Expert Speak
Security Unseen: Unpacking the Present and Future Value of Radar and Thermal Imaging
Written by Magnus Lundegård, Global Product Manager and Niklas Lindman, Global Product Manager at Axis Communications
When formulating a security or perimeter protection plan, Middle Eastern enterprises are inclined to utilise as many independent surveillance and monitoring technologies as possible. While organisations would simply purchase and set up a collection of CCTV cameras dotted across a building or facility in the past, the ever-changing security needs of organisations today demand a more comprehensive and holistic approach, as well as solutions that go beyond traditional visual surveillance. It’s also relevant for organisations to rethink their approach to visual surveillance, especially amidst increased privacy concerns surrounding surveillance cameras and systems in the region.
Radar and thermal imaging technologies serve as key components of that security approach. By complementing network cameras with radars and thermal cameras, organisations can unlock additional value from their physical security strategies, as well as tap recent innovations such as artificial intelligence (AI) and analytics to enhance their physical security resilience.
Where we started…
Developed in the 1940s, primarily for military and defence purposes, radar technology has evolved and now boasts a wide variety of applications across multiple industries, most notably in physical security. Radar technology and thermal imaging allow you to see what visual cameras cannot. Devices can detect moving objects (people, vehicles, etc.) regardless of lighting conditions, or in environments where weather or operating conditions do not allow for adequate visual surveillance.
This way, operators can improve their understanding of the surveyed area and be more accurate when it comes to detecting multiple objects. Their deployment alongside traditional visual cameras also helps to create a wide buffer zone and well-defined perimeter line thanks to two-layered security. An innovation that warrants attention is visual cameras that are integrated with radar. Radar-video fusion cameras combine radar and video data for the purpose of the visual image – radar detections fused into the video image – with analytics, where the input from both sources is merged to enhance the output.
Where we’re going…
There’s a debate to be had around which technology is superior or whether they work best separately or together. But the fact is that radar and thermal imaging solutions, used in conjunction with video surveillance, let operators enjoy total coverage of an area. To achieve this, many solutions are designed to be compatible with major video management systems (VMS). They are also a practical solution in the event video surveillance cannot be used due to privacy restrictions, as people and their faces cannot be identified with thermal cameras or radars. Thermal imaging cannot be used for reliable identification so, along with radar, it enables operators to abide by any restrictions they may have to adhere to, while the technology itself is inherently secure.
However, the applicability of radar technology and thermal imaging extends beyond perimeter protection. The technologies offer real promise for road, traffic, and vehicle monitoring and management, especially in the Middle East where traffic-related incidents cost lives and can have severe annual economic consequences to the tune of hundreds of millions of dollars. Using radar devices strategically placed across highway systems, traffic management centres and officials can detect and identify vehicles, how many there are, and at what speeds or directions they are travelling, culminating in reliable data and statistics that can improve decision-making. Meanwhile, thermal cameras give officials a means to see vehicles 24/7, regardless of the weather conditions.
One innovation that takes radar technology and thermal imaging forward is AI. Combined with radar, AI allows for enhanced object detection and classification to the point that it serves as the basis for trends such as autonomous driving. The goal is to minimise false alarms, and AI-based human and vehicle classifications, combined with modern intrusion detection analytics, make that possible by ignoring variable illuminations and moving objects such as vegetation that may cause moving shadows.
All this goes to show that radar technology and thermal imaging are still evolving. Cutting-edge devices and solutions represent not just a value in terms of security, but also a value in forward thinking. With the help of trusted manufacturers and vendors, organisations in the Middle East can leverage the full power of these technologies for their operations and projects.
Artificial Intelligence
How AI is Reinventing Cybersecurity for the Automotive Industry
Written by Alain Penel, VP of Middle East, CIS & Turkey at Fortinet (more…)
Cyber Security
Positive Technologies Study Reveals Successful Cyberattacks Nett 5X Profits
Positive Technologies has released a study on the dark web market, analysing prices for illegal cybersecurity services and products, as well as the costs incurred by cybercriminals to carry out attacks. The most expensive type of malware is ransomware, with a median cost of $7,500. Zero-day exploits are particularly valuable, often being sold for millions of dollars. However, the net profit from a successful cyberattack can be five times the cost of organizing it.
