From 745 days to 44: the collapse of the patching grace period
The average time to exploit has fallen from 745 days in 2020 to just 44 days in 2025, according to Flashpoint. Here’s why N-day vulnerabilities are driving faster attacks.
Read MoreThe average time to exploit has fallen from 745 days in 2020 to just 44 days in 2025, according to Flashpoint. Here’s why N-day vulnerabilities are driving faster attacks.
Read MoreIn the realm of cybersecurity start-ups, there is a widely held belief that the key to success lies in obtaining investor capital. However, recent data from Crunchbase shows a significant 35% decline in funding, raising the question of whether this belief still holds true.
Read MoreMazin Ahmed (Founder and CTO at Fullhunt.io) explains how he built a successful cybersecurity startup during the COVID-19 pandemic.
Read MoreThreat actors deploying Atomic Stealer (AMOS) are launching malicious ad campaigns to target Mac users.
Read MoreNeil J. Walsh will discuss various interpretations of cybercrime, divergent regulatory frameworks, and discrepancies in digital forensic capabilities. Ensuring the accuracy of cybercrime reports worldwide poses a significant challenge
Read MoreData alone is not intelligence – but unified security systems can build an understanding of context around a piece of data, enabling better threat identification and decision-making.
Read MoreThere’s no globally accepted definition of cyber diplomacy or cyber crime. Developing those cross-border agreements is an important step to enable cooperation and resilience.
Read MoreThe average time to exploit has fallen from 745 days in 2020 to just 44 days in 2025, according to Flashpoint. Here’s why N-day vulnerabilities are driving faster attacks.
Read MoreSaudi Arabia’s cybersecurity workforce is now 32% women, outpacing the global average. Leaders at Black Hat MEA share their perspective, alongside our lowdown on the data about gender diversity in the region.
Read MoreThe largest international AI safety review has landed – and for cybersecurity teams, the message is that attackers don’t need AGI to cause serious damage
Read MoreThree cybersecurity leaders share why Saudi Arabia is changing how they think about scale, innovation, and global collaboration.
Read MoreThe International AI Safety Report 2026 analysed for cybersecurity practitioners: AI in cyberattacks, vulnerability automation, phishing risks and evaluation blind spots.
Read MoreFour exhibitors explain why Black Hat MEA is the region’s most important meeting point for cybersecurity buyers, partners, and talent.
Read More