While cybersecurity preparedness in Africa is on the upswing, the continent still lacks agreements on international security standards and sharing threat intel.
Read moreP2P Self-Replicating Cloud Worm Targets Redis
July 20 2023Although not all Redis instances are vulnerable to the P2P worm variant, all of them can expect a compromise attempt, researchers warn.
Read moreSophosEncrypt Ransomware Fools Security Researchers
July 20 2023The ransomware-as-a-service offering was first assumed to be a red-team exercise before being detected for true malicious activity.
Read moreNation-states see the opportunity in targeting people directly through their mobile phones, in this case with sophisticated Android surveillanceware.
Read moreSeed Group Brings Resecurity Options to UAE Region
July 20 2023UAE's Seed Group is partnering with Resecurity to expand cybersecurity options in the Middle East and Africa.
Read morePractice Your Security Prompting Skills
July 20 2023Gandalf is an interactive LLM game where the goal is to get the chatbot to reveal its password. There are eight levels of difficulty, as the chatbot gets increasingly...
Read more3 Ways AI Could Improve Authentication
July 20 2023As companies navigate how to protect themselves from the onslaught of increasingly sophisticated fraud threats, artificial intelligence will be a critical piece of next-gen authentication.
Read moreReducing Security Debt in the Cloud
July 19 2023Security debt exists in on-premises data centers as well as in cloud platforms — but preventing it from accumulating in the cloud requires different skills, processes, and tools.
Read moreBy combining these leading-edge tools, security professionals can amplify the impact of their security strategies.
Read more
Recent Comments