business
What Caused the Verizon Outage? What We Know So Far

On September 30, 2024, Verizon experienced a significant network outage that left millions of customers across the United States unable to make phone calls, send messages, or use mobile data services for several hours. The disruption, which began early in the morning and persisted until the evening, affected key metropolitan areas such as New York City, Washington D.C., Atlanta, and parts of the Midwest. As of today, many customers are still seeking answers as to what caused the outage and how Verizon plans to prevent such events in the future.
Nature and Scope of the Outage
The outage began around 9:30 AM Eastern Time and affected both mobile voice services and data, leaving users unable to make or receive regular phone calls, access the internet, or use Verizon’s messaging services. Customers with iPhones reported seeing their phones switch to “SOS only” mode, indicating that they could only make emergency calls but were otherwise disconnected from Verizon’s network.
The impact was nationwide, with outage reports peaking at over 100,000 on Downdetector, a site that tracks service interruptions for major telecommunications and internet services. The most severely affected areas were concentrated along the East Coast, including New York, New Jersey, Pennsylvania, Georgia, and parts of Florida. Midwest states such as Ohio and Illinois also saw widespread reports of service disruption.
The outage affected not only personal customers but also corporate clients, with businesses experiencing disrupted operations and communications throughout the day. Ben Gurion Airport in Israel, which relies on Verizon’s network for some of its communication services, also briefly shut down a section of its wireless operations, emphasizing the global nature of the disruption’s consequences.
Initial Investigations: What Caused the Outage?
As of now, Verizon has provided some insight into what might have triggered the outage, although a comprehensive report is still forthcoming. According to a Verizon spokesperson, the root of the problem appears to have been a combination of network equipment failures and issues related to a recent software update.
1. Network Equipment Malfunction
Initial investigations point towards an equipment failure affecting Verizon’s core network, specifically a set of routers responsible for handling large volumes of network traffic across regions. Routers are crucial for maintaining the flow of data between different parts of Verizon’s network and with other telecom networks. A malfunction of this sort could lead to the kind of widespread service disruption experienced yesterday, particularly if the routers involved are key components of the backbone network that supports high data throughput.
Verizon’s engineering team identified a fault in one of the major router clusters located on the East Coast. The fault caused a cascading failure, which led to increased traffic rerouting and congestion in unaffected parts of the network, making the issue nationwide. The faulty router cluster was supposed to handle a significant portion of traffic, and when it went down, the increased load on other parts of the network caused widespread instability.
2. Software Update Complications
In addition to hardware failure, Verizon confirmed that a recent software update rolled out to its network infrastructure may have contributed to the outage. Software updates are a routine part of maintaining and improving network performance, including adding new features, fixing security vulnerabilities, and optimizing network functions. However, in this instance, the update seems to have inadvertently caused instability in some of Verizon’s key network functions.
Specifically, the software update appears to have led to a routing misconfiguration, which compounded the impact of the hardware failure. Routing misconfigurations can occur if the updated software incorrectly instructs network routers on how to direct traffic, leading to inconsistencies that disrupt normal operations. This situation often requires a manual rollback of changes and recalibration, which explains why the outage lasted as long as it did, with Verizon engineers working throughout the day to identify and correct the errors.
Customer Impact and SOS Mode
During the outage, many Verizon users reported seeing “SOS only” on their devices. This indicator means that the phone can connect only to other available networks for emergency calls but cannot access its usual provider’s services. When Verizon’s network went down, phones automatically switched to this mode as they tried to establish emergency connections through other carriers’ towers. This is a standard safety feature intended to ensure that people can still access emergency services even when their primary network is unavailable.
The “SOS mode” was particularly frustrating for users because it limited functionality to emergency communications only. This led to major disruptions for businesses, commuters, and anyone relying on Verizon’s network for work-from-home communications, emergency alerts, or other vital connections.
Restoration and Current Status
By 7:00 PM Eastern Time, Verizon announced that its network engineers had successfully restored service to affected areas. The restoration process involved rerouting traffic, replacing or reconfiguring the faulty hardware, and rolling back the problematic software update to a stable version. The company advised customers who were still experiencing issues to restart their devices, as reconnecting to the network manually would help establish a fresh connection to the nearest operational cell tower.
While the majority of services were restored by the evening, some users in certain parts of Georgia and Ohio reported intermittent issues even late into the night. Verizon has since deployed additional engineering teams to affected regions to ensure complete recovery.
