Is your CEO safe from whaling or spear phishing?
Most cyberattacks are opportunistic. Much like a mugging on a dark street, it doesn't matter who the victim is as long as the perpetrators gain something out of their crimes. However, a growing number of these attacks are designed to target specific people like CEOs,...

Data for ransom: Yours …
The highest number of data compromises tracked by the Identity Theft Resource Center (ITRC) was 1 860, impacting around 300-million people in 2021. Until 2023. The ITRC tracked 3,205 data compromises affecting 353,027,892 individuals at a 72% increase on 2021's...
Kaspersky releases free malware scanner for Linux
Cybercriminals aren't ignoring Linux-based devices, which becomes evident when looking at some of the recent examples of malware targeting this operating system: a Linux implant for the DinodasRAT malware -- also known as XDealer; or a backdoor in the Trojanised...
Public-facing applications harbour security risks
Today, public-facing applications play a pivotal role in enabling businesses to interact with customers, partners, and stakeholders. These applications, ranging from websites to APIs and web services, serve as the digital storefronts of organisations, providing...

A call for robust DDoS defence strategies
Within the constantly-fluid cybersecurity arena, Distributed Denial of Service (DDoS) attacks present a formidable challenge. The staggering frequency and impacts of these attacks are often underestimated, yet they are a relentless threat, disrupting the very fabric...
Tips to improve your backups
Backups are crucial. Whether you are worried about a ransomware attack or some other disaster taking out the information that keeps your business running, backups are the best way to mitigate data loss risks. Yet, organisations are often unsatisfied with the value...
Anatomy of a phishing attack
Phishing attacks are among the most widespread and effective tactics used by cybercriminals against business. These schemes aim to deceive employees into disclosing sensitive information, such as login credentials or financial data, by posing as legitimate sources....
Are printers included in your business cyber security strategy?
With cybercrime rates in South Africa skyrocketing, businesses are increasingly conscious of the need to protect their in-office and remote IT set ups from ill-intentioned hackers. Yudheer Harbhajun, business print sales manager for Epson South Africa, says that while...

AI’s double-edged sword requires a human security approach
Artificial intelligence (AI) has ushered in both promise and peril for organisations needing to combat cyber threat actors. As ESET Southern Africa chief technology officer Adrian Stanford notes: "AI is reshaping the battlefield between cyber attackers and defenders,...
Current trends in cyber-attacks
Cybersecurity experts are sounding the alarm as the pace of cyber-attacks speeds up, with threat actors moving swiftly from infiltration to exploitation, seeking rapid financial gains. Ransomware-as-a-Service (RaaS) has made coordinated attacks easier, as specialised...

Constant vigilance is essential to identifying breaches
At the end of March, a critical security breach was discovered within the upstream source code of XZ Utils, a collection of open-source tools and libraries for the XZ compression format. Karl Fischer, chief technology officer at Obsidian Systems The breach affected...

When cyber attackers use AI, you need to do the same
Cyber threats have become increasingly sophisticated thanks to the use of artificial intelligence (AI), and attacks can now be executed rapidly and scaled beyond anything a human is capable of. By Ivaan Captieux, information security consultant at Galix Add in machine...