Sophos MSP Elevate

Sophos Accelerates Business Growth and Profitability for MSPs with the Launch of MSP Elevate Program

…Program Provides MSPs with Exclusive Solution Access, Discounts, Rebates and Training to Deliver Unmatched Cybersecurity Defenses with the Sophos Central Platform Sophos, a global leader of innovative security solutions for defeating cyberattacks, today launched MSP Elevate, a new business-accelerating program for managed service providers (MSPs). With the new program, Sophos enables MSPs to expand their business with…

cyber security

Check Point Software Technologies urges Nigeria’s strategic oil and gas industry to beef up its cyber security

Massive potential cost to economy if current cyber security measures fail •An organization in Nigeria is being attacked on average 3759 times per week in the last 6 months, compared to 1854 attacks per organisation globally. • The top malware in Nigeria is Expiro. •The top malware list in Nigeria includes 3 Botnets, 1 Downloader…

malware

April 2025’s Most Wanted Malware: FakeUpdates Leads Again as Advanced Campaigns Weaponize Commodity Malware

Eight African countries among the Top 20 most targeted by malware campaigns; education sector remains top target globally Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading AI-powered, cloud-delivered cyber security platform provider, has published its Global Threat Index for April 2025. FakeUpdates remains the most prevalent malware this month, impacting 6% of organizations globally,…

cloud security

Avoiding cloud security blind spots in a hybrid IT world

The acceleration of cloud adoption has brought with it new security challenges for organisations to tackle, particularly pertaining to hybrid and multi-cloud environments. Here, a common security misstep is the persistent confusion around who is responsible for what in the cloud. This oversight can open the door to serious vulnerabilities, especially when it comes to…

Sophos warning about Chinese Cars

Sophos Warns of the Risk of Data Theft as Chinese Cars Flood France

The recent success of the Shanghai Motor Show is a strong indicator of the growth of the Chinese automotive sector, particularly in terms of electric cars and onboard intelligence. Of the 90 million vehicles (cars, trucks, and buses) produced worldwide in 2024, 31.3 million were produced in China, i.e., 34% of the global total, according…

AI Security Report

Check Point Research Launches AI Security Report: Exposing the Rise of AI-Powered Cybercrime and Defenses

New report unveils four key AI-driven cyber threats and how organisations can outsmart attackers in an AI-driven world Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today launched its inaugural AI Security Report at the RSA Conference 2025 in San Francisco, California. This report offers an in-depth exploration of how…

password, world password day

May 1, 2025 is World Password Day: Why It’s Time to Say Goodbye to Passwords

Each year on the first Thursday of May, cybersecurity professionals urge the public to strengthen their password hygiene. But in 2025, this tradition may be past its expiry date. Why? Because our over-reliance on passwords is becoming the very risk we seek to avoid. According to Verizon’s Data Breach Investigations Report (2024), 81% of breaches…

Lotem Finkelsteen- cybercrime

Check Point Research Launches AI Security Report: Exposing the Rise of AI-Powered Cybercrime and Defenses

New report unveils four key AI-driven cyber threats and how organisations can outsmart attackers in an AI-driven world Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cybersecurity solutions, today launched its inaugural AI Security Report at the RSA Conference 2025 in San Francisco, California. This report offers an in-depth exploration of how cyber…

cybersecurity
|

AI and Cybersecurity: Balancing Innovation with Caution

Undoubtedly one of the most influential technologies in recent decades, the ascent of artificial intelligence has produced a mixture of reactions from individuals, organisations, and countries. Eyes widen as we explore its potential, concerns grow as it threatens jobs, and conversations take place at a global level on how it should be regulated. However, for…

Kaspersky Cyber Immunity

Cyber Immunity recognised by 73% of experts in South Africa as a promising strategy against cybercriminals

At GITEX Asia 2025, Kaspersky has revealed findings from its latest research, stating that 73% of cybersecurity professionals in South Africa regard Cyber Immunity as an effective strategy for minimising the capabilities of cybercriminals to penetrate networks and compromise systems. These insights indicate a growing demand for developing secure by design systems instead of relying…

Check Point Research

Check Point Research Unveils Q1 2025 Brand Phishing Trends: Microsoft Dominates as Top Target, Mastercard Makes a Comeback