Verizon’s Response and Apology
In a statement, Verizon’s Chief Technology Officer, Kyle Malady, expressed apologies for the inconvenience caused by the outage, noting that the company takes network reliability very seriously. He emphasized that Verizon’s engineering teams worked tirelessly to identify the cause and implement a solution as swiftly as possible. Verizon also announced that it will be conducting a full post-mortem analysis of the incident to prevent similar occurrences in the future.
Malady stated, “We understand how critical our services are to millions of customers who rely on us every day for their business, education, and emergency needs. We sincerely apologize for the disruption and are taking immediate actions to ensure network stability moving forward.”
Steps Moving Forward
To prevent a recurrence of such a significant disruption, Verizon has committed to several measures, which include:
- Network Hardware Review: Verizon plans to conduct a comprehensive review of all major router clusters and network hardware to identify potential points of failure. Any equipment nearing the end of its operational life will be replaced or upgraded to prevent similar cascading failures.
- Software Testing Enhancements: The company will also revise its software update protocols, adding additional layers of testing and monitoring before updates are rolled out across the network. This could involve a more rigorous staged rollout, where updates are tested on a smaller subset of the network before being implemented nationwide.
- Redundancy Improvements: Enhancing redundancy across key components of Verizon’s network is also on the agenda. By adding more redundant pathways and ensuring backup systems can seamlessly take over in case of equipment failure, Verizon hopes to reduce the risk of cascading failures that lead to widespread outages.
The Bigger Picture: Network Vulnerabilities
The Verizon outage highlights the vulnerabilities inherent in modern telecommunications infrastructure. With more people than ever relying on mobile networks for daily activities, from working remotely to connecting with loved ones, the consequences of service disruptions are significant.
As networks become more complex, with layers of hardware and software interacting across large geographical areas, even minor issues can quickly cascade into major failures. The need for robust testing, better redundancy, and improved monitoring is critical, not only for Verizon but for all telecommunications providers.
The outage also serves as a reminder of the importance of competition and diversity in service providers. With millions of people relying on a single network for connectivity, a failure in that network can have disproportionately large consequences. Encouraging infrastructure competition and cross-carrier support agreements can help mitigate the impacts of such failures, as phones could seamlessly switch to other networks in case of an outage.
Customer Reactions and Compensation
Customer reaction to the outage has been mixed. While some expressed understanding, recognizing the technical challenges that come with running a massive telecommunications network, others were less forgiving. Many took to social media to express frustration, particularly those who experienced business disruptions or missed important communications.
There have also been calls for Verizon to offer compensation to affected users. While Verizon has not yet announced any formal compensation plan, it is possible that customers may receive a billing credit for the downtime experienced, as has happened in some past large-scale outages.
Conclusion
The Verizon outage on September 30, 2024, was a major disruption that highlighted the challenges of maintaining complex telecommunications infrastructure. The initial cause appears to be a combination of network equipment failure and complications from a software update. Verizon’s response has been to apologize, restore services, and outline steps to prevent future outages, including a thorough review of hardware, improvements in software rollout procedures, and enhancements to network redundancy.
As the company continues to analyze the incident, customers will be looking for assurances that Verizon has learned from the experience and taken concrete actions to enhance network reliability. In the meantime, the event has also sparked broader discussions about the resilience of telecommunications infrastructure and the importance of ensuring uninterrupted connectivity in an increasingly connected world.
For further information on the Verizon outage, updates can be found at Verizon News Center and through customer notifications on their official app.
business
Windows 10 Deadline Looms: How to Stay Protected Beyond 2025

Free support ends October 14, 2025; new KB5063709 unlocks Extended Security Updates enrollment to keep critical patches flowing through October 2026.
Microsoft is warning Windows 10 users that free security updates end on October 14, 2025. A new cumulative update, KB5063709, enables a built-in enrollment flow for the Extended Security Updates (ESU) program, offering another year of fixes to October 13, 2026. Edge and WebView2 will still receive updates on Windows 10 until 2028.
With less than two months before Windows 10 reaches end of support, Microsoft has issued a final security warning: after October 14, 2025, no more free fixes. A fresh update, KB5063709, now exposes an “Enroll in Extended Security Updates” option inside Windows Update to help users secure one more year of patches.
- End of free support: Windows 10 (22H2) stops receiving free security updates on Oct. 14, 2025.
- Bridge program: Microsoft’s Consumer ESU extends security fixes to Oct. 13, 2026; enrollment is now available from Settings after installing KB5063709.
