Arab Security Consultants

Arab Security Consultants Arab Security Consultants - ASC is one of the few firms operating in the field of information securi

ASC promotes security solutions to establish a consistent and secure environment within entities handling confidential data such as banks and financial service providers that constantly face challenges to safeguard customers' data including Credit/Debit card details and other personal information. ASC is more focused on Banking information security, network security, staff training, and development to guide the different entities in reaching cyber-security and securing their work environment in addition to promoting and boosting their work quality assurance standards and qualifications. ASC provides integrated solutions for E-Gov applications to secure the right to access and secure data and exchange data issued by governments and related applications for the imposition of taxes, national security, income and legal records, and health data, and others, using the means of authentication, encryption or digital signatures can enable governments to maintain data privacy, streamline workflow or enable access by using Smart Token or Smart Cards. ASC provides solutions in the following fast growing security business segments: ( airport security; alarm equipment, services, asset protection, bomb detection, border control, criminal databases, digital camera and video surveillance, fire alarms, fire prevention, protection, security products, and services, time and attendance monitoring

ASC is ready to perform critical evaluation studies for the security systems of buildings in use (old projects) based on this, ASC performs a design to complement and upgrade all systems and consequently executes the new design. The main advantage of our services is that we perform complete integrated security study of new or old projects, design all security systems needed and execute them. After handover we train the staff, guarantee, maintain and program upgrading the systems as per future technical development in the field. ASC is ready to receive orders from the owners directly or from the main contractors to perform design or execution or both design and execution.

Researchers Uncover Batavia Windows Spyware Stealing Documents from Russian FirmsRussian organizations have been targete...
08/07/2025

Researchers Uncover Batavia Windows Spyware Stealing Documents from Russian Firms

Russian organizations have been targeted as part of an ongoing campaign that delivers a previously undocumented Windows spyware called Batavia.

The activity, per cybersecurity vendor Kaspersky, has been active since July 2024.

“The targeted attack begins with bait emails containing malicious links, sent under the pretext of signing a contract,” the Russian company said. “The main goal of the attack is to infect organizations with the previously unknown Batavia spyware, which then proceeds to steal internal documents.”

Read More: https://bit.ly/44CHjZE

CISA Adds Erlang SSH and Roundcube Flaws to Known Exploited Vulnerabilities CatalogThe U.S. Cybersecurity and Infrastruc...
10/06/2025

CISA Adds Erlang SSH and Roundcube Flaws to Known Exploited Vulnerabilities Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added two critical security flaws impacting Erlang/Open Telecom Platform (OTP) SSH and Roundcube to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.

The vulnerabilities in question are listed below –

CVE-2025-32433 (CVSS score: 10.0) – A missing authentication for a critical function vulnerability in the Erlang/OTP SSH server that could allow an attacker to execute arbitrary commands without valid credentials, potentially leading to unauthenticated remote code ex*****on. (Fixed in April 2025 in versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20)

Read More: https://bit.ly/4jMBVJ5

29/05/2025

Certified Cybersecurity Technician (CCT) course from EC-Council

is designed for beginners and IT professionals seeking to enter the cybersecurity field. This hands-on program covers essential cybersecurity concepts, network defense, and incident response, providing practical skills for real-world scenarios. Upon completion, participants earn a globally recognized certification, preparing them for entry-level cybersecurity roles and future career advancement.

Take the course from here: bit.ly/3R5wgkG

21/05/2025

Incident Handlers Course

Incident handlers play a crucial role in managing and responding to security incidents within an organization. Here are some key benefits of having skilled incident handlers:

Rapid incident response.
Minimized downtime.
Mitigation of damages.
Preservation of evidence.
Improved incident management.
Enhanced security posture.
Knowledge transfer and learning.

Take the course from here: bit.ly/3u1KWd4

Google Fixes Android Flaw (CVE-2025-27363) Exploited by AttackersGoogle has released its monthly security updates for An...
14/05/2025

Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers

Google has released its monthly security updates for Android with fixes for 46 security flaws, including one vulnerability that it said has been exploited in the wild.

The vulnerability in question is CVE-2025-27363 (CVSS score: 8.1), a high-severity flaw in the System component that could lead to local code ex*****on without requiring any additional ex*****on privileges.