Technology and Social Networks Remain Top Imitated Brands in Phishing Attacks, Emphasising the Importance of Enhanced Security Measures Check Point Research (CPR), the Threat Intelligence arm of Check Point® Software Technologies Ltd. (NASDAQ: CHKP) and  a pioneer and global leader of cyber security solutions, has released its latest Brand Phishing Ranking for Q1 2025. This report highlights the brands…

Kaspersky

Be a doll: Mind cyber security and privacy when creating a fun image of yourself, warns Kaspersky

As the latest social media trend sees users jumping on the AI Action Figure craze by uploading personal information and photos to generate hyper-realistic AI dolls or action figures of themselves, Kaspersky urges individuals to be cautious about the personal information they share online. The trend, while entertaining, raises concerns about data privacy and digital…

NETSCOUT Threat Intelligence Report

Latest NETSCOUT Threat Intelligence Report Reveals Diverse DDoS Threats Across Southern Africa 

The newly released NETSCOUT Threat Intelligence Report for July to December 2024 reveals a complex and contrasting distributed denial of service (DDoS) attack landscape across southern Africa. According to the report, South Africa, Mauritius and Angola were among the most heavily targeted nations over the second half of last year, while countries like Zambia, Eswatini and Zimbabwe experienced…

Cybersecurity Training

Request for Applications: Youth Cybersecurity Training in West and Central Africa

The United Nations Development Programme (UNDP), Concordia University, and the Give1Project are looking for 150 youth from West and Central Africa to participate in the second cohort of the Regional Cybersecurity Training program. The program, which began in 2023 with a trial group of 22 young people, is now growing to teach 150 new cybersecurity…

Mart Networks

Mart Networks Partners Infopercept to Bring Comprehensive Cybersecurity Solutions to Africa

…The Solutions Include the Threat Exposure Management Platform, Invinsense OXDR, and the Compliance Management Platform, Invinsense GSOS Mart Networks Group, a leading value-added distributor with a presence in the Middle East and Africa, has announced a distribution partnership with Infopercept, a leading platform-led managed security services company. Under this agreement, Mart Networks will serve as…

healthcare sector

Cyber criminals bypass code of ethics with concerted attacks on the world’s healthcare sector 

South Africa’s healthcare sector weakened by underfunding, lack of skills and fragmented infrastructure “There was a time when cybercriminals held off from attacking the world’s healthcare institutions for reasons of ethics.  But no more,” says Shayimamba Conco, Cyber Security Expert at Check Point Software Technologies, a global leader in cyber security solutions. Conco comments come…

Nigeria Data Protection Commission

Nigeria Chairs Anglophone Countries Committee of African Data Protection Authorities

Dr. Vincent Olatunji, National Commissioner/CEO of the Nigeria Data Protection Commission, has been appointed the Chair of the Anglophone Countries Committee of the Network of Africa Data Protection Authorities (NADPA). This appointment was confirmed at the meeting of the Committee on Wednesday, 2nd April, 2025. The Committee serves as a multilateral platform for promoting data…

pdf

Hiding in Plain Sight: The Stealthy Attack Chain of PDF Files

The Weaponisation of PDFs : 68% of Cyberattacks begin in you inbox, with 22% of these hiding in PDFs Over 400 billion PDF were opened last year, and 16 billion documents were edited in Adobe Acrobat.  Over 87% of organisations use PDFs as a standard file format for business communication, making them ideal vehicles for…

Kaspersky Cyber Immunity

Advanced persistent threats target one in four companies in 2024, according to Kaspersky

According to the latest Kaspersky Managed Detection and Response (MDR) analyst report, advanced persistent threats (APTs) have been detected in 25% of companies, accounting for over 43% of all high-severity incidents. This marks a staggering 74% increase compared to 2023. The annual Managed Detection and Response (MDR) analyst report provides insights based on the analysis…

insurance

Survey: 78% of insurance execs say closing $1.8 trillion protection gap is an ethical obligation

More than 500 insurance leaders weigh in on risks, opportunities and trends to watch through 2040 The global protection gap – the difference between insured and uninsured losses across life, health, natural catastrophe and crop insurance – was last estimated at $1.8 trillion. A new “future of insurance” survey of more than 500 insurance executives from 17…

National Cybersecurity Architecture.