- Browser exception: Microsoft Edge and WebView2 Runtime will keep updating on Windows 10 through at least Oct. 2028—even if you don’t buy ESU.
- Scale: Windows 10 still represents roughly 43% of active Windows desktops worldwide (Statcounter, July 2025).
“After October 14, 2025… Microsoft will no longer provide security updates or fixes.” — Microsoft support page. Microsoft Support
“KB5063709… includes a fix for a bug that prevented enrollment in extended security updates.” — BleepingComputer (Aug. 12, 2025). BleepingComputer
“Edge and the WebView2 Runtime will continue to receive updates on Windows 10… until at least October 2028.” — Microsoft Edge lifecycle. Microsoft Learn
A separate storyline continues to roil the transition: a California lawsuit alleges Microsoft set the 2025 cutoff to push AI-ready PCs; Microsoft points to ESU as a safety net, but litigation underscores user anxiety about older, ineligible hardware.
What’s changing on Patch Tuesday:
- KB5063709 (Aug. 2025): Required to expose the ESU enrollment UI under Settings → Update & Security → Windows Update. It also resolves the enrollment-wizard crash and rolls in July’s security fixes (including one zero-day).
Enrollment mechanics (consumer ESU):
- Prereqs: Windows 10 22H2, admin rights, and Microsoft account sign-in (local accounts are not supported for ESU).
- Cost options: $30 one-year ESU, 1,000 Microsoft Rewards points, or free if you enable OneDrive settings sync—all visible in the built-in wizard after KB5063709.
Risk surface if you skip ESU:
- Unpatched remote code execution and privilege-escalation flaws accrue monthly across the kernel, Win32k, networking stack, printing, and driver ecosystems. Even with a supported browser, OS-level exposures (SMB, RPC, LSA, Credential Guard bypasses) remain unmitigated. (Derived from Microsoft monthly CVE cadence; see KB5063709 advisory context.)
Mitigations checklist (if you must remain on Windows 10):
- Enroll in ESU and keep Windows Defender/EDR signatures current.
- Harden attack surface: disable legacy protocols (SMBv1), restrict RDP, enforce LSA protection, and require smartcard/Windows Hello where possible. (General guidance aligned with Microsoft security baselines.)
- Application control: enable ASR rules and Smart App Control-equivalents; prefer standard user rights.
- Network containment: segment legacy Windows 10 devices; use firewall allow-lists and zero-trust access.
- Browser updates: keep Edge/WebView2 current; isolate risky web apps in Application Guard where available.
Impact & Response
Who’s affected: Home users, SMBs, schools, and agencies still running Windows 10—hundreds of millions of devices globally. Statcounter shows Windows 10 usage near 43% in July 2025, meaning a large residual population will face patch gaps without ESU.
Actions to take now:
- Install KB5063709, then open Windows Update → Enroll in Extended Security Updates and choose a plan.
- Plan upgrades to Windows 11 24H2+ or supported alternatives; Microsoft reiterates Oct. 2025 as the firm cutoff for free updates.
Long-term implications: Expect shrinking driver/app support and rising exploit availability on unpatched systems, even as browsers continue to update through 2028.
Background
Microsoft set Windows 10 22H2 as the final feature version and has repeated the Oct. 14, 2025 deadline since 2023–24 guidance. ESU is designed as a temporary bridge, not a multi-year extension. Browser support to 2028 offers partial protection, but it does not replace OS security hardening.
- “ESU buys time—but not immunity. Treat it like a controlled exit ramp: enroll now, apply strict hardening (kill SMBv1, lock down RDP, enforce LSA protection), and move critical workloads to supported platforms within 12 months. The cost of delaying migration will be paid in incident response.” — El Mostafa Ouchen, cybersecurity author & practitioner.
- Microsoft (support notice):
“After October 14, 2025… we will no longer provide security updates or fixes.” - BleepingComputer (on KB5063709):
“The update… fixes a bug that prevented enrollment in extended security updates.” - Microsoft Edge team (lifecycle policy):
“Edge and WebView2 will continue to receive updates on Windows 10 until at least October 2028.”
Conclusion
Microsoft’s warning is unambiguous: Windows 10’s free patch era ends on October 14, 2025. The KB5063709 + ESU path is a short-term safety measure to October 2026, not a strategy. Organizations and households should enroll if needed—but prioritize upgrading or retiring Windows 10 endpoints to reduce exposure as exploit pressure rises.
business
Imposter IT on Teams Opens the Door to Enterprise Compromise

Russian-linked group EncryptHub is impersonating IT staff on Microsoft Teams, walking victims into remote sessions, then abusing CVE-2025-26633 (“MSC EvilTwin”) to execute rogue .msc consoles and drop Fickle Stealer. Microsoft patched the bug, but unpatched Windows endpoints remain at risk.
