Three vulnerabilities in PCIe Integrity and Data Encryption protocol could allow privilege escalation, data corruption, or denial-of-service on Intel Xeon and AMD EPYC processors, CERT/CC advises firmware updates.
Fortinet, Ivanti, and SAP have released security updates to fix critical vulnerabilities in their products, including authentication bypass, code execution, and JavaScript injection flaws, urging organizations to patch promptly.
Silver Fox threat actor deploys ValleyRAT malware via SEO poisoning and Microsoft Teams lures, mimicking Russian cyber groups to target organizations in China and job seekers globally.
NCCIA has identified 139 online platforms including websites, apps, and social media accounts involved in illegally selling sensitive data of Pakistani citizens, with PTA blocking the platforms and further action underway.
SecurityScorecard’s 2025 Supply Chain Cybersecurity Trends report reveals that 71% of CISOs suffered at least one third-party breach last year. With vendor ecosystems expanding faster than oversight—especially in Pakistan—the findings turn background worry into boardroom urgency.
CSO Pakistan x CXO Masters Academy, the leadership and intelligence arm of CXO Media, has successfully concluded a landmark two-city series of Executive Roundtables....
WhatsApp’s zero-click exploit, combined with an Apple zero-day, marks a new era of cyber espionage. Learn how invisible attacks bypass user defenses, threaten enterprises, and signal a trust crisis in consumer and business communication tools.
CISOs face rising cyber risk as fragmented tools and manual processes leave organizations exposed. Discover why unified exposure management, contextual data, and trusted automation are key to real-time risk reduction and enterprise security resilience.
Microsoft has released an AI Security Risk Assessment white paper to help organizations evaluate AI-related risks using existing frameworks as a starting point for secure AI adoption.
The increasing complexity of IT environments; from cloud computing and interconnected APIs to third-party integrations, has amplified both the opportunities and vulnerabilities that organizations must manage. Against this backdrop, a comprehensive approach to cybersecurity is essential. It is no longer sufficient to rely on a single security measure or reactive defense. This is where the concept of the 12 Pillars of Cyber Defense becomes indispensable.
The CISO's role today has fundamentally evolved from a technical function to a critical pillar of business strategy, governance, and organizational resilience. To capture...
EFU Life Assurance Ltd. has successfully completed a major Disaster Recovery (DR) drill, seamlessly executed between its Karachi and Islamabad operations. This critical exercise...