Veeam recommends building a culture of data resilience, having an immutable copy of data to keep it safe from ransomware and properly testing backups.
The speed with which the "$Ramaphosa" token was created and promoted via the hacked accounts suggests a well-orchestrated and financially motivated operation, says KnowBe4’s Anna Collard.
The 2025 Arctic Wolf Threat Report has revealed changes in cyber crime tactics and targets since the previous year.
Symbiosys will serve as Coro’s official distributor in SA, providing local businesses and MSPs with access to Coro’s cyber security solutions.
Parliament identifies a security breach affecting one of its 25 YouTube streaming services integrated with its official social media accounts.
This essential element identifies vulnerabilities, promotes an understanding of the associated risks and prioritises measures to address them.
Secure by design emphasises architecture considerations to build more secure systems from the start of the software development process.
The Bybit hack of approximately 400 000 Ethereum, valued at $1.5 billion, challenges previous beliefs about crypto security, says Check Point’s Hendrik de Bruin.
The event was an interactive ransomware attack simulation designed to help companies understand how to respond in the event of a cyber attack.
ITWeb and Vodacom Business teamed up to gain insight into the cyber security threats South African businesses are most concerned about.
Last week, an unknown third-party gained unauthorised access to the company’s system via a user account.