A new campaign weaponizes trust in collaboration tools. Attackers pose as IT on Microsoft Teams, coax employees into remote access, and run PowerShell that pulls a loader exploiting CVE-2025-26633 in Microsoft Management Console. The flaw—now added to CISA’s KEV—lets a malicious .msc run when its benign twin is launched. Patch and tighten verification controls immediately.
A social-engineering wave is turning Microsoft Teams into a beachhead. Adversaries masquerade as internal help-desk staff, request remote access, and execute PowerShell that fetches a loader which plants twin .msc files. When mmc.exe opens the legitimate console, Windows loads the attacker’s EvilTwin from the MUIPath directory, handing over code execution.
“Social engineering remains one of the most effective tools… attackers impersonate IT support, gain trust and remote access, and ultimately deploy suspicious tools,” Trustwave SpiderLabs reported. Trustwave
What’s new in this campaign
- Initial access via Teams impersonation. Operators send Teams requests as “IT” and guide the user into a remote session.
- PowerShell loader. Typical first command:
powershell.exe -ExecutionPolicy Bypass … Invoke-RestMethod … runner.ps1 | iex
, which drops twin .msc files. - Exploit: CVE-2025-26633 / “MSC EvilTwin”—an MMC security-feature bypass that prioritizes a localized .msc in MUIPath (e.g., en-US) over the benign one. Patched by Microsoft in March 2025; listed by CISA KEV.
- Payloads and tooling. Fickle Stealer for data theft; SilentCrystal (Go loader) abusing Brave Support as a dropper; SOCKS5 backdoor for C2.
Demonstration (defender’s view, not exploit code)
- The lure: A user accepts a Teams contact from “IT Support.” A remote session starts.
- Command drop: Attacker runs a single PowerShell line (ExecutionPolicy Bypass) that downloads runner.ps1 from
cjhsbam[.]com
. - EvilTwin setup: The script writes two identically named .msc files; the malicious copy sits in …\System32\en-US (or a mock “C:\Windows␠\System32” with a trailing space), then mmc.exe loads the malicious one first.
- Post-exploit: Persistence, AES-encrypted tasking over C2, and optional info-stealing via Fickle Steal
Why this works
- Trust channel abuse: Users expect help-desk on Teams; the UI looks familiar. Prior research shows Teams vishing has delivered RATs and ransomware before.
- Living-off-the-land: PowerShell + signed Windows binaries (mmc.exe) keep telemetry subtle.
- Path precedence edge case: The MUIPath lookup lets a malicious localized .msc hijack execution—now patched, but effective on lagging fleets.
“Treat every ‘IT support’ request in Teams as untrusted until proven otherwise. Make users verify out-of-band, and make admins verify the OS. If your estate isn’t patched for CVE-2025-26633, you’re one click away from handing attackers mmc.exe on a silver platter. Block the social angle, patch the technical angle, and hunt for ExecutionPolicy Bypass like your business depends on it—because it does.” — El Mostafa Ouchen
Immediate actions (enterprise)
1) Patch priority
- Deploy March 2025 Windows updates that remediate CVE-2025-26633 across client and server. Validate compliance in WSUS/Intune/ConfigMgr; confirm exposure via MSRC / NVD.
2) Harden Teams trust boundaries
- Restrict External Access to allow-list domains; disable unsolicited chats from unknown tenants.
- Create a help-desk verification policy: no remote control unless the user initiates via the corporate portal/ticket, plus callback via a known internal number. (Microsoft and industry advisories consistently warn about tech-support impersonation.)
3) Detections to turn on today
- PowerShell: alert on
-ExecutionPolicy Bypass
,Invoke-RestMethod
,DownloadString
, orInvoke-Expression
launched from Teams, Teams.exe child, or interactive sessions. - MMC/EvilTwin indicators:
- mmc.exe loading .msc from MUIPath (…\System32\en-US*.msc) or paths with trailing spaces (e.g.,
C:\Windows␠\System32
). - Unexpected writes to localized .msc directories.
- New .msc files followed by immediate mmc.exe execution.
