New ransomware using BitLocker to encrypt data SMART Estate Security 2024, Technews Publishing, Residential Estate (Industry) Kaspersky has identified ransomware attacks using Microsoft’s BitLocker to attempt encryption of corporate files. It can detect specific Windows versions and enable BitLocker according to those versions.
Create order from chaos Securex 2024 The task of managing and interpreting vast amounts of data is akin to finding a needle in a haystack. Cyberthreats are growing in complexity and frequency, demanding sophisticated solutions that not only detect, but also prevent, malicious activities effectively.
Trend Micro launches first security solutions for consumer AI PCs Securex 2024, News & Events Trend Micro unveiled its first consumer security solutions tailored to safeguard against emerging threats in the era of AI PCs. Trend will bring these advanced capabilities to consumers in late 2024.
Kaspersky finds 24 vulnerabilities in biometric access systems Securex 2024, Technews Publishing Customers urged to update firmware. Kaspersky has identified numerous flaws in the hybrid biometric terminal produced by international manufacturer ZKTeco, allowing a nefarious actor to bypass the verification process and gain unauthorised access.
Responsible AI boosts software security Securex 2024 While the prevalence of high-severity security flaws in applications has dropped slightly in recent years, the risks posed by software vulnerabilities remain high, and remediating these vulnerabilities could hinder new application development.
AI and ransomware: cutting through the hype Securex 2024, AI & Data Analytics It might be the great paradox of 2024: artificial intelligence (AI). Everyone is bored of hearing it, but we cannot stop talking about it. It is not going away, so we had better get used to it.
NEC XON shares lessons learned from ransomware attacks May 2024, NEC XON, Editor's Choice NEC XON has handled many ransomware attacks. We've distilled key insights and listed them in this article to better equip companies and individuals for scenarios like this, which many will say are an inevitable reality in today’s environment.
iOCO collaboration protection secures Office 365 Securex 2024, Infrastructure The cloud, in general, and Office 365, in particular, have played a significant role in enabling collaboration, but it has also created a security headache as organisations store valuable information on the platform.
Cybercriminals embracing AI May 2024, Security Services & Risk Management Organisations of all sizes are exploring how artificial intelligence (AI) and generative AI, in particular, can benefit their businesses. While they are still figuring out how best to use AI, cybercriminals have fully embraced it.
A strong cybersecurity foundation SMART Surveillance 2024, Milestone Systems The data collected by cameras, connected sensors, and video management software can make a VMS an attractive target for malicious actors; therefore, being aware of the risks of an insecure video surveillance system and how to mitigate these are critical skills.
Surveillance and cybersecurity SMART Surveillance 2024, Cathexis Technologies Whether your business runs a security system with a handful of cameras or it is an enterprise company with thousands of cameras monitoring sites across a multinational organisation, you must pay attention to cybersecurity.
Cyber-armour for a healthcare industry under attack May 2024, NEC XON, Healthcare (Industry) Malicious actors have exploited compromised credentials, a clear and present danger when healthcare providers' reliance on remote access software allows adversaries to disguise themselves as legitimate users and gain unauthorised access to critical environments.
Cybersecurity and AI April 2024, AI & Data Analytics Cybersecurity is one of the primary reasons that detecting the commonalities and threats of what is otherwise completely unknown is possible with tools such as SIEM and endpoint protection platforms.
What are MFA fatigue attacks, and how can they be prevented? April 2024 Multifactor authentication is a security measure that requires users to provide a second form of verification before they can log into a corporate network. It has long been considered essential for keeping fraudsters out. However, cybercriminals have been discovering clever ways to bypass it.
SA's cybersecurity risks to watch April 2024 The persistent myth is that cybercrime only targets the biggest companies and economies, but cybercriminals are not bound by geography, and rapidly digitising economies lure them in large numbers.
Cyber insurance a key component in cyber defence strategies April 2024 [Sponsored] Cyber insurance has become a key part of South African organisations’ risk reduction strategies, driven by the need for additional financial protection and contingency plans in the event of a cyber incident.
Deception technology crucial to unmasking data theft March 2024, Security Services & Risk Management The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.
Data security and privacy in global mobility March 2024, Security Services & Risk Management Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.
Sophos celebrates partners and cybersecurity innovation at annual conference March 2024, News & Events [Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.
The CIPC hack has potentially serious consequences March 2024, Editor's Choice A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.