SACC-CCSIT-IAU is a digital newsletter provides an effective electronic communication channel for cybersecurity experts and the public. It raises awareness about cyberattacks and how to stay safe in the cyber world. It also publishes current news about cybersecurity, the achievements of cybersecurity students at the College of Computer Science and Information Technology, and recent research publications for faculty and students.

 

Speaker Events

Speaker Affiliation Date Seminar Title
Professor Sadie Creese Department of Computer Science, University of Oxford, UK 26 Sep 2024 Reflections on threat detection – insiders, cyborgs and AI
Prof. Muhammad Khurram Khan Professor of Cybersecurity at the Center of Excellence in Information Assurance, King Saud University, Saudi Arabia 15 Oct 2024 Cybersecurity on the Move: Shaping the Future of Connected and Autonomous Vehicles
Prof. Antonio F. Skarmeta Department of Information and Communications Engineering, University of Murcia, Murcia, Spain 5 Nov 2024 Securing IoT Lifecycle and its impact in the continuum
Eng. Mostafa Yahia Senior Cybersecurity Consultant in IBM 3 Dec 2024 SOC and threat hunting operation

Book Publication

Book Cover

Since one of the goals of the cybersecurity chair is to promote higher education, a book titled “Higher Education and Quality Assurance Practices” was published by IGI Global, USA in December 2024. The book is edited by Dr. Saqib Saeed (Imam Abdulrahman Bin Faisal University, KSA), Prof. Omer Rana (Cardiff University, UK), and Prof. Rajesh Kumar Dhanaraj (Symbiosis International University, India).

Case studies and ideas about quality assurance procedures used in higher education to raise educational standards and meet sustainable development objectives are presented in this book. It addresses challenges in quality assurance and their impact on institutions, making it an excellent resource for administrators, teachers, consultants, and more. Topics include academic integrity, faculty burnout, and tutoring systems.

 

Top Cybersecurity News from Around the world 

Story Image

U.S. Charges Chinese Hacker for Exploiting Zero-Day in 81,000 Sophos Firewalls

 
Story Image

Microsoft Fixes 72 Flaws, Including Patch for Actively Exploited CLFS Vulnerability

 
Story Image

New Linux Rootkit PUMAKIT Uses Advanced Stealth Techniques to Evade Detection

 
Story Image

Iran-Linked IOCONTROL Malware Targets SCADA and Linux-Based IoT Platforms

 

 

Articles Written by IAU Students

1

By Hawra Tawfiq Al-Basheer 

Artificial Intelligence in Zero-Day Detection

Zero-day vulnerabilities are hidden flaws in software, exploited before anyone notices. AI is transforming how we detect these threats by analyzing patterns, predicting risks, and flagging unusual behavior faster than humans ever could. 

I'm an image
 

2

By Jana Alajmi, Sukinah Alhumaidi, Alaa Bahobail, and Linah Nashir

Cryptocurrency and Security: How Could Your Wallet Be at Risk?

Cryptocurrency wallets are essential for managing digital assets, but they are also a target for security threats like phishing, hacking, and 51% attacks. Choosing the right wallet and adopting strong security practices are critical to protect your funds. 

I'm an image
 

3

By Mariam Ali Aldrourh

Digital Footprint in Employee Lives: Steps Toward a Secure Work Environment

Digital footprints—data trails left online—pose serious security risks for companies. Oversharing on social media, weak passwords, and unsecured devices can expose businesses to cyberattacks. Employees play a key role in protecting company data by managing their online behavior. 

I'm an image
 

 

 

 

 

 
Twitter YouTube LinkedIn

Copyright © 2022  Saudi Aramco Cybersecurity Chair at IAU, All rights reserved.

Dammam 31451
Kingdom of Saudi Arabia

Tel: + 966 13 333-2003