Home » cybersecurity » Page 12

cybersecurity

Microsoft Acquires Cybersecurity Startup RiskIQ as Ransomware Threat Looms

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent. You Deserve to Make Money Even When you are looking for Dates Online. So we reimagined what a dating should be. It begins with giving you back power. Get to meet Beautiful people, chat and make money in the process. Earn rewards by chatting, sharing photos, blogging and help give users back their fair share of Internet revenue.

33% of Companies Undergo Cyberattacks Twice a Month on Average, per Report

Sourced from International IDEA The Hiscox Cyber Readiness Report 2021 provided some concerning statistics and facts about the impact of cyber-crime. It is a game, and it is one that Hiscox fundamentally believes no business should leave to chance. Multiple threat vectors and variable threat actors, and, perhaps most worrying – repeated attacks on companies by cyber-crime pose a serious risk to organisations small and large alike. One-in-six of all firms attacked this year (17%) said the impact was serious enough to ‘materially threaten the solvency or viability of the company’. According to Anna Collard, SVP Content Strategy & Evangelist at KnowBe4 AFRICA, the report underscores the immense challenge that organisations face when it comes to securing the business and the people within ...

Gijima’s Shubna Harilal Talks Women in Tech, Digital Transformation and Tech’s Next Big Thing

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent. You Deserve to Make Money Even When you are looking for Dates Online. So we reimagined what a dating should be. It begins with giving you back power. Get to meet Beautiful people, chat and make money in the process. Earn rewards by chatting, sharing photos, blogging and help give users back their fair share of Internet revenue.

SA Firms Struck by Massive $70-Million Ransomware Attack

Sourced from Kaspersky Companies in 17 countries, including South Africa, the UK, Canada, Argentina, Mexico and Spain, have been struck by a mass ransomware attack exploiting multiple previously unknown vulnerabilities in IT management software made by Kaseya, an American software company that develops software for managing networks, systems, and information technology infrastructure. REvil – The Alleged Threat Actors Cybersecurity researchers are claiming that the attacker is a Russia-based hacking group who call themselves REvil. They are also known as “the Sodinokibi ransomware gang”, according to global cybersecurity and digital privacy firm, Kaspersky. The group has demanded a ransom of $70-million to be paid in Bitcoin. Kaspersky claims that it has identified some threats from REvil’...

6 Ways Gamers Can Protect Themselves from Web Attacks

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent. You Deserve to Make Money Even When you are looking for Dates Online. So we reimagined what a dating should be. It begins with giving you back power. Get to meet Beautiful people, chat and make money in the process. Earn rewards by chatting, sharing photos, blogging and help give users back their fair share of Internet revenue.

Surging DDoS Attacks Drive Growing Demand for Third Party Protection Services

Image sourced from Shutterstock. As the global workforce largely shifted to work-from-home in response to the COVID-19 pandemic, reliance on online services soared. Many businesses were able to successfully pivot to this new normal as remote connectivity allowed access to vital systems and data. But as is often the case, no good deed goes unpunished. As the latest NETSCOUT Threat Intelligence Report shows, cybercriminals have exploited new vulnerabilities created by remote work across a wide variety of vertical industries. Making matters worse, perpetrators no longer have to be particularly technology-savvy in order to pull off attacks. Today, it is easy and relatively inexpensive to access sophisticated attack tools via for-hire services: A cottage industry has sprung ...

Iron Mountain’s Kevin Akaloo Talks PoPIA – Crucial Steps for Compliance and Harsh Penalties for Not

Kevin Akaloo, National Head of Sales – Private and Public sector – at Iron Mountain SA. PoPIA is here. After months of speculation and waiting with bated breath, the Information Regulator of South Africa has said that the PoPI (Protection of Private Information) Act will become effective as of 1 July 2021. “PoPIA enforcement powers as promulgated by the President of South Africa in June 2020 will still be coming into effect as of 1 July 2021,” said Information Regulator chair Pansy Tlakula. ITNA’s Luis Monzon had the opportunity to chat with Kevin Akaloo, National Head of Sales at Iron Mountain South Africa, a global leader for storage and information management services that is trusted by more than 220,000 organizations around the world, to get his insights into the PoPI Act –...

