Keep up to date with the latest news, developments, and insights in security intelligence, provided by our industry experts and thought leaders.

Cyber Security Resources

03 March, 2026

Technical Blogs

Evolving cyber threat landscape amid Middle East tensions

CPX analyzes rising cyber operations amid Middle East tensions—APT activity, DDoS, hacktivism, and critical infrastructure risks across the UAE.

Read More

27 February, 2026

Technical Blogs

Moltbook: The rise of agent native AI and a new class of threats

CPX Threat Intelligence reveals how Moltbook exposed a new class of agent-to-agent cyber threats.

Read More

25 February, 2026

Blogs

Identity and Access Management in the age of AI and autonomous ag...

Learn how Identity and Access Management must evolve to secure AI agents and non-human identities in the era of agentic AI.

Read More

20 February, 2026

Technical Blogs

Uncovering the Chinese APT Group .Net Malware Payload – Part 2

Explore how to recover RC4‑encrypted configs, extract C2 details, and create YARA and EDR detections without running the payload.

Read More

19 February, 2026

Technical Blogs

Uncovering the Chinese APT Group .Net Malware Payload – Part 1

Explore how Chinese APT actors weaponize .NET, from CLR execution to obfuscation and hidden configuration.

Read More

12 February, 2026

Technical Blogs

Enabling visibility and monitoring for ICS networks: Fortifying c...

Learn how real-time visibility, segmentation, SIEM, and NSM enhance ICS security.

Read More

10 February, 2026

Technical Blogs

How to secure your Microsoft Exchange Hybrid Environment for 2026

Explore best practices to secure Hybrid Microsoft Exchange environments with Entra ID, mail flow hardening, and modern hybrid configurations.

Read More

10 February, 2026

Technical Blogs

How AI empowers Zero Trust Architecture in network security

Learn how AI transforms Zero Trust into an adaptive, real time security model for hybrid networks and modern cyber threats.

Read More

05 February, 2026

Blogs

From Reactive to Autonomous: The rise of Agentic AI in cybersecurity

Discover how agentic AI is transforming cybersecurity, enabling autonomous threat detection, response, and national cyber resilience.

Read More

03 February, 2026

Blogs

Risk prioritization in today’s evolving cyber threat landscape

Learn how to integrate CTI with risk management to prioritize time sensitive cyber threats and strengthen organizational resilience.

Read More

14 January, 2026

Blogs

Cybersecurity in 2026: Why identity, AI, and trust will define th...

Explore why identity security, agentic AI, and Zero Trust will define cybersecurity in 2026.

Read More

14 January, 2026

Technical Blogs

Ivanti Connect Secure Forensics (Part 3): Integrity Checker Tool ...

Learn how to analyze Ivanti Connect Secure appliances using Integrity Checker Tool snapshots.

Read More

Keep up to date with the latest news, developments, and insights in security intelligence, provided by our industry experts and thought leaders

Cyber Security Resources

25 February, 2026

Blogs

Identity and Access Management in the age of AI and autonomous ag...

Learn how Identity and Access Management must evolve to secure AI agents and non-human identities in the era of agentic AI.

Read More

05 February, 2026

Blogs

From Reactive to Autonomous: The rise of Agentic AI in cybersecurity

Discover how agentic AI is transforming cybersecurity, enabling autonomous threat detection, response, and national cyber resilience.

Read More

03 February, 2026

Blogs

Risk prioritization in today’s evolving cyber threat landscape

Learn how to integrate CTI with risk management to prioritize time sensitive cyber threats and strengthen organizational resilience.

Read More

14 January, 2026

Blogs

Cybersecurity in 2026: Why identity, AI, and trust will define th...

Explore why identity security, agentic AI, and Zero Trust will define cybersecurity in 2026.

Read More

21 November, 2025

Blogs

Red Teaming vs. VAPT: Choosing the right test for stronger cyber ...

Discover when to use red teaming and penetration testing and how they complement your cybersecurity strategy.

Read More

13 November, 2025

Blogs

Compliance isn’t security: The hidden risks of a checkbox approach

Discover how red teaming exposes hidden vulnerabilities and strengthens cyber resilience.

