News
80% Of Cyberattacks In The Middle East Lead To Data Breaches
Positive Technologies warns of rising APT threats, data theft, and dark web trade fueling cyber risks as digital transformation accelerates across the region.
A new report from cybersecurity firm Positive Technologies reveals that 80% of cyberattacks targeting organizations in the Middle East result in the theft of confidential information — underscoring how the region’s rapid digital transformation is expanding its threat surface.
The study, which analyzes trends in cybercrime, advanced persistent threats (APTs), and underground market dynamics, paints a concerning picture: nearly one-third of successful attacks are attributed to APT groups, many of which target government institutions and critical infrastructure. These state-sponsored or well-funded actors often engage in espionage, not merely data theft, with the intent of undermining public trust and asserting digital dominance.
Social engineering tactics were the top initial attack vector, used in 61% of incidents, often in combination with malware (51%). Remote Access Trojans (RATs) featured in over a quarter of malware-based intrusions, enabling attackers to maintain long-term, covert access to compromised systems.
The primary targets of these breaches are credentials and trade secrets (29% each), followed closely by personal data (20%). Once stolen, this data is typically monetized via blackmail or sold on the dark web. Disruption of business operations — impacting everything from hospitals to transportation services — was the second most common outcome of attacks, cited in 38% of cases.
Also Read: Protecting Your WhatsApp Account From Hackers: Kaspersky Expert Tips
The United Arab Emirates, Saudi Arabia, Israel, and Qatar emerged as the most referenced countries on dark web forums. Government agencies (34%) and industrial enterprises (20%) are the most frequently targeted, with hacktivists — rather than profit-motivated cybercriminals — playing a growing role.
“In the near future, we expect cyberthreats in the Middle East to grow both in scale and sophistication,” said Alexey Lukash, analyst at Positive Technologies. “As digital transformation efforts expand, so does the attack surface […] The consequences of successful attacks in these areas could have far-reaching implications for national security and sovereignty”.
To help organizations better defend against these escalating threats, Positive Technologies recommends several key measures:
- Vulnerability Management Systems: Automate asset discovery, prioritization, and remediation.
- Network Traffic Analysis: Monitor for anomalies and detect intrusions in real time.
- Application Security: Deploy solutions like PT Application Firewall and PT Application Inspector to identify flaws and block exploits.
The company emphasizes that cybersecurity should move beyond checkbox compliance toward a strategy that delivers tangible results. Their scalable frameworks are designed to secure everything from single enterprises to national digital infrastructure.
News
Nano Banana 2 Arrives In MENA For Google Gemini Users
Google brings its latest image model to Gemini and Search, adding 4K output and tighter text control for regional users.
Google has opened access to Nano Banana 2 across the Middle East and North Africa, pushing its newest image model into everyday tools rather than keeping it inside the exclusive (and expensive) Pro tier.
The rollout spans the Google Gemini desktop and mobile apps, and extends to Google Search through Lens and AI Mode. Developers can also test it in preview via AI Studio and the Gemini API.
Nano Banana 2 runs on Gemini Flash, Google’s fast inference layer. The focus is speed, but also control. Users can export visuals from 512px up to 4K, adjusting aspect ratios for everything from vertical social posts to widescreen displays.
The model maintains character likeness across up to five figures and preserves fidelity for as many as 14 objects within a single workflow. This enables visual continuity across scenes, iterations, or edits — supporting projects like short films, storyboards, and multi-scene narratives. Text rendering has also been improved, delivering legible typography in mockups and greeting cards, with built-in translation and localization directly within images.
Also Read: RØDE Adds Direct iPhone Pairing To Wireless GO And Pro Mics
Under the hood, the system taps Gemini’s broader knowledge base and pulls in real-time information and imagery from web search to render specific subjects more accurately. Lighting and fine detail have been upgraded, without slowing output.
By embedding the model inside Gemini and Search, Google is normalizing advanced image generation for a mass audience. In MENA, where startups and marketing teams are leaning heavily on AI to scale content across languages and borders, that shift lands at a practical moment.
The move also folds creative tooling deeper into search itself, so that image generation is no longer a separate workflow. It now sits right next to the query box.
