Cybersecurity Africa

Cyber Attacks in Africa Comparable to World Wide Rates, says Kaspersky

Sourced from IDG Connect With digital transformation a top priority on the corporate agenda as companies identify new ways to grow their business, cyber attackers and opportunist cybercriminals remain very active. While Africa is not necessarily considered a focus area for the more sophisticated types of cybercriminal activity such as targeted attacks or advanced persistent threats (APTs), the continent is certainly not immune to these or other types of cyber risks, warn Kaspersky researchers. When looking at the general cyber threat landscape as it impacts consumers and businesses, Kaspersky research shows that in 2020, worldwide, approximately 10% of computers experienced at least one malware attack. Interestingly, in some African countries, including South Africa, the figure was only sl...

SA Firms Struck by Massive $70-Million Ransomware Attack

Sourced from Kaspersky Companies in 17 countries, including South Africa, the UK, Canada, Argentina, Mexico and Spain, have been struck by a mass ransomware attack exploiting multiple previously unknown vulnerabilities in IT management software made by Kaseya, an American software company that develops software for managing networks, systems, and information technology infrastructure. REvil – The Alleged Threat Actors Cybersecurity researchers are claiming that the attacker is a Russia-based hacking group who call themselves REvil. They are also known as “the Sodinokibi ransomware gang”, according to global cybersecurity and digital privacy firm, Kaspersky. The group has demanded a ransom of $70-million to be paid in Bitcoin. Kaspersky claims that it has identified some threats from REvil’...

Cyber Threats on the Rise in Mining & Manufacturing Industries

Image sourced from Software ONE. Increasingly companies are looking to adopt smart technologies to optimise production and decision-making in order to create businesses of the future. However, as reliance on autonomous and digital technology grows, so too does the risk of cyber-attacks. As technologies become more interconnected, the potential cybersecurity threats and attack vectors are growing. The consequences of these threats can be severe, resulting in production and revenue losses, regulatory fines, reputational damage, as well as the shutdown of critical infrastructures. This has been further compounded by the complexities and uptake of smart systems that use advanced technologies such as machine learning and the Internet of Things (IoT). Mining, Manufacturing Under Threat Termed ‘S...

Surging DDoS Attacks Drive Growing Demand for Third Party Protection Services

Image sourced from Shutterstock. As the global workforce largely shifted to work-from-home in response to the COVID-19 pandemic, reliance on online services soared. Many businesses were able to successfully pivot to this new normal as remote connectivity allowed access to vital systems and data. But as is often the case, no good deed goes unpunished. As the latest NETSCOUT Threat Intelligence Report shows, cybercriminals have exploited new vulnerabilities created by remote work across a wide variety of vertical industries. Making matters worse, perpetrators no longer have to be particularly technology-savvy in order to pull off attacks. Today, it is easy and relatively inexpensive to access sophisticated attack tools via for-hire services: A cottage industry has sprung ...

Inside the Mind of Cybercriminals – How Threat Actors Think

Cybercriminals come in many different flavours, but the majority of them are in it for one thing: financial pay-off. They want the money that comes with offering their tools or services, selling stolen data, extortion like ransomware or plain fraud. And they all have one thing in common – your organisation is on their radar. This is why, says Anna Collard, SVP Content Strategy and Evangelist at KnowBe4 Africa, it is critical to understand how cyber criminals operate, the tools they use and the approaches they take to embed robust security within the organisation. “With ransomware going rampant and victim organisations paying up to millions of U.S. dollars to the extortionists, this problem is just going to get worse. The U.S. government recently announced that ransomware is a national cybe...

Broken Endpoints in Your Organisation’s Cybersecurity: The Role of Superior Endpoint Detection

Stefan van de Giessen, General Manager: Cybersecurity at Networks Unlimited. Networks Unlimited is applying a ‘broken window, broken business’ principle when looking at an organisation’s internal cybersecurity posture, in order to have a positive effect on its business processes. The moral of the ‘broken window’ story, which has been studied by psychologists, is that once a window in a building is broken, people then feel that they are able to damage the property even further, and ultimately loot and steal from it, with impunity. “When we put this into a cybersecurity context,” says Stefan van de Giessen, General Manager: Cybersecurity at Networks Unlimited, “this means, in essence, making sure that you have no ‘broken windows’ or gaps in your security through which uninvited elements coul...