- mmc.exe loading .msc from MUIPath (…\System32\en-US*.msc) or paths with trailing spaces (e.g.,
Sample KQL (Microsoft Defender XDR)
DeviceProcessEvents
| where FileName =~ "powershell.exe"
| where ProcessCommandLine has_any ("-ExecutionPolicy Bypass","Invoke-RestMethod","Invoke-Expression","DownloadString")
| summarize count() by DeviceName, InitiatingProcessFileName, ProcessCommandLine, bin(TimeGenerated, 1h)
DeviceImageLoadEvents
| where InitiatingProcessFileName =~ "mmc.exe"
| where FolderPath has_any (@@"\System32\en-US\", @"\Windows \System32") // note the space before \System32
| summarize count() by DeviceName, FolderPath, InitiatingProcessCommandLine, bin(TimeGenerated, 1h)
4) Reduce blast radius
- Enforce ASR rules (e.g., block Office/Win32 child processes), Constrained Language Mode where feasible, and Device Control to prevent unauthorized admin tools.
- WDAC/AppLocker: explicitly allow only known-good .msc; deny execution from localized resource folders and user-writable paths.
5) People & process
- Run an awareness micro-module: “Never accept unsolicited remote-access on Teams. Verify via ticket + callback.”
- Table-top a scenario: help-desk impersonation → PowerShell dropper → MMC exploit → C2.
Indicators & context
- Domains/paths seen: cjhsbam[.]com, rivatalk[.]net, safesurf.fastdomain-uoemathhvq.workers.dev; twin .msc technique; AES-tasking over C2; SilentCrystal loader; SOCKS5 backdoor.
- Attribution & scope: EncryptHub (aka LARVA-208 / Water Gamayun) active since 2024; >600 orgs claimed impacted in reporting.
The bigger picture
Abuse of “work-trusted” channels (Teams, Slack, Quick Assist) is now routine in ransomware and stealer operations. Recent cases show Teams vishing setting up RAT installs and “support” sessions that end in domain compromise. The platform isn’t the problem; trust without verification is.
Bottom line
This campaign fuses social engineering with a Windows path-precedence quirk. If you patch CVE-2025-26633, lock down Teams external contact, verify support out-of-band, and hunt for Bypass-heavy PowerShell, you turn a high-probability breach into a blocked pop-up.
One-Page SOC Playbook (Teams “Request Remote Access” abuse)
Detect, contain, and prevent Teams-led social engineering that results in malicious .msc execution and data theft.
1) Patch & Exposure
- Deploy the March 2025 Windows updates addressing CVE-2025-26633 to all supported builds.
- Verify posture via WSUS/Intune/ConfigMgr compliance reports; track exceptions with a 48-hour SLA.
2) Microsoft Teams Guardrails
- External Access: Move to allow-list of trusted tenants; disable unsolicited chats from unknown domains.
- Support workflow: No remote control unless initiated from the corporate portal/ticket, plus callback verification from a published internal number.
- Education: 10-minute module: “Never accept unsolicited remote access.”
3) Detections to Enable (Microsoft Defender XDR – KQL)
A. PowerShell dropper patterns (bypass + web fetch):
DeviceProcessEvents
| where FileName =~ "powershell.exe"
| where ProcessCommandLine has_any ("-ExecutionPolicy Bypass","Invoke-RestMethod","Invoke-Expression","DownloadString","iwr","iex")
| project Timestamp=TimeGenerated, DeviceName, InitiatingProcessFileName, ProcessCommandLine, AccountName
| order by Timestamp desc
B. Teams as the launchpad (PowerShell child of Teams):
DeviceProcessEvents
| where FileName =~ "powershell.exe"
| where InitiatingProcessFileName has_any ("Teams.exe","ms-teams.exe")
| project TimeGenerated, DeviceName, InitiatingProcessFileName, ProcessCommandLine, AccountSid, AccountName
| order by TimeGenerated desc
C. MMC loading suspicious .msc (localized folders / path tricks):
DeviceImageLoadEvents
| where InitiatingProcessFileName =~ "mmc.exe"
| where FolderPath has @"\System32\en-US\" or FolderPath has @"\Windows \System32" // note possible trailing space
| project TimeGenerated, DeviceName, FolderPath, InitiatingProcessCommandLine
| order by TimeGenerated desc
D. Unexpected .msc file writes (resource folders):
DeviceFileEvents
| where FileName endswith ".msc"
| where FolderPath has @"\System32\en-US\"
| where InitiatingProcessFileName in~ ("powershell.exe","wscript.exe","cscript.exe")
| project TimeGenerated, DeviceName, FolderPath, InitiatingProcessFileName, InitiatingProcessCommandLine
| order by TimeGenerated desc
4) Containment & Hardening
- Isolate device in EDR if any rule above fires + user confirms unsolicited “IT” contact.
