Anatomy of a phishing attack
Phishing attacks are among the most widespread and effective tactics used by cybercriminals against business. These schemes aim to deceive employees into disclosing sensitive information, such as login credentials or financial data, by posing as legitimate sources....
Are printers included in your business cyber security strategy?
With cybercrime rates in South Africa skyrocketing, businesses are increasingly conscious of the need to protect their in-office and remote IT set ups from ill-intentioned hackers. Yudheer Harbhajun, business print sales manager for Epson South Africa, says that while...

AI’s double-edged sword requires a human security approach
Artificial intelligence (AI) has ushered in both promise and peril for organisations needing to combat cyber threat actors. As ESET Southern Africa chief technology officer Adrian Stanford notes: "AI is reshaping the battlefield between cyber attackers and defenders,...
Current trends in cyber-attacks
Cybersecurity experts are sounding the alarm as the pace of cyber-attacks speeds up, with threat actors moving swiftly from infiltration to exploitation, seeking rapid financial gains. Ransomware-as-a-Service (RaaS) has made coordinated attacks easier, as specialised...

Constant vigilance is essential to identifying breaches
At the end of March, a critical security breach was discovered within the upstream source code of XZ Utils, a collection of open-source tools and libraries for the XZ compression format. Karl Fischer, chief technology officer at Obsidian Systems The breach affected...

When cyber attackers use AI, you need to do the same
Cyber threats have become increasingly sophisticated thanks to the use of artificial intelligence (AI), and attacks can now be executed rapidly and scaled beyond anything a human is capable of. By Ivaan Captieux, information security consultant at Galix Add in machine...
Trend Micro to secure AI-enabled private data centres
Trend Micro has announced plans to demo a new data centre solution, using Nvidia technology, for security-conscious business and government customers harnessing the power of AI. Trend Vision One - Sovereign and Private Cloud (SPC) integrates with Nvidia NIM, a set of...
Is your smart home secure?
Smart home security systems have undoubtedly revolutionised the way we safeguard our homes, offering a sense of control and enhanced safety. However, as with any technology, the security of these systems is of paramount importance. Security devices for smart homes are...
Is your business legally ready for cybercriminals’ AI onslaught?
Across the globe, organisations of all sizes are exploring how artificial intelligence (AI) and generative AI, in particular, can benefit their businesses. But while they are still trying to figure out how best to use AI, cybercriminals have fully embraced it. By...
Lessons learned from ransomware attacks
Every organisation faces the looming threat of ransomware. Malicious actors take control of IT assets and demand ransoms, writes Divan de Nysschen, cybersecurity architect at NEC XON. Whether automated or human-operated, this type of malware encrypts files and...

Why rapid response is important
The volume of cybersecurity services in South Africa is expected to top R6,65-billion this year driven in part by the growing adoption of cloud computing services across the business landscape. By Ross Anderson, business unit executive at Duxbury Networking Companies,...

How will Google’s delay in killing third-party cookies impact you?
Google's plan to change the way online advertising is delivered in its Chrome web browser will not happen by the end of the year as intended. This is a setback for ongoing efforts to enhance consumer privacy on the internet, writes Anna Collard, senior vice-president...