Fuse partners with Check Point on blockchain firewall
Layer 2 payments blockchain Fuse has announced that it has partnered with Check Point Software Technologies to develop and deploy a real-time threat prevention security layer protecting its entire blockchain. Fuse’s commitment to integrate a best-in-class web3...

Sophisticated cyber-attack at international service provider disrupted
Recent global research indicates that “ransomware attacks continued to trend upwards in 2024, rising by 3% compared to 2023, underlining the resilience of this particular cyber threat”. The surge in ransomware activity was despite some major setbacks faced by two of...

A guide to selecting the right MSSP
Cybersecurity has become a critical priority for organisations of all sizes. With cyber threats becoming increasingly sophisticated and IT ecosystems more complex, businesses are turning to Managed Security Service Providers (MSSPs) for expert protection. By Nemanja...
Kaspersky launches Research Sandbox 3.0
Kaspersky has launched a major update to Kaspersky Research Sandbox, introducing version 3.0 with advanced capabilities for deeper file analysis, interactive threat investigation, and significantly reduced hardware requirements. Designed for security teams and threat...
Deepfakes the new digital threat
Imagine waking up to a video of the President announcing a national emergency that never happened. Or a CEO admitting to fraud. In today’s digital world, deepfakes make such scenarios increasingly possible, with terrifying implications for South Africa’s democracy,...
How kids can safeguard themselves against online scammers
Over 95% of children in South Africa regularly access the internet but less than half are taught about online safety. We teach our children how to tie their shoes, cross the road, and ride a bicycle – all things we were taught as children. Today’s toddlers and teens,...
The lessons from Adolescence
The Netflix series Adolescence quickly sparked a wave of conversations about teenage mental health and digital safety. The chilling four-part narrative follows a 13-year-old boy who, after months of cyberbullying and immersion in toxic online communities, comes under...
Hiding in plain sight: The stealthy attack chain of PDF files
Over 400-billion PDFs were opened last year, and 16-billion documents were edited in Adobe Acrobat. Over 87% of organisations use PDFs as a standard file format for business communication, making them ideal vehicles for attackers to hide malicious code. Cybercriminals...
Catastrophic cyberattacks can hit anyone
In today's interconnected world, the spectre of cyberattacks looms large over businesses of all sizes and across all industries. From small startups to multinational conglomerates, every organisation is at risk of devastating cyber threats. Last month, JSE-listed...

How to safeguard your AI Investments
Across South Africa, artificial intelligence (AI) is redefining industries, inspiring innovation, improving operations, and driving growth, writes Doug Woolley, GM and vice-president of Dell Technologies South Africa. The government and businesses are capitalising on...
Trend Micro to open-source model and AI agent
Trend Micro has announced the open-sourcing of Trend Cybertron, an AI model and agent framework designed to accelerate the development of autonomous cybersecurity agents. As one of the first specialised cybersecurity large language models (LLMs), it provides...
Cyberint puts Check Point in attack surface management lead
Check Point Software Technologies has emerged as a leading player in Attack Surface Management (ASM) with its acquisition of Cyberint, as highlighted in the recent GigaOm Radar report. Cyberint, recognised as a top performer in the Maturity/Platform Play quadrant, now...