Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Ministry of Foreign Affairs and Strategic Trade Partnerships

In today's interconnected world, trade is no longer just about goods crossing borders; it's about building relationships, fostering trust, and creating long-term partnerships that benefit entire economies. For the UAE, these relationships are nurtured and strengthened in collaboration with the Ministry of Foreign Affairs and other entities that play a pivotal role in shaping the country's global trade landscape.
Featured Post

The Global Regulatory Convergence: A Catalyst for Smarter Compliance

As digital technologies and threats transcend borders, the global convergence of regulatory frameworks is no coincidence. Governments and regulators are recognising the need for consistency as cyberattacks, data breaches, algorithmic bias, and systemic failures in digital infrastructure are no longer local concerns but are global risks that require harmonised solutions.

The API Security Reality Check: Key Takeaways from Q2 2025 API ThreatStats Report

API security has never been more crucial. Vulnerabilities are growing in volume and severity. AI integrations are a burgeoning attack vector. Increasing GraphQL adoption presents hidden dangers. To protect your organization, you must secure your APIs. Keep reading for our key takeaways from the Wallarm Q2 2025 API ThreatStats report – and find out what you need to do to protect yourself.

CVE-2025-7775: Memory Overflow Vulnerability in Citrix NetScaler ADC and Gateway

On August 26th, 2025, Citrix patched CVE‑2025‑7775, a memory overflow vulnerability in NetScaler ADC and Gateway appliances that allows unauthenticated remote code execution (RCE) and/or denial-of-service. This threat is confirmed to be actively exploited in the wild. Citrix strongly emphasized that no mitigations exist aside from applying the patch immediately.

Weaponizing AI Coding Agents for Malware in the Nx Malicious Package Security Incident

On August 26–27, 2025 (UTC), eight malicious Nx and Nx Powerpack releases were pushed to npm across two version lines and were live for ~5 hours 20 minutes before removal. The attack also impacts the Nx Console VS Code extension.

5 Ways to Keep AWS Fast with Just-in-Time Access

Modern AWS environments move fast. Engineers spin up EKS clusters for testing, automation pipelines deploy to production, and AI agents trigger infrastructure workflows via Amazon Bedrock. AWS provides ways to manage access primitives such as roles and privileges to keep up with this velocity, such as STS AssumeRole, OIDC federation, IAM Authenticator, and Identity Center. But the challenge isn’t in these primitives themselves. It's the human factor behind the primitives.

The Top 10 Requirements MSSPs Have for External CTI

MSSPs operate high-availability Security Operations Centres (SOCs), which enable them to deliver 24/7 security services designed to reduce the burden on enterprises in staffing and maintaining operational security capabilities. MSSPs play a pivotal role by extending security operations on behalf of their clients.

Internxt Successfully Passes an Updated Security Audit

We are pleased to announce that Internxt has passed its second consecutive security audit for all its services from the leading independent European pentesting company, Securitum, which also works with firms as relevant as Proton. Having become the first cloud storage with post-quantum, plus our zero-knowledge policies, when we say your data is private and secure from hackers, it’s not just a claim, but verifiable by external security professionals and experts in the field.

Making Cyber Threat Intelligence Work for Your Organization: The Intelligence Paradox

Security teams receive thousands of threat indicators daily. IP addresses, domain names, file hashes, and vulnerability advisories flood their inbox from multiple intelligence feeds. Yet when the next breach happens, you're still caught off guard. Sound familiar? The problem isn't a lack of information; it's a lack of context.