CONNECTING TECHNOLOGY SHAPING BUSINESSES
In August 2024, Proofpoint researchers identified an unusual campaign using a novel attack chain to deliver custom malware. The threat actor named the malware “Voldemort” based...
By: Srijith Kn The Voldemort espionage malware campaign, which has made headlines for its widespread infiltration of organizations worldwide, has raised significant concerns among cybersecurity experts....
By Saeed Abbasi, Product Manager, Vulnerability Research, Qualys Threat Research Unit (TRU) In the Arab Gulf region, ransomware has become an epidemic. Since 2019, Saudi Arabia...
By David Warburton, Director, F5 Labs The growing maturity of cloud computing, including shifts towards decentralized architectures and APIs, has highlighted the complexity of managing credentials...
ASBIS introduces AMD EPYC demo marketing server, offering high performance, scalability, and efficiency for data center applications, cloud computing, virtualization, and enterprise tasks Recently ASBIS has...
By Uday Shankar Kizhepat, Vice President and General Manager- Middle East and Africa Region, WSO2 We live digitally. Much of our professional work is digital, as...
Cloud data ecosystems are the way forward for both industrial enterprises and the technology providers that support them, says Rónán de Hooge, Executive Vice President, Cloud...
D-Link Corporation, a global leader in networking solutions, is proud to announce the launch of its latest enterprise-grade access points, the DAP-X3060 and DAP-X3060OU. Featuring state-of-the-art...
Toshiba Electronics Europe GmbH (Toshiba) announces its next-generation S300 Pro Surveillance Hard Disk Drives (HDDs) targeting the latest requirements in the surveillance storage market. With capacities...
In a significant development for the AI sector, Elon Musk, the CEO of Tesla and owner of the social media platform X, recently voiced his support...