News

This article discusses the five business continuity and disaster recovery capabilities that businesses must have for ...
Ransomware attacks in SA require protectionIssued by CyberVisionJohannesburg, 19 May 2025Visit our press officeWithSecure acknowledges the complexity of modern cyber threats. Almost a year ago in June ...
These in-between systems are no man's land, according to Tim Conway, the technical director of SANS Institute industrial ...
The proactive steps taken by Co-op’s IT team are thought to be why the supermarket is recovering more quickly after being ...
A security researcher designed a way to "weaponize" microcode updates to install ransomware directly onto the CPU. Rapid7 ...
At the end of April, SAP had to close a critical security gap in Netweaver. Ransomware groups are now also attacking the leak ...
When was the last time you had a serious conversation about cybersecurity that didn’t touch on ransomware. We all know that it’s one of the most persistent and damaging threats out there. Yet, this ...
Whether it’s a fire, data corruption or the disruption of vital platforms, disaster can strike an organisation at any time, ...
While emerging risks like AI-generated malware capture headlines, the reality of today's threat landscape is more ...
Gangs have introduced innovative approaches to expand their operations, writes RAFE PILLING, director of threat intelligence in the Secureworks counter threat unit.
Security experts say the theft of customer data from Nova Scotia's electric utility has the hallmarks of an extortion attempt ...