Read More

29 October, 2025

Blogs

GraphQL Abuse: The silent killer in API security

Explore hidden GraphQL vulnerabilities and learn proven strategies to secure your APIs against introspection, injection, and DoS attacks.

Read More

22 October, 2025

Blogs

Securing DevOps: A GRC perspective on agility, assurance and secu...

Learn how GRC principles, automation, and cultural shifts enable secure, scalable, and compliant software delivery.

Read More

08 October, 2025

Blogs

How SOCaaS can power transformation and foster innovation in GCC

Discover how SOCaaS is reshaping the cybersecurity landscape across the GCC.

Read More

26 September, 2025

Blogs

Why is red teaming a must for OT systems

Discover how OT red teaming uncovers vulnerabilities and ensures operational continuity.

Read More

19 September, 2025

Blogs

UAE cybercrime statistics 2025: Key data and trends

Explore 2025 UAE cybercrime stats on business losses, consumer fraud, ransomware, and industry risks with verified data.

Read More

17 September, 2025

Blogs

Cyber Risk Management: Qualitative vs. Quantitative Approaches

Learn how combining qualitative and quantitative approaches can strengthen security.

Read More

Keep up to date with the latest news, developments, and insights in security intelligence, provided by our industry experts and thought leaders

Cyber Security Resources

03 March, 2026

Technical Blogs

Evolving cyber threat landscape amid Middle East tensions

CPX analyzes rising cyber operations amid Middle East tensions—APT activity, DDoS, hacktivism, and critical infrastructure risks across the UAE.

Read More

27 February, 2026

Technical Blogs

Moltbook: The rise of agent native AI and a new class of threats

CPX Threat Intelligence reveals how Moltbook exposed a new class of agent-to-agent cyber threats.

Read More

20 February, 2026

Technical Blogs

Uncovering the Chinese APT Group .Net Malware Payload – Part 2

Explore how to recover RC4‑encrypted configs, extract C2 details, and create YARA and EDR detections without running the payload.

Read More

19 February, 2026

Technical Blogs

Uncovering the Chinese APT Group .Net Malware Payload – Part 1

Explore how Chinese APT actors weaponize .NET, from CLR execution to obfuscation and hidden configuration.

Read More

12 February, 2026

Technical Blogs

Enabling visibility and monitoring for ICS networks: Fortifying c...

Learn how real-time visibility, segmentation, SIEM, and NSM enhance ICS security.

Read More

10 February, 2026

Technical Blogs

How to secure your Microsoft Exchange Hybrid Environment for 2026

Explore best practices to secure Hybrid Microsoft Exchange environments with Entra ID, mail flow hardening, and modern hybrid configurations.

Read More

10 February, 2026

Technical Blogs

How AI empowers Zero Trust Architecture in network security

Learn how AI transforms Zero Trust into an adaptive, real time security model for hybrid networks and modern cyber threats.

Read More

14 January, 2026

Technical Blogs

Ivanti Connect Secure Forensics (Part 3): Integrity Checker Tool ...

Learn how to analyze Ivanti Connect Secure appliances using Integrity Checker Tool snapshots.

Read More

13 January, 2026

Technical Blogs

Ivanti Connect Secure Forensics (Part 2): GRUB-based LUKS Decrypt...

Explore GRUB-based forensic techniques for Ivanti Connect Secure appliances.

Read More

09 January, 2026

Technical Blogs

Ivanti Connect Secure Incident Response Investigation: From explo...

Learn how to investigate Ivanti Connect Secure vulnerabilities, including CVE-2025-0282.

Read More

26 December, 2025

Technical Blogs

Zero Trust Architecture: Principles, challenges, and best practices

Learn how to implement Zero Trust Architecture and ensure compliance for robust cybersecurity.

Read More

08 December, 2025

Technical Blogs

AI-powered OT cybersecurity: Securing critical infrastructure

Learn how CPX is building AI-native defenses to protect critical infrastructure at machine speed.