Experts estimate that performing a popular phishing attack involving ransomware costs novice cybercriminals at least $20,000. First, hackers rent dedicated servers, subscribe to VPN services, and acquire other tools to build a secure and anonymous IT infrastructure to manage the attack. Attackers also need to acquire the source code of malicious software or subscribe to ready-to-use malware, as well as tools for infiltrating the victim’s system and evading detection by security measures. Moreover, cybercriminals can consult with seasoned experts, purchase access to targeted infrastructures and company data, and escalate privileges within a compromised system. Products and tools are readily available for purchase on the dark web, catering to beginners. The darknet also offers leaked malware along with detailed instructions, making it easier for novice cybercriminals to carry out attacks.
Malware is one of the primary tools in a hacker’s arsenal, with 53% of malware-related ads focused on sales. In 19% of all posts, infostealers designed to steal data are offered. Crypters and code obfuscation tools, used to help attackers hide malware from security tools, are featured in 17% of cases. Additionally, loaders are mentioned in 16% of ads. The median cost of these types of malware stands at $400, $70, and $500, respectively. The most expensive malware is ransomware: its median cost is $7,500, with some offers reaching up to $320,000. Ransomware is primarily distributed through affiliate programs, known as Ransomware-as-a-Service (RaaS), where participants in an attack typically receive 70–90% of the ransom. To become a partner, a criminal must make a contribution of 0.05 Bitcoin (approximately $5,000) and have a solid reputation on the dark web.
Another popular attack tool is exploits: 69% of exploit-related ads focus on sales, with zero-day vulnerability posts accounting for 32% of them. In 31% of cases, the cost of exploits exceeds $20,000 and can reach several million dollars. Access to corporate networks is relatively inexpensive, with 72% of such ads focused on sales, and 62% of them priced at under a thousand dollars. Among cybercriminal services, hacks are the most popular option, accounting for 49% of reports. For example, the price for compromising a personal email account starts at $100, while the cost for a corporate account begins at $200.
Dmitry Streltsov, Threat Analyst at Positive Technologies, says, “On dark web marketplaces, prices are typically determined in one of two ways: either sellers set a fixed price, or auctions are held. Auctions are often used for exclusive items, such as zero-day exploits. The platforms facilitating these deals also generate revenue, often through their own escrow services, which hold the buyer’s funds temporarily until the product or service is confirmed as delivered. On many platforms, these escrow services are managed by either administrators or trusted users with strong reputations. In return, they earn at least 4% of the transaction amount, with the forums setting the rates.”
Considering the cost of tools and services on the dark web, along with the median ransom amount, cybercriminals can achieve a net profit of $100,000–$130,000 from a successful attack—five times the cost of their preparation. For a company, such an incident can result not only in ransom costs but also in massive financial losses due to disrupted business processes. For example, in 2024, due to a ransomware attack, servers of CDK Global were down for two weeks. The company paid cybercriminals $25 million, while the financial losses of dealers due to system downtime exceeded $600 million.
Expert Speak
What the Bybit Hack Reveals About the Future of Crypto Security
Written by Oded Vanunu, Chief Technologist & Head of Product Vulnerability Research at Check Point (more…)
-
GISEC1 week agoPositive Technologies @ GISEC Global 2025: Demonstrating Cutting-Edge Cyber Threats and AI Defense Strategies
-
Cyber Security1 week agoAxis Communications Sheds Light on Video Surveillance Industry Perspectives on AI
-
GISEC1 week agoVideo: SANS Institute Weighs in on Deepfakes, Model Poisoning and Risk Frameworks at GISEC Global 2025
-
GISEC1 week agoManageEngine @ GISEC Global 2025: AI, Quantum Computing, and Ransomware Form Part of Cybersecurity Outlook for 2025
-
GISEC1 week agoVideo: SentinelOne Speaks Hyperautomation, Purple AI, and the Future of Threat Detection at GISEC Global 2025
-
Africa Focus6 days agoCyberKnight Sets Up South Africa Entity
-
GISEC1 week agoGroup-IB @ GISEC Global 2025: Tackling Evolving Cyber Threats with Localised Intelligence and AI
-
GISEC1 week agoVideo: CyberKnight on Zero Trust, AI, and Saudi Arabia’s Digital Transformation at GISEC Global 2025
