Breaking News

Vulnerabilities

Cyber Attacks

Africa

Magazine

Cyber security Zimbabwe

Cyber Security South Africa

Cyber Security Botswana

Cyber Security Ghana

Cyber Security Tools and Softwares

Latest Posts

View All Posts
Cyber Attacks

Crypto Payment Firm Transak Hit by Data Breach After Em...

Transak, a leading crypto payment services provider, has been affected by a sign...

Magazine

Cybercrime In South Africa 2024: Deepfakes On The Rise

This week in cybersecurity from the editors at Cybercrime Magazine – Read The Fu...

Cyber Attacks

Hackers Mimic As ESET To Attack Organizations With Wipe...

Hackers impersonated ESET, a prominent cybersecurity firm, to attack organizatio...

Cyber Attacks

Hackers Mimic As  ESET To Attack Organizations With Wip...

Hackers impersonated ESET, a prominent cybersecurity firm, to attack organizatio...

Cyber Attacks

Internet Archive Breached Again, Hackers Exploited Unro...

The Internet Archive has fallen victim to another cyberattack, marking the third...

Cyber Attacks

Cisco Investigating Cyber Security Incident, Takes DevH...

Cisco, has launched an investigation into a potential cyber security incident an...

Cyber security Zimbabwe

Zimbabwean Government Enforces Data Protection Act, Int...

Harare, Zimbabwe - In a move to strengthen data privacy and security, the Zimbab...

Magazine

Cybersecurity 101: Common cyber threats and online safe...

This week in cybersecurity from the editors at Cybercrime Magazine – Read The Fu...

Cyber Attacks

What is Lumma Stealer: Technical Details and Recent Fak...

Lumma Stealer, also known as LummaC2, is a widely known malware that first surfa...

Cyber Attacks

ANY.RUN’s Upgraded Linux Sandbox for Fast and Secure Ma...

ANY.RUN upgraded its Linux sandbox with features to enhance malware analysis. It...

Magazine

Whitelisting Is Like Having A Bouncer At Your Door

This week in cybersecurity from the editors at Cybercrime Magazine – Read The Fu...

Cyber Attacks

Microsoft Customers Facing 600M+ Cyber Attacks Every Day

Cybersecurity analysts at Microsoft recently discovered that their customers fac...

12