Monday, July 15, 2024
No menu items!

cyberattack

Cyber-attacks and OT – safeguard this new feeding ground

Before the advent of Industrial Internet of Things (IIoT), Operation Technology (OT) was safeguarded against most cyberattacks.  OT systems’ propriety nature, standards and hard-wired connectivity protected it against malicious attacks. Cyber threats and incidents are a major operating and business...

6 Common Cybersecurity Mistakes Made by Startup Companies

Some of the most successful companies today began their journey as startups. They usually start with a brilliant idea or a new technology that promises to solve a problem to rethink the way we do business. The African region is...

SA Firms Struck by Massive $70-Million Ransomware Attack

Companies in 17 countries, including South Africa, the UK, Canada, Argentina, Mexico and Spain, have been struck by a mass ransomware attack exploiting multiple previously unknown vulnerabilities in IT management software made by Kaseya, an American software company that...

The Role Of Artificial Intelligence In Enhancing Cybersecurity

The Cold War period fostered all sorts of technological advancements, whereas in contemporary times the more technologically advanced the world we have the more cybersecurity is at risk. Combining the quality of artificial intelligence (AI) with cybersecurity, security experts...

Five critical elements for any cyber security awareness programme

While nearly 9 in 10 companies not only allow but actually rely on their employees to access critical business apps using their personal devices, according to a recent Fortinet Threat Landscape Report, Android-based malware now represents 14% of all cyber threats. And...

9 cyber-threat predictions for 2020

Cyberattack methodologies have become more sophisticated in recent years magnifying their effectiveness and speed. For networks and organisations using sophisticated methods to detect and respond to attacks, the response might be for criminals to attempt to reply with something...

Top 4 cyberthreats for 2020 revealed

Global cloud-enabled next-generation cybersecurity company, Sophos launched its 2020 Threat Report providing insights into the rapidly evolving cyberthreat landscape. The report, produced by SophosLabs researchers, explores changes in the threat landscape over the past 12 months, uncovering trends likely to...

Hosting company warns against domain hijacking

Domain names can be stolen, held hostage and used to wreak havoc for a business website owner. Domain hijacking entails cyber criminals unlawfully gaining access to a website's unique domain in order to impersonate the business for other illegal...

Employees’ cybersecurity habits worsen, survey finds

The prevalence of cybersecurity incidents and the concomitant growing concerns about any organization’s cybersecurity posture haven’t done much to discourage many employees from engaging in poor security habits, a survey has found. In some respects, employees’ cyber-hygiene is actually getting...

ESET researchers discover the first-ever UEFI rootkit

ESET researchers discovered a cyberattack that used a UEFI rootkit to establish a presence on the victims’ computers. Dubbed LoJax by ESET, this rootkit was part of a campaign run by the infamous Sednit group against several high-profile targets...
- Advertisement -spot_img

Latest News

Innovative AI Partnership Transforms Healthcare Technology

BroadReach Group and BAO Systems- a US-based health IT organization, have signed a collaboration agreement that will expand how...
- Advertisement -spot_img