Keep up to date with the latest news, developments, and insights in security intelligence, provided by our industry experts and thought leaders.
28 August, 2025
AI vs Hackers: Who is winning the cybersecurity arms race
Explore the ongoing arms race between AI-powered defense systems and hackers using AI.
Read More28 August, 2025
Why every cybersecurity team needs document version control
Learn best practices to strengthen your organization’s security documentation workflows.
Read More27 August, 2025
Why AI-powered SOCs are the future of cyber defense
Learn why organizations are adopting AI-led SOCs to modernize security operations.
Read More26 August, 2025
How AI is transforming cybersecurity and threat detection
Explore how AI is enhancing threat detection, real-time response, and cyber resilience.
Read More25 August, 2025
AI agents in cybersecurity: Your new virtual SOC team
Learn how AI enhances cybersecurity, speeds up response, and protects organizations.
Read More21 August, 2025
Securing Operational Technology: Challenges and best practices
Discover the top OT security challenges and best practices to build resilience.
Read More18 August, 2025
Detection Engineering Validation: Proven detections for modern SOCs
Explore tools and practices to build battle-tested threat detection strategies.
Read More01 August, 2025
Detecting web shells with network monitoring tools
Learn how network monitoring tools help detect stealthy web shells like China Chopper.
Read More24 July, 2025
Web Shells: Types, detection, and prevention
Explore all about web shells and threat hunting techniques to neutralize them.
Read More15 July, 2025
CPX Cyber Bytes
Cyber Bytes brings you exclusive conversations with the visionaries of cybersecurity
Read More09 July, 2025
SECURING OPERATIONAL TECHNOLOGY WITH TRUST AND COLLABORATION
Discover how CPX is building resilient OT cybersecurity ecosystems for organizations
Read More07 July, 2025
Red Teaming in cybersecurity: Why thinking like a hacker matters
A powerful Red Teaming case study where a phone call led to a full subdomain takeover
Read MoreKeep up to date with the latest news, developments, and insights in security intelligence, provided by our industry experts and thought leaders
28 August, 2025
AI vs Hackers: Who is winning the cybersecurity arms race
Explore the ongoing arms race between AI-powered defense systems and hackers using AI.
Read More28 August, 2025
Why every cybersecurity team needs document version control
Learn best practices to strengthen your organization’s security documentation workflows.
Read More27 August, 2025
Why AI-powered SOCs are the future of cyber defense
Learn why organizations are adopting AI-led SOCs to modernize security operations.
Read More26 August, 2025
How AI is transforming cybersecurity and threat detection
Explore how AI is enhancing threat detection, real-time response, and cyber resilience.
Read More25 August, 2025
AI agents in cybersecurity: Your new virtual SOC team
Learn how AI enhances cybersecurity, speeds up response, and protects organizations.
Read More21 August, 2025
Securing Operational Technology: Challenges and best practices
Discover the top OT security challenges and best practices to build resilience.
Read More07 July, 2025
Red Teaming in cybersecurity: Why thinking like a hacker matters
A powerful Red Teaming case study where a phone call led to a full subdomain takeover
Read More26 May, 2025
What is a SCIF? Inside the CPX Secure Compartmented Information F...
Explore how CPX's SCIF solutions meet the world’s most rigorous security standards.
Read More21 April, 2025
Cybersecurity in the UAE: What CISOs must prioritize today
Key CISO priorities in the UAE amid rising AI-driven cyber threats and deepfakes.
Read More18 March, 2025
The critical role of trusted advisors in OT cybersecurity
Trusted advisors bring technical expertise and craft tailored OT cybersecurity solutions
Read More14 February, 2025
AI Agents: The new arsenal CISOs need
At CPX, we’re exploring AI agent applications that will redefine security operations.
Read More27 January, 2025
Make your AI work right: A framework for secure and ethical AI
CPX's Safe AI framework empowers businesses to harness AI ethically and securely.
Read MoreKeep up to date with the latest news, developments, and insights in security intelligence, provided by our industry experts and thought leaders
18 August, 2025
Detection Engineering Validation: Proven detections for modern SOCs
Explore tools and practices to build battle-tested threat detection strategies.