Remote Work is Here to Stay: 4 Critical Elements Companies MUST Address

Sourced from Getty Images. Every business has to protect three critical assets – its staff, customers and its data. When one has six-foot walls around their home, one hopes to protect their physical property and household goods. Unfortunately, most people’s defences are woefully inadequate when it comes to their digital property. When COVID-19 struck last year, many businesses within a week were mandated to have their staff work from home. From an IT perspective, it meant slapping a band-aid on a wound. However, more than a year later, with many companies embarking on a process to get their staff back into the offices, IT assets remain at risk. The reality is that remote working is here to stay, and that an increase in remote work has led to surges in cyber attacks worldwide. Locally and i...

Cybersecurity and Data Protection Laws Urgently Needed Across Africa

The pandemic has driven home the high value of personal data to the global economy, while also highlighting its vulnerability to abuse and attack. In response, governments around the world have been reviewing their data privacy and protection laws and regulations, including in South Africa and Ghana. Global cybersecurity firm Kaspersky recently noted that cyberattacks are set to rise in African countries, especially in the key financial centres of South Africa, Kenya and Nigeria. The cybersecurity firm noted that rapidly evolving digital techniques had led to an increased risk of Advanced Persistent Threats and hacking-for-hire events in Africa. South Africa In South Africa, the Cybercrimes and Cybersecurity Act was signed into law by South African President Cyril Ramaphosa in early June 2...

5 Ways Cybercriminal Gangs Use Ransomware

Over the past few years, the methods cybercriminals use to distribute ransomware has changed dramatically. While a few years ago, they would spread encrypted files on a large scale, today, their ransomware attacks have become more focused. Now, fraudsters examine the target in detail and research each target, looking for additional leverage. Infamous ransomware gangs behave like fully-fledged online service providers, using traditional marketing techniques. And according to Kaspersky, Internet users can see five clear examples of this transformation by looking at Darkside ransomware gang: 1. Darkside actively establishes contact with the press On their website, there’s a semblance of a press centre set up to enable journalists to ask questions and receive first-hand information and learn a...

How the ‘Broken Window’ Theory Affects Cybersecurity Matters

Stefan van de Giessen, General Manager: Cybersecurity at Networks Unlimited Africa Here at Networks Unlimited Africa, we are applying the ‘broken window’ principle when looking at our internal cybersecurity posture and how it affects business processes. The term ‘Broken window’ comes from George Kelling, a criminologist, who wrote in 1982 that, “social psychologists and police officers tend to agree that if a window in a building is broken and is left unrepaired, all the rest of the windows will soon be broken… vandalism can occur anywhere once communal barriers…are lowered by actions that seem to signal that ‘no one cares’.” This theory had also been the subject of experiments previously (1969) by a professor at Stanford University, Philip Zimbardo.  Zimbardo arranged to have a car w...

7 Cybersecurity Precautions South Africans Should Take

Cybercriminals aren’t easy to detect and present a real risk to their victims. The best way to avoid becoming a victim is to be aware of the threats they pose and take every precaution you can to keep yourself safe. According to Giuseppe Virgillito, FNB Head of Digital Banking, the remote living and working requirements of lockdown have meant that most people are communicating digitally – and criminals often use this to their advantage to gain people’s trust in order to steal sensitive information, money or both. “Fraudsters are constantly looking for new ways to get to your information,” explains Virgillito, “and if customers or businesses let down their guard as a result of physical distancing and the need to transact or operate digitally, that unfortunately presents fraudsters with anot...

South African Organisations Lag Behind Global Average of Cybersecurity Resilience

Email and data security company, Mimecast, unveiled its fourth-annual State of Email Security 2020 report. This report summarises details from 1,025 global IT decision-makers on the current state of cybersecurity. The findings in this year’s report demonstrate that despite high levels of confidence in respondents’ cyber resilience strategies, there is a clear need for improvement. While a large majority (77%) of respondents say they have or are actively rolling out a cyber resilience strategy, only 62% of South African organisations are doing the same. Yet an astounding 47% of local organisations – and 60% of global ones – believe it is inevitable or likely they will suffer from an email-borne attack in the coming year. South African respondents cite data loss (35%), a decrease in employee...