After suffering a data breach for over two months, Cell C confirms that the stolen data has...
On par with economic and financial challenges, cyber threats are significant enough to cause small and medium-sized...
Attackers keep exploiting external remote services like firewalls and VPNs, as 56% of all MDR and IR...
A critical authentication bypass flaw affecting CrushFTP has been added to the U.S. Cybersecurity and Infrastructure Security...
Kenya’s High Court has ruled that Meta, Facebook’s parent company, can be sued in Kenya for allegedly...
Let’s face it—there are some API security questions that your team is too scared to ask. Not...
Google has announced a new experimental AI model called “Sec-Gemini v1” to streamline workflows for cybersecurity defenders...
The Lagos State Police Command has arrested four individuals suspected of being involved in cybercrime activities after...
It is a no-brainer that email is one of the most used communication platforms in the world....
According to Check Point State of Cybersecurity Report 2025, FakeUpdates was the most prevalent malware in the...