Read More30 June, 2025
AI-driven cyber attacks: The rising threat in cybersecurity
AI is changing cyber attacks. Learn how to fight back with AI-powered defenses.
Read More29 May, 2025
How AI copilots in cybersecurity are redefining threat intelligence
Discover how AI copilots are powering the shift to proactive, AI-driven cyber defense.
Read More10 April, 2025
Strengthening Azure DevSecOps: Closing gaps with third-party enha...
Recommendations for enhancing Azure DevSecOps with third-party tools
Read More28 March, 2025
Oracle Cloud incident: Analyzing the breach and its impact
An in-depth analysis of the Oracle data breach and its impact
Read More08 March, 2024
Enhancing physical security through CPS integration
Discover how cyber-physical systems integration can boost physical security.
Read More20 July, 2023
Understanding Insecure Deserialization
In this article, we'll cover what insecure deserialization is and evaluate the
Read MoreCPX's THREAD, is a dedicated group of incident responders, digital forensic specialists, and malware analysts committed to helping organizations respond swiftly and effectively to cyber incidents. Whether you are facing a breach, suspicious activity, or need proactive compromise assessment, the THREAD team is your first line of defense. Read the latest insights here.
01 August, 2025
Detecting web shells with network monitoring tools
Learn how network monitoring tools help detect stealthy web shells like China Chopper.
Read More24 July, 2025
Web Shells: Types, detection, and prevention
Explore all about web shells and threat hunting techniques to neutralize them.
Read MoreKeep up to date with the latest news, developments, and insights in security intelligence, provided by our industry experts and thought leaders
07 February, 2024
26 July, 2023
Keep up to date with the latest news, developments, and insights in security intelligence, provided by our industry experts and thought leaders
24 July, 2023
CPX MDR Datasheet
CPX Managed Detection and Response (MDR) Service operates a 24/7/365 intelligence-drive
DOWNLOADKeep up to date with the latest news, developments, and insights in security intelligence, provided by our industry experts and thought leaders
09 July, 2025
SECURING OPERATIONAL TECHNOLOGY WITH TRUST AND COLLABORATION
Discover how CPX is building resilient OT cybersecurity ecosystems for organizations
Read More25 February, 2025
State of the UAE Cybersecurity Report 2025
Detailed analysis of the trends shaping cybersecurity in the UAE
Read More25 October, 2024
Power up your Microsoft Copilot integration
Key considerations and strategies for secure integration
Read More09 July, 2024
Navigating the UAE's Data Privacy Landscape
Comprehensive overview of the country’s data privacy landscape
Read More05 March, 2024
State of the UAE Cybersecurity Report 2024
Comprehensive overview of the country’s cyber landscape
Read More09 October, 2023
Securing the Future- A Whitepaper on Cybersecurity in an AI-Drive...
A whitepaper on cybersecurity in an AI-driven world.
Read MoreAt CPX, our Threat Intelligence team provides 24x7 monitoring and proactive threat intelligence to safeguard some of the UAE’s largest enterprises.
With deep visibility into evolving cyber threat landscape, we are among the first to detect and respond to emerging threats. Stay informed with our latest threat advisories, delivering timely insights to help you stay ahead of cyber risks.
02 May, 2025
Weekly Digest | 28th April - 2nd May
Stay informed with the latest threat advisories and vulnerabilities.
Read More25 April, 2025
Weekly Digest | 21st April - 25th April
Stay informed with the latest threat advisories and vulnerabilities.
Read More18 April, 2025
Weekly Digest | 14th April - 18th April
Stay informed with the latest threat advisories and vulnerabilities.
Read More11 April, 2025
Weekly Digest | 7th April - 11th April
Stay informed with the latest threat advisories and vulnerabilities.
Read More03 April, 2025
Cisco Addresses Critical and High Severity Flaws in Multiple Prod...
Cisco Addresses Critical and High Severity Flaws in Multiple Products
Read MoreKeep up to date with the latest webinars, provided by our industry experts and thought leaders
15 July, 2025
CPX Cyber Bytes
Cyber Bytes brings you exclusive conversations with the visionaries of cybersecurity
Read MoreSUBSCRIBE NOW