Jun 12, 2024
Phishing attacks are among the most widespread and effective tactics used by cybercriminals against business. These schemes aim to deceive employees into disclosing sensitive information, such as login credentials or financial data, by posing as legitimate sources....
Jun 12, 2024
With cybercrime rates in South Africa skyrocketing, businesses are increasingly conscious of the need to protect their in-office and remote IT set ups from ill-intentioned hackers. Yudheer Harbhajun, business print sales manager for Epson South Africa, says that while...
Jun 12, 2024
Artificial intelligence (AI) has ushered in both promise and peril for organisations needing to combat cyber threat actors. As ESET Southern Africa chief technology officer Adrian Stanford notes: “AI is reshaping the battlefield between cyber attackers and...
Jun 11, 2024
Cybersecurity experts are sounding the alarm as the pace of cyber-attacks speeds up, with threat actors moving swiftly from infiltration to exploitation, seeking rapid financial gains. Ransomware-as-a-Service (RaaS) has made coordinated attacks easier, as specialised...
Jun 11, 2024
At the end of March, a critical security breach was discovered within the upstream source code of XZ Utils, a collection of open-source tools and libraries for the XZ compression format. Karl Fischer, chief technology officer at Obsidian Systems The breach affected...
Jun 10, 2024
Cyber threats have become increasingly sophisticated thanks to the use of artificial intelligence (AI), and attacks can now be executed rapidly and scaled beyond anything a human is capable of. By Ivaan Captieux, information security consultant at Galix Add in machine...