CYBER SECURITY

Cyber security news updates and tips on why it is critical for an enterprise to utilize cybersecurity best practices to avoid common cyber security threats.

Safaricom ups the game against fraud

Safaricom has today unveiled its new plans for tackling fraud activities on its platforms. Kenya’s largest telco reported that through the implementation of their...
Mozilla Firefox

You Have To Update Your Firefox Browser Now

A zero-day attack has hit the Firefox browser. If you run either Firefox 67.0.3 and Firefox ESR 60.7.1 or maybe you’re not sure on...

Telegram blames China for DDos attacks

Durov the founder and owner of secure messaging platform Telegram has reported the app has been hit by gazillions of "Garbage requests" that stopped...

Sophos Acquires Rook Security to Provide Managed Detection and Response

Sophos, today announced that it has acquired Rook Security, a pioneer and leader in managed detection and response (MDR) services. Rook Security provides a...
Sophos Intercept X

Sophos launches Intercept X for Server with EDR to help businesses battle new blended...

EndPoint security leader Sophos has today announced that it is launching Intercept X for Server with Endpoint Detection and Response (EDR) to help businesses...

Someone is buying a malware-loaded laptop for $1.345 million

If you thought the world is crazy-it’s not but people are. Last week a laptop loaded with malware for auctioned at an asking price...
Google for Startups Accelerator Africa

Google stored plaintext passwords for a subset of G-Suite users since 2005

To say that our online data is secure on any website on the internet is a mere hoax. However, companies have at least developed...
google 2FA challenge

Google: 2FA blocks 100% of automated bot attacks

Think 2FA is a joke? This post is for you. The new research done by Google is something you should know. Google earlier this year...
Kaspersky Lab

Kaspersky Lab is setting up a new office in Kigali

Kaspersky Lab is opening a new office in Kigali, Rwanda. The cybersecurity and antivirus provider has announced plans to set up the new office...
Truecaller

Truecaller user data selling on the dark web for over KES 200,000

TrueCaller Indian user data has been seen selling on the dark web for over KES 200,000. The data, according to a report is that...
[Column] Data Security; embracing autonomy and intelligent machines

[Column] Data Security; embracing autonomy and intelligent machines

By Christine Ambetsa, Regional Applications Sales Leader - East Africa at Oracle CIOs are operating in a state of heightened awareness. Their mission-critical systems are...
WhatsApp app

WhatsApp voice call feature used by attackers to inject malicious spyware

On Monday, WhatsApp, a Facebook-owned instant messaging service, has reported the existence of vulnerabilities that allowed hackers to spy on its users. WhatsApp reported that...

MTN unveils Managed Security as a service solution for Kenyan enterprises

MTN Business has today launched MTN Managed Security as a service solution for its enterprise customers in Kenya. The product, according to MTN aims...
Cybercriminals Attack Cloud Server Honeypot Within 52 Seconds of going live, Sophos Report

Cybercriminals Attack Cloud Server Honeypot Within 52 Seconds of going live, Sophos Report

Cybercriminals attacked one of the cloud server honeypots within 52 seconds of the honeypot going live in Sao Paulo, Brazil. This is according to...
Fake mobile applications exposing Kenyans to cyber fraud, CA Report

Fake mobile applications exposing Kenyans to cyber fraud, CA Report

A proliferation of mobile applications on popular online stores is exposing Kenyans to increased cyber-attacks and fraud, the latest sector statistics report by the...
facebook

Facebook stored up to 600 million user passwords in plain text

By now you have probably heard of the scary news of how Facebook stored millions of user’s passwords in plain text. The news was...
Sophos Intercept X

Sophos Intercept X Achieves Highest Security Effectiveness Score in NSS Labs 2019 Advanced Endpoint...

Sophos announced that its next-gen endpoint solution, Sophos Intercept X, was recognized for having the highest security effectiveness and the most efficient TCO (total cost...
Sophos Intercept X

Sophos Central Management Platform Now Features All Next-Gen Cybersecurity Protection from Sophos

Addition of Sophos XG Firewall provides advanced Synchronized Security capabilities for accelerated response to cyberattacks from a single cloud-based management console

Matrix Deconstructed: The trend for targeted ransomware continues

Endpoint security leader Sophos has released a new report  about a new ransomware family called Matrix. The malware has been operating since 2016 and Sophos...

5 Security Tips To Protect Your Website From Hackers

Most websites right now are using online marketing, and many people claim hackers can’t affect their site. That’s when you lower your guard, and...

Creditinfo new solution to combat synthetic identity fraud for Kenyan mobile lending market

Creditinfo has launched a new Integrated anti-fraud solution to combat identity fraud for the Kenyan mobile lending market. According to the credit information and risk...

‘Collection #1’ data breach leaks more than 700M email addresses

In what has been described as one of the largest data breach in history, the Troy Hunt owned Have I Been Pwned? (HIBP) website...

Safaricom Introduces I.T Security Solutions For its Enterprise Customers

The services include Managed Security Solutions, Security Assurance and Advisory services as well as Managed Security Operations Center solutions and will enable the customers to access a wide range of security solutions to protect their information technology (I.T) systems.

