GBO CorrespondentApril 1, 2024 Artificial Intelligence tools in coding still scarce: StudyGBO CorrespondentApril 1, 2024 If something doesn’t look right to the human observer, the user can...
GBO CorrespondentMarch 28, 2024March 28, 2024 Phishing & Java-based downloader: Threat actors find new avenues of spreading TrojansGBO CorrespondentMarch 28, 2024March 28, 2024 The typical phishing email that purports to be from the victim's company's...
GBO CorrespondentMarch 21, 2024March 20, 2024 Hundreds of Google Firebase websites suspected of exposing information onlineGBO CorrespondentMarch 21, 2024March 20, 2024 Google Firebase is a backend service that provides cloud data storage and...
GBO CorrespondentMarch 14, 2024March 14, 2024 Next stop for Saudi Vision 2030: Training over 1,000 engineers in new AI programmeGBO CorrespondentMarch 14, 2024March 14, 2024 Saudi government-owned oil and gas company Saudi Aramco recently unveiled its first...
GBO CorrespondentMarch 7, 2024March 6, 2024 Tech supply chains most vulnerable during cyberattacks: ReportGBO CorrespondentMarch 7, 2024March 6, 2024 With 35% of all cyberattacks resulting from third-party breaches, the healthcare vertical...
GBO CorrespondentMarch 5, 2024March 4, 2024 ConnectWise ransomware nightmare: Vulnerabilities exposedGBO CorrespondentMarch 5, 2024March 4, 2024 It was proven that several well-known entities, like the LockBit ransomware group,...
GBO CorrespondentFebruary 29, 2024 83% of workers in UAE pose phishing threat to companies: Proofpoint reportGBO CorrespondentFebruary 29, 2024 Even though there was a slight decrease in successful phishing attacks globally,...
GBO CorrespondentFebruary 26, 2024 Saudi Vision 2030: Meet AI-driven Neo-ArabiaGBO CorrespondentFebruary 26, 2024 Every year, Saudi Arabia organizes the Global AI Summit to highlight and...
GBO CorrespondentFebruary 22, 2024 ‘Abuse of VPNs is the problem,’ warns UAE’s head of cybersecurityGBO CorrespondentFebruary 22, 2024 Residents of the UAE who break the law and abuse VPNs risk...
GBO CorrespondentFebruary 15, 2024 Return of Bumblebee malware: All you need to knowGBO CorrespondentFebruary 15, 2024 It has been confirmed that Bumblebee can be used to deploy ransomware,...