Attacker could defeat Dell firmware flaws with a vegetable

Blog

Irina Sokolovskaya – stock.adobe Cisco Talos discloses five vulnerabilities in cyber security…
Read More

CYSEC AFRICA 2025: Shaping the Future of Digital Resilience Across the Continent

Blog

Johannesburg, SA, 4th August 2025, ZEX PR WIRE, The 16th Global Edition of CYSEC AFRICA is the regi…
Read More

Agentic AI a target-rich zone for cyber attackers in 2025

Blog

At Black Hat USA 2025, CrowdStrike warns that cyber criminals and nation-states are weaponising Gen…
Read More

North Korean IT worker infiltrations exploded 220% over the past 12 months, with GenAI weaponized at every stage of the hiring process

Blog

Terrifying new fronts have emerged in a highly successful employment- fraud scheme in which trained…
Read More

CBE hosts Kenyan delegation to share cybersecurity expertise

Blog

The Central Bank of Egypt (CBE) welcomed on Sunday a high-level delegation from the Central Bank of…
Read More

Passwords of 13 Million Nigerians Leaked as Cybersecurity Gaps Persist, Report Finds

Blog

LAGOS, Nigeria — Despite a recent decline in the number of reported data breaches, Nigeria remains …
Read More

AI LLMs are now so clever that they can independently plan and execute cyberattacks without human intervention — and I fear that it is only going to get worse

Blog

(Image credit: Getty Images) Researchers recreated the Equifax hack and watched AI do everything wi…
Read More

Mali charges ex-prime minister over social media post

Blog

Moussa Mara’s trial for undermining the credibility of the state has been scheduled for Septe…
Read More

CISA roasts unnamed critical national infrastructure body for shoddy security hygiene

Blog

CISA is using the findings from a recent probe of an unidentified critical infrastructure organizat…
Read More

SonicWall firewall devices hit in surge of Akira ransomware attacks

Blog

SonicWall firewall devices have been increasingly targeted since late July in a surge of Akira rans…
Read More
Close