Deepfakes the new digital threat
Imagine waking up to a video of the President announcing a national emergency that never happened. Or a CEO admitting to fraud. In today’s digital world, deepfakes make such scenarios increasingly possible, with terrifying implications for South Africa’s democracy,...
How kids can safeguard themselves against online scammers
Over 95% of children in South Africa regularly access the internet but less than half are taught about online safety. We teach our children how to tie their shoes, cross the road, and ride a bicycle – all things we were taught as children. Today’s toddlers and teens,...
The lessons from Adolescence
The Netflix series Adolescence quickly sparked a wave of conversations about teenage mental health and digital safety. The chilling four-part narrative follows a 13-year-old boy who, after months of cyberbullying and immersion in toxic online communities, comes under...
Hiding in plain sight: The stealthy attack chain of PDF files
Over 400-billion PDFs were opened last year, and 16-billion documents were edited in Adobe Acrobat. Over 87% of organisations use PDFs as a standard file format for business communication, making them ideal vehicles for attackers to hide malicious code. Cybercriminals...
Catastrophic cyberattacks can hit anyone
In today's interconnected world, the spectre of cyberattacks looms large over businesses of all sizes and across all industries. From small startups to multinational conglomerates, every organisation is at risk of devastating cyber threats. Last month, JSE-listed...

How to safeguard your AI Investments
Across South Africa, artificial intelligence (AI) is redefining industries, inspiring innovation, improving operations, and driving growth, writes Doug Woolley, GM and vice-president of Dell Technologies South Africa. The government and businesses are capitalising on...
Trend Micro to open-source model and AI agent
Trend Micro has announced the open-sourcing of Trend Cybertron, an AI model and agent framework designed to accelerate the development of autonomous cybersecurity agents. As one of the first specialised cybersecurity large language models (LLMs), it provides...
Cyberint puts Check Point in attack surface management lead
Check Point Software Technologies has emerged as a leading player in Attack Surface Management (ASM) with its acquisition of Cyberint, as highlighted in the recent GigaOm Radar report. Cyberint, recognised as a top performer in the Maturity/Platform Play quadrant, now...
Prevent your WhatsApp account from being hacked
A user's messaging app account might be of interest not only to jealous spouses and nosy coworkers, but also to cybercriminals. Stolen WhatsApp accounts are used for various types of criminal activity, ranging from spam distribution to sophisticated scam schemes....
Legislation tightens cyber defences for financial services
Automated processes across banking, financing, insurance and other financial services are dependent on complex infrastructures that span both on-premises data centres and cloud service providers. This dependency on third-party service providers and technology vendors...
Insights on AI-enabled cybercrime
Over the last year, discussions about AI-enabled cybercrime have shifted from speculation about impacts to real-world observations, writes Derek Manky, chief security strategist and global vice-president: threat intelligence at Fortinet. Malicious actors continue to...
As AI unleashes new threats, we need a new cybersecurity approach
Imagine coming to the end of a lengthy recruitment process, only to find out the candidate you’ve been dealing with during several rounds of in-depth interviews isn’t real. By Yash Pillay, sales engineer at Trend Micro In fact, the person you’ve just hired doesn’t...