Don’t Miss This Upcoming Cybersecurity Global Event in KSA!

Black Hat MEA 2025

2–4 December, Riyadh

Great for connecting with global cybersecurity professionals and attending hands-on workshops.

Register Early
Publications

Publication Analytics Dashboard

An interactive overview of the chair's research output from 2021-2024.

0
Total Papers
0
Q1 Papers
0
Q2 Papers
Q1
Q2
Other/Unlisted
Chair Initiatives

Book Authoring Initiative

Authoring quality cybersecurity books for all segments of society.

Initiative Objectives

  • Bridge the gap in specialized Arabic cybersecurity content.
  • Enrich academic and public awareness materials.
  • Strengthen the Chair's role in community education.
Become an Author
Workshops
Workshop Image

Introduction to Securing Windows Active Directory: Exploring Offensive Techniques

This course provides a practical introduction to Active Directory penetration testing. It begins with a clear explanation of AD concepts, then dives into real-world techniques for enumeration, exploitation, privilege escalation, and persistence inside Windows domain environments.

Read The Article
COOP Experience

From OT security engineering to GRC and backend development, our students gain invaluable hands-on experience during their cooperative training. Explore their journeys from Summer 2025.

Articles
Critical Flaw in Microsoft Entra ID Allowed Complete Takeover of Corporate Tenants

Critical Flaw in Microsoft Entra ID Allowed Complete Takeover of Corporate Tenants

A security researcher uncovered a devastating vulnerability that allowed anyone to gain "Global Admin" privileges over any company's cloud environment. See how a mix of legacy components and a single API flaw created a "ghost key" to sensitive data, leaving almost no trace behind.

Read More
Cyber Insurance Gaps Push for a More Holistic Protection Approach

Cyber Insurance Gaps Push for a More Holistic Protection Approach

A new report reveals a startling 20% gap between the coverage companies believe they have and what they actually need. With claims expected to rise, discover why your policy might not save you and how the industry is shifting towards proactive, collaborative security.

Read More
Widespread Cyberattack Targets macOS Users via GitHub

Widespread Cyberattack Targets macOS Users via GitHub

A sophisticated campaign is using malicious SEO to poison search results, leading macOS users to fake GitHub pages that distribute the potent "Atomic Stealer" malware. Discover how a simple search for a trusted app can lead to a complete compromise of your digital life.

Read More
ShadowLeak Attack Targets ChatGPT Exposing Cloud Infrastructure Flaw

"ShadowLeak" Attack Targets ChatGPT, Exposing Cloud Infrastructure Flaw

Researchers have unveiled "ShadowLeak," a novel server-side attack where a hidden email command forced ChatGPT's own infrastructure to steal sensitive data and send it directly to attackers. This highlights a new, dangerous attack surface for enterprise AI agents.

Read More
Phishing Detection Challenge

Phishing Detection Challenge

Saudi Aramco Cybersecurity Chair Newsletter

Basirah CTF Challenge
//BASIRAH_CTF_TERMINAL
root@basirah:~#

The OT/ICS Challenge

Missed the challenge from our 8th Edition Newsletter? It's not too late! Test your skills, solve the puzzle, and see if you can capture the flag. Ready to begin?

START CHALLENGE

Stay in the Loop

Get cybersecurity insights delivered. Join our newsletter for the latest research, event news, and expert articles directly in your inbox.