Read More

CPX's THREAD, is a dedicated group of incident responders, digital forensic specialists, and malware analysts committed to helping organizations respond swiftly and effectively to cyber incidents. Whether you are facing a breach, suspicious activity, or need proactive compromise assessment, the THREAD team is your first line of defense. Read the latest insights here.

Cyber Security Resources

01 August, 2025

Thread

Detecting web shells with network monitoring tools

Learn how network monitoring tools help detect stealthy web shells like China Chopper.

Read More

24 July, 2025

Thread

Web Shells: Types, detection, and prevention

Explore all about web shells and threat hunting techniques to neutralize them.

Read More

Keep up to date with the latest news, developments, and insights in security intelligence, provided by our industry experts and thought leaders

Cyber Security Resources

07 February, 2024

Case Studies

CPX – ADNEC GROUP

Putting cyber excellence at the heart of the company culture

DOWNLOAD

26 July, 2023

Case Studies

Prevention is better than cure

Abu Dhabi Health Data Services (Malaffi)

DOWNLOAD

Keep up to date with the latest news, developments, and insights in security intelligence, provided by our industry experts and thought leaders

Cyber Security Resources

24 July, 2023

Data Sheet

CPX MDR Datasheet

CPX Managed Detection and Response (MDR) Service operates a 24/7/365 intelligence-drive

DOWNLOAD

Keep up to date with the latest news, developments, and insights in security intelligence, provided by our industry experts and thought leaders

Cyber Security Resources

18 September, 2025

Reports Whitepaper

Securing the GCC's Digital Future

Discover why SOC-as-a-Service is emerging as the trusted model for resilience.

Read More

09 July, 2025

Reports Whitepaper

Securing operational technology with trust and collaboration

From oil rigs and water treatment plants to national power grids, operational technology (OT) is the backbone of modern society.

Read More

25 February, 2025

Reports Whitepaper

State of the UAE Cybersecurity Report 2025

Detailed analysis of the trends shaping cybersecurity in the UAE

Read More

25 October, 2024

Reports Whitepaper

Power up your Microsoft Copilot integration

Key considerations and strategies for secure integration

Read More

09 July, 2024

Reports Whitepaper

Navigating the UAE's Data Privacy Landscape

Comprehensive overview of the country’s data privacy landscape

Read More

05 March, 2024

Reports Whitepaper

State of the UAE Cybersecurity Report 2024

Comprehensive overview of the country’s cyber landscape

Read More

09 October, 2023

Reports Whitepaper

Securing the Future- A Whitepaper on Cybersecurity in an AI-Drive...

A whitepaper on cybersecurity in an AI-driven world.

Read More

At CPX, our Threat Intelligence team provides 24x7 monitoring and proactive threat intelligence to safeguard some of the UAE’s largest enterprises.

With deep visibility into evolving cyber threat landscape, we are among the first to detect and respond to emerging threats. Stay informed with our latest threat advisories, delivering timely insights to help you stay ahead of cyber risks.

Cyber Security Resources

02 May, 2025

Threat Advisories

Weekly Digest | 28th April - 2nd May

Stay informed with the latest threat advisories and vulnerabilities.

Read More

25 April, 2025

Threat Advisories

Weekly Digest | 21st April - 25th April

Stay informed with the latest threat advisories and vulnerabilities.

Read More

18 April, 2025

Threat Advisories

Weekly Digest | 14th April - 18th April

Stay informed with the latest threat advisories and vulnerabilities.

Read More

11 April, 2025

Threat Advisories

Weekly Digest | 7th April - 11th April

Stay informed with the latest threat advisories and vulnerabilities.

Read More

03 April, 2025

Threat Advisories

Cisco Addresses Critical and High Severity Flaws in Multiple Prod...

Cisco Addresses Critical and High Severity Flaws in Multiple Products

Read More

Keep up to date with the latest webinars, provided by our industry experts and thought leaders

Cyber Security Resources

15 July, 2025

Webinars

CPX Cyber Bytes

Cyber Bytes brings you exclusive conversations with the visionaries of cybersecurity

Read More

SUBSCRIBE NOW

Stay up to date
with our newsletter.