Controversial aid group begins deliveries in Gaza and ceasefire talks falter


  • English
  • Arabic

The US-Israeli Gaza Humanitarian Foundation said it started distributing aid. Iraq's Oil Ministry is suing the semi-autonomous Kurdish region. Negotiations in Cairo and Doha for a Gaza ceasefire are “not leading” to a deal yet.

On this episode of Trending Middle East:

US-backed Gaza aid foundation is distraction from what is really needed, UN says

Head of US-Israeli aid agency for Gaza resigns over lack of 'humanitarian principles'

Gaza ceasefire talks not leading to a deal yet, source says

Iraqi Oil Ministry files lawsuit against Kurdish region over unilaterally signed energy deals

This episode features Nada AlTaher, Senior Foreign Reporter, Hamza Hendawi, Cairo Correspondent, and Sinan Mahmoud, Baghdad Correspondent.

Know your cyber adversaries

Cryptojacking: Compromises a device or network to mine cryptocurrencies without an organisation's knowledge.

Distributed denial-of-service: Floods systems, servers or networks with information, effectively blocking them.

Man-in-the-middle attack: Intercepts two-way communication to obtain information, spy on participants or alter the outcome.

Malware: Installs itself in a network when a user clicks on a compromised link or email attachment.

Phishing: Aims to secure personal information, such as passwords and credit card numbers.

Ransomware: Encrypts user data, denying access and demands a payment to decrypt it.

Spyware: Collects information without the user's knowledge, which is then passed on to bad actors.

Trojans: Create a backdoor into systems, which becomes a point of entry for an attack.

Viruses: Infect applications in a system and replicate themselves as they go, just like their biological counterparts.

Worms: Send copies of themselves to other users or contacts. They don't attack the system, but they overload it.

Zero-day exploit: Exploits a vulnerability in software before a fix is found.

Updated: May 28, 2025, 2:00 AM
More podcasts