Keep up to date with the latest news, developments, and insights in security intelligence, provided by our industry experts and thought leaders.

Cyber Security Resources

12 February, 2026

Technical Blogs

Enabling Visibility and Monitoring for ICS Networks: Fortifying c...

Learn how real-time visibility, segmentation, SIEM, and NSM enhance ICS security.

Read More

10 February, 2026

Technical Blogs

How to secure your Microsoft Exchange Hybrid Environment for 2026

Explore best practices to secure Hybrid Microsoft Exchange environments with Entra ID, mail flow hardening, and modern hybrid configurations.

Read More

10 February, 2026

Technical Blogs

How AI empowers Zero Trust Architecture in network security

Learn how AI transforms Zero Trust into an adaptive, real time security model for hybrid networks and modern cyber threats.

Read More

05 February, 2026

Blogs

From Reactive to Autonomous: The rise of Agentic AI in cybersecurity

Discover how agentic AI is transforming cybersecurity, enabling autonomous threat detection, response, and national cyber resilience.

Read More

03 February, 2026

Blogs

Risk prioritization in today’s evolving cyber threat landscape

Learn how to integrate CTI with risk management to prioritize time sensitive cyber threats and strengthen organizational resilience.

Read More

14 January, 2026

Blogs

Cybersecurity in 2026: Why identity, AI, and trust will define th...

Explore why identity security, agentic AI, and Zero Trust will define cybersecurity in 2026.

Read More

14 January, 2026

Technical Blogs

Ivanti Connect Secure Forensics (Part 3): Integrity Checker Tool ...

Learn how to analyze Ivanti Connect Secure appliances using Integrity Checker Tool snapshots.

Read More

13 January, 2026

Technical Blogs

Ivanti Connect Secure Forensics (Part 2): GRUB-based LUKS Decrypt...

Explore GRUB-based forensic techniques for Ivanti Connect Secure appliances.

Read More

09 January, 2026

Technical Blogs

Ivanti Connect Secure Incident Response Investigation: From explo...

Learn how to investigate Ivanti Connect Secure vulnerabilities, including CVE-2025-0282.

Read More

26 December, 2025

Technical Blogs

Zero Trust Architecture: Principles, challenges, and best practices

Learn how to implement Zero Trust Architecture and ensure compliance for robust cybersecurity.

Read More

08 December, 2025

Technical Blogs

AI-powered OT cybersecurity: Securing critical infrastructure

Learn how CPX is building AI-native defenses to protect critical infrastructure at machine speed.

Read More

08 December, 2025

Technical Blogs

AI agents are scaling operations — is risk management ready?

Discover how AI agents reshape operations and why risk management must adapt to hallucination risks.

Read More

Keep up to date with the latest news, developments, and insights in security intelligence, provided by our industry experts and thought leaders

Cyber Security Resources

05 February, 2026

Blogs

From Reactive to Autonomous: The rise of Agentic AI in cybersecurity

Discover how agentic AI is transforming cybersecurity, enabling autonomous threat detection, response, and national cyber resilience.

Read More

03 February, 2026

Blogs

Risk prioritization in today’s evolving cyber threat landscape

Learn how to integrate CTI with risk management to prioritize time sensitive cyber threats and strengthen organizational resilience.

Read More

14 January, 2026

Blogs

Cybersecurity in 2026: Why identity, AI, and trust will define th...

Explore why identity security, agentic AI, and Zero Trust will define cybersecurity in 2026.

Read More

21 November, 2025

Blogs

Red Teaming vs. VAPT: Choosing the right test for stronger cyber ...

Discover when to use red teaming and penetration testing and how they complement your cybersecurity strategy.

Read More

13 November, 2025

Blogs

Compliance isn’t security: The hidden risks of a checkbox approach

Discover how red teaming exposes hidden vulnerabilities and strengthens cyber resilience.

Read More

29 October, 2025

Blogs

GraphQL Abuse: The silent killer in API security

Explore hidden GraphQL vulnerabilities and learn proven strategies to secure your APIs against introspection, injection, and DoS attacks.

