Keep up to date with the latest news, developments, and insights in security intelligence, provided by our industry experts and thought leaders.

Cyber Security Resources

28 August, 2025

Blogs

AI vs Hackers: Who is winning the cybersecurity arms race

Explore the ongoing arms race between AI-powered defense systems and hackers using AI.

Read More

28 August, 2025

Blogs

Why every cybersecurity team needs document version control

Learn best practices to strengthen your organization’s security documentation workflows.

Read More

27 August, 2025

Blogs

Why AI-powered SOCs are the future of cyber defense

Learn why organizations are adopting AI-led SOCs to modernize security operations.

Read More

26 August, 2025

Blogs

How AI is transforming cybersecurity and threat detection

Explore how AI is enhancing threat detection, real-time response, and cyber resilience.

Read More

25 August, 2025

Blogs

AI agents in cybersecurity: Your new virtual SOC team

Learn how AI enhances cybersecurity, speeds up response, and protects organizations.

Read More

21 August, 2025

Blogs

Securing Operational Technology: Challenges and best practices

Discover the top OT security challenges and best practices to build resilience.

Read More

18 August, 2025

Technical Blogs

Detection Engineering Validation: Proven detections for modern SOCs

Explore tools and practices to build battle-tested threat detection strategies.

Read More

01 August, 2025

Thread

Detecting web shells with network monitoring tools

Learn how network monitoring tools help detect stealthy web shells like China Chopper.

Read More

24 July, 2025

Thread

Web Shells: Types, detection, and prevention

Explore all about web shells and threat hunting techniques to neutralize them.

Read More

15 July, 2025

Webinars

CPX Cyber Bytes

Cyber Bytes brings you exclusive conversations with the visionaries of cybersecurity

Read More

09 July, 2025

Reports Whitepaper

SECURING OPERATIONAL TECHNOLOGY WITH TRUST AND COLLABORATION

Discover how CPX is building resilient OT cybersecurity ecosystems for organizations

Read More

07 July, 2025

Blogs

Red Teaming in cybersecurity: Why thinking like a hacker matters

A powerful Red Teaming case study where a phone call led to a full subdomain takeover

Read More

Keep up to date with the latest news, developments, and insights in security intelligence, provided by our industry experts and thought leaders

Cyber Security Resources

28 August, 2025

Blogs

AI vs Hackers: Who is winning the cybersecurity arms race

Explore the ongoing arms race between AI-powered defense systems and hackers using AI.

Read More

28 August, 2025

Blogs

Why every cybersecurity team needs document version control

Learn best practices to strengthen your organization’s security documentation workflows.

Read More

27 August, 2025

Blogs

Why AI-powered SOCs are the future of cyber defense

Learn why organizations are adopting AI-led SOCs to modernize security operations.

Read More

26 August, 2025

Blogs

How AI is transforming cybersecurity and threat detection

Explore how AI is enhancing threat detection, real-time response, and cyber resilience.

Read More

25 August, 2025

Blogs

AI agents in cybersecurity: Your new virtual SOC team

Learn how AI enhances cybersecurity, speeds up response, and protects organizations.

Read More

21 August, 2025

Blogs

Securing Operational Technology: Challenges and best practices

Discover the top OT security challenges and best practices to build resilience.

Read More

07 July, 2025

Blogs

Red Teaming in cybersecurity: Why thinking like a hacker matters

A powerful Red Teaming case study where a phone call led to a full subdomain takeover

Read More

26 May, 2025

Blogs

What is a SCIF? Inside the CPX Secure Compartmented Information F...

Explore how CPX's SCIF solutions meet the world’s most rigorous security standards.

Read More

21 April, 2025

Blogs

Cybersecurity in the UAE: What CISOs must prioritize today

Key CISO priorities in the UAE amid rising AI-driven cyber threats and deepfakes.

Read More

18 March, 2025

Blogs

The critical role of trusted advisors in OT cybersecurity

Trusted advisors bring technical expertise and craft tailored OT cybersecurity solutions

Read More

14 February, 2025

Blogs

AI Agents: The new arsenal CISOs need

At CPX, we’re exploring AI agent applications that will redefine security operations.

Read More

27 January, 2025

Blogs

Make your AI work right: A framework for secure and ethical AI

CPX's Safe AI framework empowers businesses to harness AI ethically and securely.

Read More

Keep up to date with the latest news, developments, and insights in security intelligence, provided by our industry experts and thought leaders

Cyber Security Resources

18 August, 2025

Technical Blogs

Detection Engineering Validation: Proven detections for modern SOCs

Explore tools and practices to build battle-tested threat detection strategies.

Read More

30 June, 2025

Technical Blogs

AI-driven cyber attacks: The rising threat in cybersecurity

AI is changing cyber attacks. Learn how to fight back with AI-powered defenses.

