Global cloud-enabled next-generation cybersecurity company, Sophos launched its 2020 Threat Report providing insights into the rapidly evolving cyberthreat landscape. The report, produced by SophosLabs researchers, explores changes in the threat landscape...
March 14, 2019 •
Fundi Maseko •
Comments Off on Hosting company warns against domain hijacking
Domain names can be stolen, held hostage and used to wreak havoc for a business website owner. Domain hijacking entails cyber criminals unlawfully gaining access to a website’s unique domain in order to impersonate the business for other illegal...
December 2, 2018 •
Danielle Kruger •
Comments Off on Employees’ cybersecurity habits worsen, survey finds
The prevalence of cybersecurity incidents and the concomitant growing concerns about any organization’s cybersecurity posture haven’t done much to discourage many employees from engaging in poor security habits, a survey has found. In some respects,...
October 3, 2018 •
Comments Off on ESET researchers discover the first-ever UEFI rootkit
ESET researchers discovered a cyberattack that used a UEFI rootkit to establish a presence on the victims’ computers. Dubbed LoJax by ESET, this rootkit was part of a campaign run by the infamous Sednit group against several high-profile targets in Central...
The benefits of the digital revolution to the healthcare sector in Africa are enormous, yet many angles must be considered if it is to prove successful. There are many people around the world who fall through the cracks in the healthcare field. They either...
June 4, 2018 •
Comments Off on Staying safe online: Protecting your personal information from data breaches
We are reminded on an almost-daily basis to guard our personal data and information fiercely by taking steps such as creating more complicated passwords, regularly changing them and not clicking on suspicious links. But what about when there is no...
Kaspersky Lab researchers have identified a new malware with multiple modules, which allows for an almost endless number of malicious features – from crypto currency mining to DDos attacks. Due to its modular architecture, even more functions can be...
October 20, 2017 •
Security, Top Stories •
Comments Off on Mining and manufacturing sectors are becoming vulnerable to cyberattack
South Africa’s manufacturing sector is under growing threat of cyberattack, this is according to Sean Duffy, Executive of Security Solutions for MEA at Dimension Data. The Dimension Data’s Global Threat Intelligence Report for 2017, revealed that the...
August 10, 2017 •
Security, Sponsored •
Comments Off on The rise of security as a service in the evolving threat landscape
The constant evolution of the global security threat landscape is playing a part in the rise of cyber ‘security as a service’ offerings. In addition, the evergreen discussion around cost modelling, namely the ‘Capex vs Opex?’ issue, is also a factor...
June 28, 2017 •
Comments Off on Petya attack points to alarming trend in cybercrime
Another major cyberattack named Petya has been wreaking havoc across the world, highlighting the need for greater focus on cybersecurity education. The cyberattack originated in the Ukraine going on to cause major disruption across the globe. It has hit major...
Check Point® Software Technologies Ltd released its H2 2016 Global Threat Intelligence Trends, revealing that ransomware attacks doubled during the period. Out of all recognised malware incidents globally, the percentage of ransomware attacks increased from...