- Revoke tokens (AAD sign-ins, OAuth grants) and reset credentials from a known-clean host.
- ASR rules: Block abuse of LOLBins (Office child processes, script abuse); audit → enforce.
- WDAC/AppLocker: Allowlist known-good .msc; deny execution from localized resource folders and user-writable paths.
- PowerShell CLM where feasible; log Script Block/Module events to SIEM.
5) Comms & Aftercare
- Notify impacted users; provide a one-page “verify IT requests” reminder.
- Run retro hunt for the past 30–60 days with the KQL above; export findings for IR.
- Add the scenario to quarterly table-top: Teams impersonation → remote session → PowerShell → MMC hijack.
KPIs: Patch compliance ≥98% within 72h; zero unsolicited remote-access approvals; MDE detections triaged <1h; mean-time-to-isolation <15m.
Sources:
- CyberSecurityNews: Teams impersonation + remote access flow and runner.ps1 details. Cyber Security News
- Trustwave SpiderLabs: technical breakdown (EvilTwin, MUIPath precedence, SilentCrystal, IOCs). Trustwave
- Trend Micro: CVE-2025-26633 “MSC EvilTwin” analysis and Water Gamayun/EncryptHub link. Trend Micro
- NVD/MSRC: CVE-2025-26633 description and references. NVDMicrosoft Security Response Center
- CISA: KEV listing/alert for CVE-2025-26633. CISA
- Fortinet: Fickle Stealer capabilities/background. Fortinet
business
All in One: Morocco’s Official Online Platforms at Your Fingertips

From permits to youth benefits, the kingdom consolidates e-government portals for residents and the diaspora.
RABAT, Morocco — Morocco’s government is expanding a network of official digital platforms designed to deliver key public services to citizens inside the country and Moroccans living abroad. The centralized portals aim to reduce bureaucracy, cut in-person visits, and make vital documents and applications available online.
Core Platforms for All Citizens
Maroc.ma – The kingdom’s official gateway offers information on state institutions and direct access to a growing list of e-services for residents and expatriates.
Rokhas – A unified digital platform for obtaining building permits, renovation approvals, and business activity licenses without visiting municipal offices.
Chikaya – An online complaint portal allowing citizens to file grievances, submit suggestions, and track responses from public administrations.
Tawtik – An electronic system for notarial transactions, streamlining interactions between notaries, tax offices, and property registries.
Wraqi – A platform to book appointments and request administrative documents such as national ID renewals and certificates, with real-time application tracking.
Idarati – A comprehensive guide to administrative procedures, offering downloadable forms and access to select online services.
Casier Judiciaire – Enables citizens to request criminal record certificates remotely from anywhere in the world, without appearing in court.
Youth-Oriented Services
Pass Jeune – A youth card and mobile app launched by the Ministry of Youth, Culture, and Communication, offering discounts and free access to cultural, sports, and transportation services, as well as housing and training opportunities.
Moutawaa – A national volunteering platform connecting young people to service projects and skill-building programs.
Broader Digital Ecosystem
The portals link to a wide directory of Moroccan ministries and agencies, covering justice, foreign affairs, finance, health, transport, education, agriculture, telecommunications, customs, taxation, intellectual property, logistics, social security, and infrastructure.
The impact: By unifying public services online, Morocco aims to streamline government-citizen interactions, support the needs of Moroccans abroad, and encourage broader adoption of digital tools.
More Info:
-
data breaches7 days ago
ALERT – Stop What You’re Doing & Update WinRAR Now
-
data breaches4 days ago
Hackers Claim Full Network Takeover at Royal Enfield
-
data breaches1 week ago
Leaked Logins Are the New Zero-Days—Here’s How Attackers Exploit Them
-
data breaches6 days ago
From VPN to FortiManager: Attack Pattern Suggests Preparation for New Exploit
-
data breaches4 days ago
Pennsylvania AG’s Website, Email Taken Down in Security Incident
-
International7 days ago
From Rabat to the Sahel: Moroccan Builders Lead Africa’s Largest Road Project
-
International1 week ago
Espionage in the Maghreb: Algerian-Spanish Deal to Counter Morocco Unearthed
-
data breaches4 days ago
New PS1Bot Malware Uses Fileless PowerShell for Data Theft