Home » Cybersecurity news

Cybersecurity news

How a Data Breach Could Sink an SME

Sourced from CSO. When it comes to reporting on cybercrime, we tend to only come across stories impacting major companies or industries. Apart from the obvious reputational damage, we don’t really grasp the consequences of something like a data breach on a company and its customers. There are no headline articles about the troubles that emerge in the wake of a data breach, some of which literally grind small and medium enterprises (SMEs) into the ground. The media focuses on corporate giants as the only victims of cybercrime and lulls us into a false reality where data breaches seem to happen mostly to corporate behemoths but not the small or medium size business owners. Cybercriminals, who are often well-organised and well-resourced, launch constant attacks on data targets, probing for th...

SA’s Cybersecurity Professionals Feel They’re “Losing Ground” Against Cybercriminals – Study

Image sourced from Pixabay Less than 40% of South African security operations (SecOps) professionals are very confident in their ability to adapt to new online threats, with 34% only somewhat confident. While 18% are not confident in their ability to deal with continuously evolving threats, over 10% are undecided. This was part of a global research study released today by Trellix, the cybersecurity company delivering the future of extended detection and response (XDR), revealing the cost of siloed security, weak spots in protection and lack of confidence amongst SecOps teams. “Although South Africa is slightly ahead of the curve (relative to the global average) in its preparedness to deal with attacks, the number of threats is fast increasing, along with the stakes that attackers are playi...

The Incoming Tech Helping SMBs Deal with Cyberattack Threats

Image sourced from Forbes.com. The cyber threat landscape for businesses of all sizes is terrifying. According to the World Economic Forum, risks are increasing exponentially, while the rate of detection and prosecution is frighteningly low at a rate of below 1%. Organisations, especially small businesses, already suffer the greatest threat to their ongoing viability and require an automated solution if they are to stand any chance of overcoming this critical business risk. These factors have been a crucial driver for the development team at AaDya, which strives to make security accessible and affordable through partners like SLVA Cyber Security. Patrick Evans, CEO of SLVA Cyber Security, explains that even though AaDya solutions are aimed at small to medium businesses, its offerings are c...

Liquid Networks Launches DDoS Security for African Businesses

Image sourced from Insurance Chat. Liquid Networks, a business of Cassava Technologies, a pan-African technology group, today announced the launch of its Distributed Denial of Service (DDoS) Secure offering to its customers. The solution is designed to proactively mitigate attacks by scrubbing traffic and blocking known attackers or malicious traffic. “Cyber Attacks are at an all-time high; cyber security threats cost the African GDP almost a whopping US$4.1 billion in 2021. And, DDoS are on top of the cyber security attacks; the staggering cost to our GDP is proof enough that no business can afford to be without a layer of protection against them. While DDoS attacks have evolved over the years, our offering is equally sophisticated. With traffic scrubbed at one of our four scrubbing centr...

Want to Be a Cybersecurity Expert? Kaspersky is Now Offering an Online Course

Sourced from Hypertext Developed by Kaspersky’s own cybersecurity specialists, the course aims to help businesses enhance or even build a security operations centre (SOC) from scratch – and improve SOC and security team skills in threat hunting, incident detection and investigation. The course guides the audience through the SOC structure, threat intelligence, and relevant attacks. The on-demand format and virtual hands-on labs allow training at the student’s own pace. “Enterprises need to bridge the expertise gap and increase the effectiveness of their security operations. While the question of additional investment is always sensitive, online education may be the solution to achieve their goals. Keeping in mind this business challenge, we developed a bunch of expert training courses on t...

iPhone 14: Users Fall For Scams Ahead of the Release of Apple’s New Smartphone

Apple has confirmed the long-awaited new iPhone 14 will be announced to the public on the 7th of September during its global Apple Event in September. Cybersecurity experts at Kaspersky have already found numerous examples of phishing pages, offering to buy the 14 iPhone, but actually designed to empty victims’ bank accounts and steal their Apple ID accounts. Overall, from 10 to 25 August, Kaspersky security solutions detected more than 8,700 new iPhone-related phishing sites. As the iPhone 14 announcement date gets closer, the number of phishing pages has been also increasing. For example, on August 25, Kaspersky experts detected a total of 1,023 iPhone-related phishing pages, which is almost twice the average number of such malicious site detections per day for the period. The number of ...

Decrypting Crypto’s Potential in Africa

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

Fraudsters Launch Phishing Attacks on Universities

With universities becoming more concerned about their networks’ cybersecurity, attackers find ways to breach these systems by targeting inattentive students, staff and professors. Experts from Russian cybersecurity firm Kaspersky highlight intensified phishing campaigns with fraudsters exploiting the names of some of the worlds’ biggest universities. As the seasonal change marks the start of a new school year for many markets around the world, this aptly dubbed “back to school season” is traditionally a profitable time for fraudsters as millions of students are getting ready to make tuition payments, or purchase school supplies and new books. University-specific phishing pages are usually well-crafted and mimic official university webpages or online learning management systems. Once users ...

The Tech Trends to Take Note of as 2022 Draws to a Close

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

Infoblox Global Survey Sheds Light on Protecting the Network from Blind Spots 

A 2022 global state of security survey from Infoblox, the leader in cloud-first networking and security services, highlights the security concerns, fears, and costs from 1,100 IT respondents in the United States, Mexico, Brazil, United Kingdom, Germany, France, the Netherlands, Spain, United Arab Emirates, Australia, and Singapore. “The hybrid workplace is more reliant than ever on cloud-first technologies, but blind spots have emerged,” says Aric Ault, Senior Director of Channel for Infoblox EMEA. “The explosion of employee-owned technologies on the corporate network feeds IT teams’ growing fears over losing direct security controls and network visibility. This has become all the more concerning as breach costs top 1 million USD for 43 percent of surveyed organisations.” Ruan du Preez, Ve...

Cybersecurity: Africa’s SEACOM Joins Forces with British Telecommunications

SEACOM acquires Africell Uganda Assets to Continue Expanding its East African Footprint African cable system firm SEACOM and British Telecommunications (BT) today announced a strategic partnership which will provide SEACOM with BT cybersecurity systems in order to further secure its own infrastructure and deliver new networking, security and communications solutions to enterprise customers in Africa. As a leading Internet connectivity supplier that owns Africa’s most extensive ICT infrastructure, SEACOM will be leveraging BT’s services, vendor relationships and global expertise to expand its portfolio of services aimed at African businesses. SEACOM’s customers are set to benefit from access to BT’s Cloud Security Incident Event Management (SIEM) platform. In today’s business environment da...

The Crypto Collapse & Rising DDoS Smart Attacks

Image sourced from Shutterstock. During Q2 2022, Distributed Denial of Service (DDoS) attacks reached a new level as the share of smart attacks and average duration saw steep increases. Compared to the previous year, the average duration of a DDoS attack rose 100 times, reaching 3,000 minutes. The share of smart attacks almost broke the four-year record, accounting for nearly 50% of the total. Experts also expect an increase in overall DDoS activity, especially with the recent collapse of cryptocurrency. These and other findings are part of a quarterly DDoS report issued by Kaspersky. A Distributed Denial of Service (DDoS) attack is designed to hinder the normal functioning of a website or crash it completely. During an attack (which usually targets government institutions, retail or ...