Risk & Resilience

PCIe IDE Protocol Vulnerabilities Expose Intel and AMD Processors to Security Risks

Three vulnerabilities in PCIe Integrity and Data Encryption protocol could allow privilege escalation, data corruption, or denial-of-service on Intel Xeon and AMD EPYC processors, CERT/CC advises firmware updates.

Fortinet Ivanti And SAP Address Critical Vulnerabilities In Enterprise Software

Fortinet, Ivanti, and SAP have released security updates to fix critical vulnerabilities in their products, including authentication bypass, code execution, and JavaScript injection flaws, urging organizations to patch promptly.

Silver Fox Launches False Flag Campaign Using ValleyRAT Malware Targeting China

Silver Fox threat actor deploys ValleyRAT malware via SEO poisoning and Microsoft Teams lures, mimicking Russian cyber groups to target organizations in China and job seekers globally.

NCCIA Uncovers 139 Platforms Involved In Selling Pakistani Citizens’ Data

NCCIA has identified 139 online platforms including websites, apps, and social media accounts involved in illegally selling sensitive data of Pakistani citizens, with PTA blocking the platforms and further action underway.

The CISO’s Blind Spot: SecurityScorecard’s 2025 Report on Third-Party Risk

SecurityScorecard’s 2025 Supply Chain Cybersecurity Trends report reveals that 71% of CISOs suffered at least one third-party breach last year. With vendor ecosystems expanding faster than oversight—especially in Pakistan—the findings turn background worry into boardroom urgency.

CXO Masters Academy Hosts CSO Executive Roundtables, Building Strategic Resilience for FY26, Presented by Commtel

CSO Pakistan x CXO Masters Academy, the leadership and intelligence arm of CXO Media, has successfully concluded a landmark two-city series of Executive Roundtables....

WhatsApp’s Zero-Click iPhone Exploit Signals the Next Phase of Cyber Espionage

WhatsApp’s zero-click exploit, combined with an Apple zero-day, marks a new era of cyber espionage. Learn how invisible attacks bypass user defenses, threaten enterprises, and signal a trust crisis in consumer and business communication tools.

From Silos to Unified Exposure Management: Why CISOs Must Rethink Cyber Risk

CISOs face rising cyber risk as fragmented tools and manual processes leave organizations exposed. Discover why unified exposure management, contextual data, and trusted automation are key to real-time risk reduction and enterprise security resilience.

Microsoft Launches AI Security Risk Assessment Guide For Organizations

Microsoft has released an AI Security Risk Assessment white paper to help organizations evaluate AI-related risks using existing frameworks as a starting point for secure AI adoption.

The 12 Pillars of Cyber Defense: Building A Resilient Digital Future

The increasing complexity of IT environments; from cloud computing and interconnected APIs to third-party integrations, has amplified both the opportunities and vulnerabilities that organizations must manage. Against this backdrop, a comprehensive approach to cybersecurity is essential. It is no longer sufficient to rely on a single security measure or reactive defense. This is where the concept of the 12 Pillars of Cyber Defense becomes indispensable.

CSO Security Insights: The New Frontier of Market Intelligence—Key Takeaways from the Executive Roundtable Series By Commtel

The CISO's role today has fundamentally evolved from a technical function to a critical pillar of business strategy, governance, and organizational resilience. To capture...

EFU Life Successfully Executes Disaster Recovery Drill Using Sangfor Infrastructure

EFU Life Assurance Ltd. has successfully completed a major Disaster Recovery (DR) drill, seamlessly executed between its Karachi and Islamabad operations. This critical exercise...

Recent articles

spot_img