CYBER THREAT LEVEL

21 Apr 2015 | 05:47:15 AM
LEVEL 1: Low LEVEL 2: Low LEVEL 2: Low LEVEL 3: Medium LEVEL 4: Medium LEVEL 5: High LEVEL 6: High LEVEL 7: Critical LEVEL 8: Critical
View all
View all
  • Top Malware Collection

    Top Malware Collection

    The figure shows the top malware infections captured by the aeCERT intelligence system during this month. The figure demonstrate the malwares which...

    Read more
  • Top Attacking Ports

    Top Attacking Ports

    The figure shows the top ports that are used by the attacker to attack and hack the system during this month. The figure represents the highest...

    Read more
  • Top Infected City

    Top Infected City

    following figure shows distribution of malware infections in UAE’s internet space captured through various threat intelligence sources.

    Read more
View all
View all

POLL

Do you scan email attachments before opening them even if it was sent by your friend?

  • Vote View Result

OUR PARTNERS

  • IT Matrix
  • EC-COUNCil
  • MyCERT
  • Microsoft
  • APWG
  • JPCERT

OUR CERTIFICATIONS

OUR MEMBERSHIPS