personal rituals that help maintain a positive mindset and focus on what can be controlled amidst the external noise of today’s fast-paced digital world.
As women progress in their careers and redefine leadership across industries, they are bringing a more collaborative, empathetic, and purpose-driven approach that prioritizes transparency and inclusivity over traditional authority. In highly competitive fields, particularly male-dominated sectors like finance and technology, technical expertise may open doors, but it is the mastery of soft skills such as emotional intelligence, relationship building, and strategic thinking that sustains advancement and leadership credibility.
Furthermore, living and working in a multicultural environment like the UAE significantly amplifies this professional growth. The country’s strong emphasis on safety, opportunity, and diversity provides an unparalleled space where women from all backgrounds can pursue their ambitions with confidence, learn from diverse perspectives, and foster inclusive, globally minded innovation.
Yet, achieving true gender equity demands ongoing progress to ensure equal access to leadership roles, mentorship, and career development, while continually challenging outdated perceptions about women’s roles. An ideal workplace must actively promote equality, respect, equal pay, and flexible work options, empowering every woman to reach her full potential.
On this International Women’s Day, my message to all women, especially young girls carving their own paths, is to believe in your abilities, embrace curiosity, and never hesitate to pursue challenging opportunities. By recognizing our inherent strength, owning our expertise with authenticity, and leading with resilience, we can collectively shape a more inclusive and high-performing future for our communities and industries.”
Laura Heisman, CMO, Dynatrace –

The rise of AI isn’t just a call for women to adapt, it’s an opportunity for women to lead. With an estimated 85% of the jobs that will exist in 2030 yet to be created, AI is not only reshaping roles, but entire career journeys. Traditional paths are breaking down, opening doors for women to step into emerging opportunities – and redefining what’s possible for soon-to-be graduates and school-aged girls alike.
This is our moment to help define the future of work and pave the way for generations to come. But progress isn’t automatic. Without intentional action and human connection, women risk being sidelined in this transformation. Learning, experimenting, and getting comfortable with AI isn’t optional. It’s how we remain active participants in shaping what comes next.
The future will be shaped by what and who we invest in today. When we support women and future generations through mentorship, intentional recruiting, training, and shared learning, we don’t just advance opportunity – we build better technology, stronger businesses, and a more inclusive future. It starts with choosing to learn, experiment, and grow with AI. That is the spirit of this year’s International Women’s Day focus, where we “give to gain.”
Tech Features
NETSCOUT REVEALS QUALITATIVE SHIFTS IN DDOS ATTACK SOPHISTICATION, INFRASTRUCTURE CAPACITY, AND THREAT ACTOR CAPABILITIES

NETSCOUT® SYSTEMS, INC. (NASDAQ: NTCT), today released its second half of the year 2025 Distributed Denial-of-Service (DDoS) Threat Intelligence Report, revealing sophisticated attacker collaboration, resilient botnets, and compromised IoT infrastructure that drove more than eight million DDoS attacks worldwide – some as large as 30 terabits per second (Tbps) – marking a new era of hyper-scale, coordinated threat activity that continues to outpace global takedown efforts. Meanwhile, the accelerating growth of DDoS-for-hire services is empowering a broader range of threat actors, intensifying operational risk to digitally connected organizations and enterprises.
Implications for security professionals extend far beyond volumetric concerns and include reconnaissance and adaptive evasion which challenge traditional defense paradigms. Organizations must match adversarial innovation with intelligent, autonomous defenses, or risk operational disruption at levels previously considered theoretical.
“Threat actors identify organizations that haven’t invested in the right defenses to stay ahead of sophisticated and coordinated DDoS attacks to take down critical infrastructure,” stated Richard Hummel, director, threat intelligence, NETSCOUT. “Traditional security defenses are no longer working, and with attackers hitting new attack size and complexity ceilings, implementing automated and proactive defenses has become a business-level risk mandate – not just a technical concern for security professionals.”
Key research findings include:
- Massive attacks on a global scale – More than eight million attacks were identified across 203 countries and territories globally.
- Continued Use of Multi-Vector Attacks – approximately 42% of DDoS attacks employed two to five distinct attack vectors, with some adapting dynamically throughout the attack to complicate detection and mitigation.
- Outbound Attacks Impact Broadband and Mobile Services – Extensive direct-path attacks revealed that compromised IoT and customer-premises equipment can generate outbound floods exceeding 1 Tbps, creating liability, service, and reputational risk for broadband and mobile providers.
- Critical Infrastructure Targeted – High‑value services such as NTP and DNS continue to face sustained attack pressure, emphasizing the need for resilient, globally distributed architectures to maintain service continuity.
- Threat actors scale up collaboration – A surge of more than 20,000 botnet-driven attacks in July 2025 exemplified how coordinated threat activity can rapidly overwhelm defenses and disrupt critical government, finance, and transportation services.
- Threat actor persistence – Despite international law enforcement dismantling multiple DDoS-for-hire platforms, hacktivist groups and botnets remain resilient, exerting increased pressure.
- AI integration accelerates operations and collaboration – AI has transitioned to an operational reality, with large language models (LLMs) on the dark web accelerating vulnerability exploitation and botnet expansion, and underground forums documenting a 219% increase in mentions of malicious AI tools. Groups like Keymous+ have demonstrated how partnerships between threat actors amplify attack power, with bandwidth increasing nearly fourfold.
NETSCOUT maps the DDoS landscape through passive, internet vantage points, providing unparalleled visibility into global attack trends. For more than 15 years, NETSCOUT has delivered trusted, consistent DDoS Intelligence based exclusively on directly observed, verifiable attack traffic. NETSCOUT does not aggregate multiple alerts or geographically distributed events into composite peak values, ensuring accuracy, repeatability, and true comparability across reporting periods. Peak metrics reflect single-second maximum bits-per-second (bps) and packets-per-second (pps) rates measured at defined mitigation and monitoring points.
NETSCOUT protects two-thirds of the routed IPv4 space, securing network edges that carried global peak traffic of over 800 Tbps, covering 376 industry verticals and 12,698 Autonomous System Numbers (ASNs) in the second half of 2025. It monitors tens of thousands of daily DDoS attacks by tracking multiple botnets and DDoS-for-hire services that leverage millions of abused or compromised devices.
-
News10 years ago
SENDQUICK (TALARIAX) INTRODUCES SQOOPE – THE BREAKTHROUGH IN MOBILE MESSAGING
-
Tech News2 years agoDenodo Bolsters Executive Team by Hiring Christophe Culine as its Chief Revenue Officer
-
VAR11 months agoMicrosoft Launches New Surface Copilot+ PCs for Business
-
Tech Interviews2 years agoNavigating the Cybersecurity Landscape in Hybrid Work Environments
-
Tech News8 months agoNothing Launches flagship Nothing Phone (3) and Headphone (1) in theme with the Iconic Museum of the Future in Dubai
-
Automotive1 year agoAGMC Launches the RIDDARA RD6 High Performance Fully Electric 4×4 Pickup
-
VAR2 years agoSamsung Galaxy Z Fold6 vs Google Pixel 9 Pro Fold: Clash Of The Folding Phenoms
-
Tech News2 years agoBrighton College Abu Dhabi and Brighton College Al Ain Donate 954 IT Devices in Support of ‘Donate Your Own Device’ Campaign


