Mar 31, 2025
A user’s messaging app account might be of interest not only to jealous spouses and nosy coworkers, but also to cybercriminals. Stolen WhatsApp accounts are used for various types of criminal activity, ranging from spam distribution to sophisticated scam...
Mar 31, 2025
Automated processes across banking, financing, insurance and other financial services are dependent on complex infrastructures that span both on-premises data centres and cloud service providers. This dependency on third-party service providers and technology vendors...
Mar 27, 2025
Over the last year, discussions about AI-enabled cybercrime have shifted from speculation about impacts to real-world observations, writes Derek Manky, chief security strategist and global vice-president: threat intelligence at Fortinet. Malicious actors continue to...
Mar 25, 2025
Imagine coming to the end of a lengthy recruitment process, only to find out the candidate you’ve been dealing with during several rounds of in-depth interviews isn’t real. By Yash Pillay, sales engineer at Trend Micro In fact, the person you’ve just hired doesn’t...
Mar 25, 2025
The digital landscape is evolving rapidly, and with it comes the urgent need for more secure authentication methods. Passwords, once the cornerstone of online security, are now easy targets for cybercriminals, writes By Kumar Vaibhav, lead senior solution architect:...
Mar 20, 2025
The threat of ransomware attacks looms large, compelling organisations to rethink their data management strategies. By Modeen Malick, principal systems engineer at Commvault As businesses increasingly adopt cloud technologies, the complexities of maintaining...