Read More

22 October, 2025

Blogs

Securing DevOps: A GRC perspective on agility, assurance and secu...

Learn how GRC principles, automation, and cultural shifts enable secure, scalable, and compliant software delivery.

Read More

08 October, 2025

Blogs

How SOCaaS can power transformation and foster innovation in GCC

Discover how SOCaaS is reshaping the cybersecurity landscape across the GCC.

Read More

26 September, 2025

Blogs

Why is red teaming a must for OT systems

Discover how OT red teaming uncovers vulnerabilities and ensures operational continuity.

Read More

19 September, 2025

Blogs

UAE cybercrime statistics 2025: Key data and trends

Explore 2025 UAE cybercrime stats on business losses, consumer fraud, ransomware, and industry risks with verified data.

Read More

17 September, 2025

Blogs

Cyber Risk Management: Qualitative vs. Quantitative Approaches

Learn how combining qualitative and quantitative approaches can strengthen security.

Read More

10 September, 2025

Blogs

Why AI-powered SOCs are the future of cyber defense

Learn why organizations are adopting AI-led SOCs to modernize security operations.

Read More

Keep up to date with the latest news, developments, and insights in security intelligence, provided by our industry experts and thought leaders

Cyber Security Resources

12 February, 2026

Technical Blogs

Enabling Visibility and Monitoring for ICS Networks: Fortifying c...

Learn how real-time visibility, segmentation, SIEM, and NSM enhance ICS security.

Read More

10 February, 2026

Technical Blogs

How to secure your Microsoft Exchange Hybrid Environment for 2026

Explore best practices to secure Hybrid Microsoft Exchange environments with Entra ID, mail flow hardening, and modern hybrid configurations.

Read More

10 February, 2026

Technical Blogs

How AI empowers Zero Trust Architecture in network security

Learn how AI transforms Zero Trust into an adaptive, real time security model for hybrid networks and modern cyber threats.

Read More

14 January, 2026

Technical Blogs

Ivanti Connect Secure Forensics (Part 3): Integrity Checker Tool ...

Learn how to analyze Ivanti Connect Secure appliances using Integrity Checker Tool snapshots.

Read More

13 January, 2026

Technical Blogs

Ivanti Connect Secure Forensics (Part 2): GRUB-based LUKS Decrypt...

Explore GRUB-based forensic techniques for Ivanti Connect Secure appliances.

Read More

09 January, 2026

Technical Blogs

Ivanti Connect Secure Incident Response Investigation: From explo...

Learn how to investigate Ivanti Connect Secure vulnerabilities, including CVE-2025-0282.

Read More

26 December, 2025

Technical Blogs

Zero Trust Architecture: Principles, challenges, and best practices

Learn how to implement Zero Trust Architecture and ensure compliance for robust cybersecurity.

Read More

08 December, 2025

Technical Blogs

AI-powered OT cybersecurity: Securing critical infrastructure

Learn how CPX is building AI-native defenses to protect critical infrastructure at machine speed.

Read More

08 December, 2025

Technical Blogs

AI agents are scaling operations — is risk management ready?

Discover how AI agents reshape operations and why risk management must adapt to hallucination risks.

Read More

20 November, 2025

Technical Blogs

Unmasking a Modern Cyber Assault: Lessons from the Anthropic attack

Explore what the Anthropic incident teaches us about AI failures and emerging risks.

Read More

02 October, 2025

Technical Blogs

Filtering the noise: A smarter approach to SCADA security

Learn how proactive threat hunting and custom use cases strengthen OT cyber defenses.

Read More

18 August, 2025

Technical Blogs

Detection Engineering Validation: Proven detections for modern SOCs

Explore tools and practices to build battle-tested threat detection strategies.

Read More

CPX's THREAD, is a dedicated group of incident responders, digital forensic specialists, and malware analysts committed to helping organizations respond swiftly and effectively to cyber incidents. Whether you are facing a breach, suspicious activity, or need proactive compromise assessment, the THREAD team is your first line of defense. Read the latest insights here.

