News

Ransomware attacks in SA require protectionIssued by CyberVisionJohannesburg, 19 May 2025Visit our press officeWithSecure acknowledges the complexity of modern cyber threats. Almost a year ago in June ...
When I cautiously asked what this was, the people behind the Telegram account - which had no name or profile picture - gave ...
The proactive steps taken by Co-op’s IT team are thought to be why the supermarket is recovering more quickly after being ...
This article discusses the five business continuity and disaster recovery capabilities that businesses must have for ...
"Ransomware at the CPU level, microcode alteration, and if you are in the CPU or the firmware, you will bypass every freaking ...
A security researcher designed a way to "weaponize" microcode updates to install ransomware directly onto the CPU. Rapid7 ...