The Source Signals
Tech news is everywhere. Intelligence isn't.
FBI Director Kash Patel's personal Gmail hacked as Iran escalates cyberattacks on US officials
Handala Hack Team published over 300 emails and photographs from Patel's personal account, exposing a recurring vulnerability in how senior US officials manage personal digital infrastructure during active geopolitical conflict.
One Identity to Rule Them All
HID’s 2026 security survey finds that three quarters of organisations are already deploying or evaluating unified identity platforms — but budget constraints, integration complexity and a historic spike in biometric privacy concerns are slowing the path to full convergence.
The Crime Factory: How Cybercrime Stopped Being a Cottage Industry and Became a Corporation
The lone hacker belongs to a different era. What has replaced him is a fully operational service economy, with vendors, platforms, pricing tiers and AI-powered tools — one that generated an estimated $17 billion in 2025 and is still expanding.
Attackers Are No Longer Breaking In — They Are Logging In
Cloudflare's inaugural 2026 Threat Report reveals the total industrialisation of cyber threats, where AI-powered adversaries exploit stolen identities and trusted cloud services rather than breaching firewalls.
How Security-First Thinking Is Serving the Middle East in a Challenging Cyber Landscape
With cyber activity rising across the region, three global security leaders explain why the organisations that invested in preparation are now best placed to respond.
Palo Alto Networks unveils partnerships to secure AI factories
Cybersecurity firm joins forces with Nokia, U Mobile, Aeris, and Celerway to protect the infrastructure powering the AI economy
The Year of the Evasive Adversary: How AI, Speed, and Trust Abuse Are Rewriting the Cybersecurity Playbook
CrowdStrike’s 2026 Global Threat Report reveals that attackers are moving faster than ever, weaponizing AI, exploiting identity systems, and targeting the software supply chain at an alarming scale.
The Security Reckoning: How Anomali's Ahmed Rubaie Is Betting Big on AI, Unified Data, and the Middle East
As AI-powered threats industrialise, Anomali is making a high-stakes bet that unified data, long memory, and agentic intelligence can shift enterprise security from firefighting to foresight — starting with the Middle East.
The $60 Billion Problem: Why BeyondTrust Is Betting Everything on Identity
Machine identities now outnumber humans in most enterprises. AI agents operate with unchecked access. And the tools meant to stop attackers were never designed to work together. BeyondTrust's Pathfinder is its answer to a market — and a crisis — that is growing faster than anyone anticipated.
PayPal Data Breach 2026: How an Internal Code Error Exposed Customer Data
When cybercriminals strike, companies can point to external threats. When your own code quietly leaks customer data for five months, the question of accountability becomes much harder to deflect.
Palo Alto Networks Report Finds AI Is Accelerating Breaches as Identity and Enterprise Complexity Drive Risk
Cyberattacks are unfolding at machine speed, with data exfiltration occurring in as little as 72 minutes, according to Palo Alto Networks’ latest Unit 42 report. The findings show how AI-driven automation, identity vulnerabilities and fragmented enterprise systems are compressing the breach lifecycle and raising pressure on security teams.
Why Encryption Is Becoming National Infrastructure, and How SandboxAQ Is Productising It for the AI Era
As Middle Eastern governments accelerate AI deployment, encryption is moving out of the server room and into national policy. SandboxAQ’s product strategy shows what happens when cryptography is treated as infrastructure, not compliance.
Sophos Acquires Arco Cyber in Bet on Governance Over Tools
The cybersecurity giant moves beyond detection and response, targeting the global shortage of CISO-level leadership as boards and regulators demand proof of risk reduction.
Infoblox Research: How DNS Hijacking Turns Home Routers Into Attack Infrastructure
New Infoblox Threat Intel research reveals how attackers compromise home and small-office routers, take control of DNS, and turn everyday internet traffic into a global monetisation system without breaking anything users would notice.
DDoS attacks doubled in 2025 as assault sizes spiral to record levels
Cloudflare says it blocked more than 47 million DDoS attacks last year, including a brief but unprecedented 31.4 Tbps attack, signalling a dangerous escalation in online disruption.
Check Point Report states Financial Cyberattacks Doubled in 2025. The Real Story is Why
Check Point’s 2025 Finance Sector Landscape Report shows attacks on banks and payments firms jumping 115% in a year. The shift isn’t just volume. It’s that disruption, data theft, extortion, and fraud are now designed to stack into one pressure campaign.
Palo Alto Networks completes Chronosphere acquistion to close a growing visibility gap in the AI era
As AI systems move deeper into enterprise operations, the cybersecurity firm is bringing observability into its core platform to address blind spots in cloud infrastructure and rising data costs.
Check Point Data Shows Microsoft Remains the Most Imitated Brand in Phishing
New figures from Check Point Research show Microsoft accounted for 22% of all brand phishing activity in Q4 2025, continuing a pattern seen across recent quarters.
CrowdStrike expands regional cloud infrastructure in Saudi Arabia, India, and the UAE as data sovereignty reshapes cybersecurity
The cybersecurity firm is rolling out in-country cloud deployments across the Gulf and India, reflecting how regulatory control over data is increasingly influencing how global security platforms are designed and deployed.
Weaponised AI is turning cybercrime into a subscription business
Group-IB says dark web AI chatter has surged 371% since 2019, with “dark LLMs” and deepfake kits now sold like SaaS—cheap, packaged, and built for scale.