Cyber Security Resources

01 August, 2025

Thread

Detecting web shells with network monitoring tools

Learn how network monitoring tools help detect stealthy web shells like China Chopper.

Read More

24 July, 2025

Thread

Web Shells: Types, detection, and prevention

Explore all about web shells and threat hunting techniques to neutralize them.

Read More

Keep up to date with the latest news, developments, and insights in security intelligence, provided by our industry experts and thought leaders

Cyber Security Resources

07 February, 2024

Case Studies

CPX – ADNEC GROUP

Putting cyber excellence at the heart of the company culture

DOWNLOAD

26 July, 2023

Case Studies

Prevention is better than cure

Abu Dhabi Health Data Services (Malaffi)

DOWNLOAD

Keep up to date with the latest news, developments, and insights in security intelligence, provided by our industry experts and thought leaders

Cyber Security Resources

24 July, 2023

Data Sheet

CPX MDR Datasheet

CPX Managed Detection and Response (MDR) Service operates a 24/7/365 intelligence-drive

DOWNLOAD

Keep up to date with the latest news, developments, and insights in security intelligence, provided by our industry experts and thought leaders

Cyber Security Resources

18 September, 2025

Reports Whitepaper

Securing the GCC's Digital Future

Discover why SOC-as-a-Service is emerging as the trusted model for resilience.

Read More

09 July, 2025

Reports Whitepaper

Securing operational technology with trust and collaboration

From oil rigs and water treatment plants to national power grids, operational technology (OT) is the backbone of modern society.

Read More

25 February, 2025

Reports Whitepaper

State of the UAE Cybersecurity Report 2025

Detailed analysis of the trends shaping cybersecurity in the UAE

Read More

25 October, 2024

Reports Whitepaper

Power up your Microsoft Copilot integration

Key considerations and strategies for secure integration

Read More

09 July, 2024

Reports Whitepaper

Navigating the UAE's Data Privacy Landscape

Comprehensive overview of the country’s data privacy landscape

Read More

05 March, 2024

Reports Whitepaper

State of the UAE Cybersecurity Report 2024

Comprehensive overview of the country’s cyber landscape

Read More

09 October, 2023

Reports Whitepaper

Securing the Future- A Whitepaper on Cybersecurity in an AI-Drive...

A whitepaper on cybersecurity in an AI-driven world.

Read More

At CPX, our Threat Intelligence team provides 24x7 monitoring and proactive threat intelligence to safeguard some of the UAE’s largest enterprises.

With deep visibility into evolving cyber threat landscape, we are among the first to detect and respond to emerging threats. Stay informed with our latest threat advisories, delivering timely insights to help you stay ahead of cyber risks.

Cyber Security Resources

02 May, 2025

Threat Advisories

Weekly Digest | 28th April - 2nd May

Stay informed with the latest threat advisories and vulnerabilities.

Read More

25 April, 2025

Threat Advisories

Weekly Digest | 21st April - 25th April

Stay informed with the latest threat advisories and vulnerabilities.

Read More

18 April, 2025

Threat Advisories

Weekly Digest | 14th April - 18th April

Stay informed with the latest threat advisories and vulnerabilities.

Read More

11 April, 2025

Threat Advisories

Weekly Digest | 7th April - 11th April

Stay informed with the latest threat advisories and vulnerabilities.

Read More

03 April, 2025

Threat Advisories

Cisco Addresses Critical and High Severity Flaws in Multiple Prod...

Cisco Addresses Critical and High Severity Flaws in Multiple Products

Read More

Keep up to date with the latest webinars, provided by our industry experts and thought leaders

Cyber Security Resources

15 July, 2025

Webinars

CPX Cyber Bytes

Cyber Bytes brings you exclusive conversations with the visionaries of cybersecurity

Read More

SUBSCRIBE NOW

Stay up to date
with our newsletter.