Recent Increases in Cyberattacks Could Be Due to Leaked Cyber “Superweapons”

Sourced from Forbes Check Point Research (CPR), the Threat Intelligence arm of Check Point Software Technologies Ltd., a leading provider of cybersecurity solutions globally, warns of a further increase in cyberattacks and thinks it could be partly down to major powers leaking, what they refer to as, ‘cyber superweapons’. “We have long warned that organisations of all sizes are being bombarded by a global fifth generation of cyber threats (Gen V). These are multi-vector cyber threats that can cause fatal damage and irreparable harm to the reputation of the compromised company,” said Pankaj Bhula, Regional Spokesperson at Check Point Software. “However, most companies are only secured against what we call third-generation threats (Gen III), which are threats that we’ve known about since the...

Inside the Mind of Cybercriminals – How Threat Actors Think

Cybercriminals come in many different flavours, but the majority of them are in it for one thing: financial pay-off. They want the money that comes with offering their tools or services, selling stolen data, extortion like ransomware or plain fraud. And they all have one thing in common – your organisation is on their radar. This is why, says Anna Collard, SVP Content Strategy and Evangelist at KnowBe4 Africa, it is critical to understand how cyber criminals operate, the tools they use and the approaches they take to embed robust security within the organisation. “With ransomware going rampant and victim organisations paying up to millions of U.S. dollars to the extortionists, this problem is just going to get worse. The U.S. government recently announced that ransomware is a national cybe...

Broken Endpoints in Your Organisation’s Cybersecurity: The Role of Superior Endpoint Detection

Stefan van de Giessen, General Manager: Cybersecurity at Networks Unlimited. Networks Unlimited is applying a ‘broken window, broken business’ principle when looking at an organisation’s internal cybersecurity posture, in order to have a positive effect on its business processes. The moral of the ‘broken window’ story, which has been studied by psychologists, is that once a window in a building is broken, people then feel that they are able to damage the property even further, and ultimately loot and steal from it, with impunity. “When we put this into a cybersecurity context,” says Stefan van de Giessen, General Manager: Cybersecurity at Networks Unlimited, “this means, in essence, making sure that you have no ‘broken windows’ or gaps in your security through which uninvited elements coul...

PoPIA Deadline Extended – Information Officer Registration Portal Broken

After a series of technical glitches with the Information Regulator’s registration portal for information officers looking to achieve compliance with the PoPI Act, the 1 July 2021 compliance deadline has been scrapped. In a statement released on Tuesday, the Information Regulator said that this decision is also based on numerous concerns raised by responsible parties regarding the registration process. “The regulator is currently looking into alternative registration processes and will communicate this in due course. We understand that our portal malfunctioning has caused a lot of anxiety and panic and for that, we really do apologise,” Information Regulator chair Pansy Tlakula said. Deadline Extended by 1 Year With this, the regulator has extended the applications for prior authorisation ...

U.S. blocks websites linked to Iranian disinformation

The U.S. Justice Department on Tuesday blocked some three dozen websites, many of them associated with Iranian disinformation activities, a U.S. government source said, adding an official announcement was expected. The source in Washington spoke after notices appeared earlier on Tuesday on a number of Iran-affiliated websites saying they had been seized by the United States government as part of law enforcement action. Iranian news agencies said that the U.S. government had seized several Iranian media websites and sites belonging to groups affiliated with Iran such as Yemen’s Houthi movement. Some sites later started to display as normal. The website of the Arabic-language Masirah TV, which is run by the Houthis, read: “The domain almasirah.net has been seized by the United States Governm...