Read More: https://bit.ly/4knqnN8

Malware Attack Targets World Uyghur Congress Leaders via Trojanized UyghurEdit++ ToolIn a new campaign detected in March...
30/04/2025

Malware Attack Targets World Uyghur Congress Leaders via Trojanized UyghurEdit++ Tool

In a new campaign detected in March 2025, senior members of the World Uyghur Congress (WUC) living in exile have been targeted by a Windows-based malware that’s capable of conducting surveillance.

The spear-phishing campaign involved the use of a trojanized version of a legitimate open-source word processing and spell check tool called UyghurEdit++ developed to support the use of the Uyghur language.

Read more: bit.ly/4jqAPTM

Train. Certify. Lead. with EC-Council Cybersecurity programsCheck Our Courses Here: bit.ly/434yQi5
29/04/2025

Train. Certify. Lead.
with EC-Council Cybersecurity programs

Check Our Courses Here: bit.ly/434yQi5

Crypto Developers Targeted by Python Malware Disguised as Coding ChallengesThe North Korea-linked threat actor assessed ...
17/04/2025

Crypto Developers Targeted by Python Malware Disguised as Coding Challenges

The North Korea-linked threat actor assessed to be behind the massive Bybit hack in February 2025 has been linked to a malicious campaign that targets developers to deliver new stealer malware under the guise of a coding assignment.

The activity has been attributed by Palo Alto Networks Unit 42 to a hacking group it tracks as Slow Pisces, which is also known as Jade Sleet, PUKCHONG, TraderTraitor, and UNC4899.

Read More: https://bit.ly/42AVNYX

Microsoft Credits EncryptHub, Hacker Behind 618+ Breaches, for Disclosing Windows FlawsA likely lone wolf actor behind t...
09/04/2025

Microsoft Credits EncryptHub, Hacker Behind 618+ Breaches, for Disclosing Windows Flaws

A likely lone wolf actor behind the EncryptHub persona was acknowledged by Microsoft for discovering and reporting two security flaws in Windows last month, painting a picture of a "conflicted" individual straddling a legitimate career in cybersecurity and pursuing cybercrime.

In a new extensive analysis published by Outpost24 KrakenLabs, the Swedish security company unmasked the up-and-coming cybercriminal, who, about 10 years ago, fled his hometown in Kharkov, Ukraine, to a new place somewhere near the Romanian coast.

Read More: bit.ly/4lnC87t

Wishing you an Eid Mubarak for all of us! ✨🌙
29/03/2025

Wishing you an Eid Mubarak for all of us! ✨🌙

FIN7, FIN8, and Others Use Ragnar Loader for Persistent Access and Ransomware OperationsThreat hunters have shed light o...
11/03/2025

FIN7, FIN8, and Others Use Ragnar Loader for Persistent Access and Ransomware Operations

Threat hunters have shed light on a "sophisticated and evolving malware toolkit" called Ragnar Loader that's used by various cybercrime and ransomware groups like Ragnar Locker (aka Monstrous Mantis), FIN7, FIN8, and Ruthless Mantis (ex-REvil).

Read More: bit.ly/4iEJQI3

🌙 Ramadan Mubarak! رمضان مبارك!May this holy month bring you peace, blessings, and joy. Let’s embrace it with gratitude,...
28/02/2025

🌙 Ramadan Mubarak! رمضان مبارك!

May this holy month bring you peace, blessings, and joy. Let’s embrace it with gratitude, kindness, and spiritual growth. Wishing you and your loved ones a month filled with faith and togetherness.

نسأل الله أن يكون شهر رمضان مليئًا بالسلام والبركات والفرح. لنجعله شهرًا للتأمل والامتنان والتقرب إلى الله. كل عام وأنتم بخير.

Address

41 Zaker Hussein, Nasr City
Cairo
11737

Opening Hours

Monday 9am - 5pm
Tuesday 9am - 5pm
Wednesday 9am - 5pm
Thursday 9am - 5pm
Sunday 9am - 5pm

Telephone

+20-2-26720250

Alerts

Be the first to know and let us send you an email when Arab Security Consultants posts news and promotions. Your email address will not be used for any other purpose, and you can unsubscribe at any time.

Contact The Practice

Send a message to Arab Security Consultants:

Share

Share on Facebook Share on Twitter Share on LinkedIn
Share on Pinterest Share on Reddit Share via Email
Share on WhatsApp Share on Instagram Share on Telegram