CA is warning of Emotet malware targeting local network systems

The Communications Authority of Kenya (CA), has warned of a new malware targeting network systems in the country. Known as ‘Emotet’, CA through the...

Cryptojacking shows no signs of slowing down in 2019, says ESET

Cases of cryptocurrency mining and cryptojacking will continue to grow in 2019, as attackers target smart devices and home assistants to build cryptomining farms,...
Sophos Intercept X

Sopho adds Lateral Movement Protection to XG Firewall to prevents threats from spreading

Sophos has now included lateral movement protection to prevent targeted, manual cyberattacks or exploits from infiltrating further into a compromised network. According to the SophosLabs...

More collaborative efforts required to fight mobile money fraud and cyber crime, says DPP

The Director of Public Prosecution Noordin Haji has called on all stakeholders in financial institutions and banking sector to work together to strengthen the fight against mobile...

Sophos warns of more SamSam ransomware copycat attacks in 2019

Instead of using mass spamming techniques to blast malware to millions of recipients in the hope of collecting thousands of dollars each from thousands...

Sophos Adds Endpoint Detection and Response to Intercept X Advanced

Sophos today launched the latest addition to its endpoint solution portfolio, Intercept X with EDR.  Powered by Sophos’ deep learning neural network, which is...

Sophos 2019 Threat Report unveils the rise of the hand-delivered, targeted

Sophos has launched its 2019 Threat Report providing insights into emerging and evolving cybersecurity trends. The report, produced by SophosLabs researchers, explores changes in the threat landscape...

Report: WannaCry is still alive hitting almost 75,000 users in Q3 2018

One and a half years after its epidemic, WannaCry ransomware tops the list of the most widespread cryptor families and the ransomware has attacked...

SIM swap fraud is now global threat, says Myriad Connect

SIM swap fraud has plagued mobile users across Africa for years, with Myriad Connect’s recent survey in Kenya revealing that over 90% of Kenyan...

Five steps to evaluating a DDoS managed service provider

The news that the Southern African Department of Labour was recently able to foil a distributed denial of service (DDoS) attack on one...

ESET East Africa receives Cyber Security Company Of The Year award

ESET East Africa has been voted the Cyber Security Company of the year at the 2018 Digital Inclusion Awards (DIA). ESET that specialises in the...

IT Leadership: Preventing your network from becoming a Botnet

By Harish Chib, vice president, Middle East & Africa, Sophos Botnets are large volumes of distributed networked computers and devices that have been taken over by...
Cybercriminals Attack Cloud Server Honeypot Within 52 Seconds of going live, Sophos Report

More than 40% of ICS computers were attacked in H1 2018

More than 40% of all industrial control system (ICS) computers protected by Kaspersky Lab solutions were attacked by malicious software at least once during...

Shippers get serious about Cyber Threat

Major attacks like the NotPetya malware incident have been a wake-up call for the shipping sector, creating a renewed urgency around tackling the threats...

SamSam: The new ransomware that has raised ransom demands of almost $6 million

Network and endpoint security leader Sophos has uncovered a new ransomware which it claims has raised vastly more ransom demands of almost of $6...
Sophos Intercept X

Sophos introduces Sophos Intercept X for Server To Protect Businesses Against Cyber Threats

Sophos has today announced Sophos Intercept X for Server, its next-generation server protection with predictive deep learning technology that provides constantly evolving security against...

Cisco 2018 Annual Cybersecurity Report: Organisations now investing in Machine Learning and AI...

Security leaders are increasingly relying on tools that use AI and machine learning to defend against cybersecurity threats. This is according to the Cisco...

Something Phishy: How to Identify and Avoid Phishing Scams

By Harish Chib, VP MEA Sophos. Phishing is one of the most common attack vectors for hackers who exploit end-user behavior as the weakest link in...

Is your network ready for GDPR and PoPI?

Over recent years, distributed denial of service (DDoS) attacks have become one of the biggest cyber-security headaches for CIOs and CSOs. Each year, these...
Cybercriminals Attack Cloud Server Honeypot Within 52 Seconds of going live, Sophos Report

Be cyber-savvy: Employees should not be secondary to technology

“Our employees are our greatest asset” is a phrase that continues to be published far and wide in a plethora of company profiles, human...

The war on cybercrime – why all Kenyan organisations need to play their part

By Brian Pinnock, Mimecast Africa and the Middle East Cyberattacks in Kenya are on the rise. There’s barely a day that goes by where you...
Cybercriminals Attack Cloud Server Honeypot Within 52 Seconds of going live, Sophos Report

SMEs Should Partner with Cyber Security Specialists to Prevent Loss of Billions

Imagine waking up one beautiful Monday only to realize that your website has been hacked. Your online accounts, your most precious work and even...

Enlisting blockchain technology in the war against DDoS onslaughts

Distributed Denial of Service (DDoS) attacks are certainly on the rise. Arbor’s 13th Annual Worldwide Infrastructure Security Report showed that 33 percent of surveyed...

Businesses at risk due to unidentified network traffic according Sophos Global Survey

IT managers from mid-sized businesses cannot identify 45 percent of their organization’s network traffic.  In fact, nearly one-in-four cannot identify 70 percent of this...