Nigeria partners UK on building resilient National Cybersecurity Architecture

Plans are underway towards building a United Kingdom/Nigeria National Cybersecurity Architecture.   The UK/Nigeria Inward Cyber Trade Mission is to be facilitated by the National Information Technology Development Agency (NITDA). Director-General National Information Technology Development Agency NITDA,Kashifu Inuwa CCIE at the meeting with some UK delegates on Monday in Abuja, said that President Bola Tinubu was…

DDoS Attacks

DDoS Attacks at the World Economic Forum (WEF)

Between January 20 and 24, the town of Davos-Klosters, Switzerland hosted the annual World Economic Forum (WEF). Among the key highlights drawing media attention were several special addresses by prominent political figures. NETSCOUT’s ASERT team of engineers and researchers specialising in information security observed an increased volume of distributed denial of service (DDoS) attacks shortly before and during at…

NDPC

NDPC Obtains NJI’s Support for the Right to Data Privacy In Nigeria

In line with its objective of safeguarding the data privacy rights of Nigerians, the Nigeria Data Protection Commission (NDPC) has secured the support of the National Judicial Institute (NJI). It will be recalled that the NJI is responsible for the training of judicial officers in Nigeria from magistrate courts to the Supreme Court of Nigeria….

Sophos and Pax8

Sophos and Pax8 Announce Strategic Partnership to Streamline Security Management

…Sophos’ Portfolio of Cybersecurity Solutions is the Most Comprehensive Security Offering on the Pax8 Marketplace  Sophos, a global leader of innovative security solutions for defeating cyberattacks, today announced a strategic partnership with Pax8, the leading cloud commerce marketplace. The collaboration introduces the most comprehensive portfolio of cybersecurity solutions available to Pax8’s network of more than 40,000 managed service…

FakeUpdates

January 2025’s Most Wanted Malware: FakeUpdates Maintains Stronghold in Cyber Security Threat

FakeUpdates continues to facilitate ransomware attacks while cybercriminals enhance their capabilities with AI-powered techniques  Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, has released its Global Threat Index for January 2025, which highlights FakeUpdates continued threat in the cyber landscape, playing a crucial role in facilitating ransomware attacks. In…

Kaspersky Threat Lookup

Kaspersky Threat Lookup now enables AI-enhanced open-source intelligence search

Kaspersky Threat Lookup now provides customers with summaries and article abstracts related to analysed objects in the OSINT (Open-Source Intelligence) tab, saving them time when searching for IoCs (Indicators of Compromise) or researching cybersecurity reports. Managing security operations workload can be a daunting task for cybersecurity teams. According to Enterprise Strategy Group’s XDR and SOC…

Cyber Security

Breaking (Fire)Walls & Glass Ceilings: Women Leading Digital Revolution and Cyber Security’s Next Frontier

Cyber security is at the heart of today’s digital revolution, yet it remains one of the most male-dominated sectors in science and technology. Data from Zippia shows that while women hold 48% of roles in the broader workforce, they represent only 24% of the cyber security workforce.In leadership, the numbers are more or less similar — just 16%…

manufacturing sector

Securing Africa’s manufacturing sector against cybercrime

Connectivity and automation have undeniably revolutionised the manufacturing sector, boosting efficiency and productivity. However, they have also introduced significant vulnerabilities, leaving the industry increasingly exposed to cybersecurity threats. In fact, recent insights from Datacentrix partner, Check Point revealed that manufacturing emerged as the most impacted by cyberattacks in the third quarter of 2024, with the sector experiencing…

Sophos and Secureworks

Sophos Completes Secureworks Acquisition

Sophos is Now the Leading Pure-Play Cybersecurity Provider of MDR Services  Sophos and Secureworks (NASDAQ:SCWX), two global cybersecurity pioneers that have innovated and redefined services and technology solutions for defeating cyberattacks, Monday announced the completion of Sophos’ acquisition of Secureworks. The all-cash transaction values Secureworks at approximately $859 million. With the completion of the acquisition, Secureworks’ common stock has…

AI artificial intelligence,
|

Gaps in cyber protection leave businesses vulnerable to AI-enhanced threats, Kaspersky study finds

As Artificial Intelligence (AI) reshapes the cybersecurity landscape, organisations worldwide face escalating challenges when protecting against sophisticated AI-powered attacks. Despite understanding the severity of the threat, businesses are struggling to keep pace with the rapid evolution of cybercrime. Barriers such as skill shortages, lack of AI-powered tools, and the complexity of managing advanced cybersecurity infrastructures…