Read More

29 May, 2025

Technical Blogs

How AI copilots in cybersecurity are redefining threat intelligence

Discover how AI copilots are powering the shift to proactive, AI-driven cyber defense.

Read More

10 April, 2025

Technical Blogs

Strengthening Azure DevSecOps: Closing gaps with third-party enha...

Recommendations for enhancing Azure DevSecOps with third-party tools

Read More

28 March, 2025

Technical Blogs

Oracle Cloud incident: Analyzing the breach and its impact

An in-depth analysis of the Oracle data breach and its impact

Read More

08 March, 2024

Technical Blogs

Enhancing physical security through CPS integration

Discover how cyber-physical systems integration can boost physical security.

Read More

20 July, 2023

Technical Blogs

Understanding Insecure Deserialization

In this article, we'll cover what insecure deserialization is and evaluate the

Read More

CPX's THREAD, is a dedicated group of incident responders, digital forensic specialists, and malware analysts committed to helping organizations respond swiftly and effectively to cyber incidents. Whether you are facing a breach, suspicious activity, or need proactive compromise assessment, the THREAD team is your first line of defense. Read the latest insights here.

Cyber Security Resources

01 August, 2025

Thread

Detecting web shells with network monitoring tools

Learn how network monitoring tools help detect stealthy web shells like China Chopper.

Read More

24 July, 2025

Thread

Web Shells: Types, detection, and prevention

Explore all about web shells and threat hunting techniques to neutralize them.

Read More

Keep up to date with the latest news, developments, and insights in security intelligence, provided by our industry experts and thought leaders

Cyber Security Resources

07 February, 2024

Case Studies

CPX – ADNEC GROUP

Putting cyber excellence at the heart of the company culture

DOWNLOAD

26 July, 2023

Case Studies

Prevention is better than cure

Abu Dhabi Health Data Services (Malaffi)

DOWNLOAD

Keep up to date with the latest news, developments, and insights in security intelligence, provided by our industry experts and thought leaders

Cyber Security Resources

24 July, 2023

Data Sheet

CPX MDR Datasheet

CPX Managed Detection and Response (MDR) Service operates a 24/7/365 intelligence-drive

DOWNLOAD

Keep up to date with the latest news, developments, and insights in security intelligence, provided by our industry experts and thought leaders

Cyber Security Resources

09 July, 2025

Reports Whitepaper

SECURING OPERATIONAL TECHNOLOGY WITH TRUST AND COLLABORATION

Discover how CPX is building resilient OT cybersecurity ecosystems for organizations

Read More

25 February, 2025

Reports Whitepaper

State of the UAE Cybersecurity Report 2025

Detailed analysis of the trends shaping cybersecurity in the UAE

Read More

25 October, 2024

Reports Whitepaper

Power up your Microsoft Copilot integration

Key considerations and strategies for secure integration

Read More

09 July, 2024

Reports Whitepaper

Navigating the UAE's Data Privacy Landscape

Comprehensive overview of the country’s data privacy landscape

Read More

05 March, 2024

Reports Whitepaper

State of the UAE Cybersecurity Report 2024

Comprehensive overview of the country’s cyber landscape

Read More

09 October, 2023

Reports Whitepaper

Securing the Future- A Whitepaper on Cybersecurity in an AI-Drive...

A whitepaper on cybersecurity in an AI-driven world.

Read More

At CPX, our Threat Intelligence team provides 24x7 monitoring and proactive threat intelligence to safeguard some of the UAE’s largest enterprises.

With deep visibility into evolving cyber threat landscape, we are among the first to detect and respond to emerging threats. Stay informed with our latest threat advisories, delivering timely insights to help you stay ahead of cyber risks.

Cyber Security Resources

02 May, 2025

Threat Advisories

Weekly Digest | 28th April - 2nd May

Stay informed with the latest threat advisories and vulnerabilities.

Read More

25 April, 2025

Threat Advisories

Weekly Digest | 21st April - 25th April

Stay informed with the latest threat advisories and vulnerabilities.

Read More

18 April, 2025

Threat Advisories

Weekly Digest | 14th April - 18th April

Stay informed with the latest threat advisories and vulnerabilities.

Read More

11 April, 2025

Threat Advisories

Weekly Digest | 7th April - 11th April

Stay informed with the latest threat advisories and vulnerabilities.

Read More

03 April, 2025

Threat Advisories

Cisco Addresses Critical and High Severity Flaws in Multiple Prod...

Cisco Addresses Critical and High Severity Flaws in Multiple Products

Read More

Keep up to date with the latest webinars, provided by our industry experts and thought leaders

Cyber Security Resources

15 July, 2025

Webinars

CPX Cyber Bytes

Cyber Bytes brings you exclusive conversations with the visionaries of cybersecurity

Read More

SUBSCRIBE NOW

Stay up to date
with our newsletter.