Zimbabwe through the Postal and Telecommunications Regulatory Authority of Zimbabwe (Potraz) is considering the development of a...
The compliance risk environment is changing rapidly. Regulatory, legal, and governmental uncertainties, along with geopolitical risks, the...
The National Information Technology Development Agency (NITDA) of Nigeria via an X post issued an advisory against...
In what is described as a politically motivated attack, Morocco’s National Social Security Agency (CNSS) computer systems...
As AI technology continues to advance, it is essential to reassess the risks it poses, particularly regarding...
A sophisticated spam tool called AkiraBot has targeted over 400,000 websites since September 2024, according to SentinelLABS....
After suffering a data breach for over two months, Cell C confirms that the stolen data has...
On par with economic and financial challenges, cyber threats are significant enough to cause small and medium-sized...
Attackers keep exploiting external remote services like firewalls and VPNs, as 56% of all MDR and IR...
A critical authentication bypass flaw affecting CrushFTP has been added to the U.S. Cybersecurity and Infrastructure Security...