Egypt Launches Digital Forensic Lab to combating software piracy.

The government of Egypt has announced that it is setting up a specialized digital forensic lab for Intellectual Property as part of its enforcement...

Artificial Intelligence: Your Bot Will See You Now

Next time you contact your insurer there is a good chance that you will be dealing with Artificial Intelligence (AI). Insurers are starting to...

DDoS in the cloud: who’s watching your back?

Cloud computing is seeing a steady and undeniable  growth in adoption across all types of industries. Growing just as progressively, however, is the extent to...

Porn on the move: In 2017, over 25% of users hit by mobile malware...

In 2017, 25.4% of mobile users who encountered malware - over 1.2 million people - were attacked by malicious programs that used adult content...

3 ways you can keep yourself and your devices protected

Connecting to the Internet today has become a norm for most of us, as we enjoy the convenience of public Wi-Fi, using smartphones to...

Opinion: Cloud computing evolves, becomes enterprise cloud-as-a-service

Over the past two decades or so, the concept of cloud computing has evolved dramatically, as new data centre and networking technologies came to...

Opinion: Of banks and cybersecurity

If there’s one industry we should be most concerned about when it comes to cyber criminals and security, it’s the one that looks...

5 Ways to Secure Your Identity in the Data Breach Era

By Patrick Rono, Security Technical Professional- IBM East Africa With major cybersecurity incidents dominating headlines for the past several years, consumers are well aware of...

User lock-down or education? Just one of today’s cybersecurity issues in a rapidly evolving...

According to the recent PwC report, The Global State of Information Security Survey 2018, companies around the globe are becoming more reliant on cyber...

National Bank of Kenya loses Ksh.29 Million to hackers.

The National Bank of Kenya has lost about Ksh.29 million to hackers. The hacking incident is said to have happened on Wednesday 17th. “We...

New Multi-featured Mobile Trojan Loapi Discovered

Kaspersky Lab researchers have identified a new intriguing malware with multiple modules, which allows for an almost endless number of malicious features - from...

Opinion: Taking enterprise security to the board

It’s that time of year, again, with many companies busying themselves in the art of budgeting and forecasting for 2018. In some companies, this means...

ESET Releases 2018 Report: Predicts Trends in Cybersecurity

Global cybersecurity services leader ESET has warned that the ransomware menace is likely to continue into 2018 with further growth in incidents and risks...

Female Journalists in Kenya to be trained on online safety

With more users now spending time online, the ways they can get compromised on the internet have gotten more numerous and sophisticated. From phishing...

Opinion: Preparation is key when defending against DDoS attacks

By Bryan Hamman, Arbor Networks territory manager for Sub-Saharan Africa If you are well prepared with your security systems – deployed in a holistic manner...

“Beware of BadRabbit” Sophos warns against new ransomware strain

Network and endpoint security leader Sophos has warned against a new ransomware strain known as BadRabbit targeting consumers and businesses. BadRabbit is among the strains of ransomware that users...

Personal Cyber Security:How To Protect Yourself From Cyber Criminals

The Importance of Online Security (Personal Cyber Security) Online security has never been more important both for business or individual persons. There are millions of...

Sophos expands its partner program to enables partners to secure Cloud platforms

Sophos is expanding its Partner Program for its channel partners to now training, certification and financial incentives that will help them support customers using...

French firm OT-Morpho says IEBC voting system was not hacked

OT-Morpho has dismissed claims that the electronic system it supplied to the Independent Electoral and Boundaries Commission (IEBC) to biometrically identify voters during Kenya’s...

The Mobile Revolution And The Struggle For Identity In The Digital Age

By Eugene Muhando (@e_muhando), Nairobi. Life is a mystery, so we are told. Just take an adventure and realize the beauty of discovering something new....

Android Security: Mobiles Phones Spying is it Legal or not?

Smart phone is an individual’s property and it contains most personal and private data of a person. Every person has legal right to secure...

‘Excellent Job, Thanks’: You May Never Know about the Cybersecurity Incidents Caused by Your...

Employees hide IT security incidents in 40% of businesses around the world, that’s according to a new report from Kaspersky Lab and B2B International,...

Don’t be a sitting duck against #IoT threats

As the Internet of Things (IoT) continues to gain traction, organizations will have to reassess their security practices to accommodate the increase in security...

ESET issues malware alert for Android phone users

Internet security company ESET East Africa has issued an alert to mobile phone users running on the Android platfom to be wary of alternative...
As much as 70 percent of IoT devices comprise security flaws, which means devices that you own could get hacked by online criminals too.

NukeBot trojan threatens to steal details of customer online banking transactions

Kaspersky Lab researchers have detected NukeBot, a new malware which has been designed to steal the credentials of online banking customers. Earlier versions of...

Cyber Security and The Impending Era of Connected Devices

By Jacob Haney One of the major problems that we see with the sudden boom in connected devices is that information security systems are not...

3 differences between Petya and WannaCry Ransomware

How the cyberattacks differ and what it means for ransomware security The world has recently come under attack from not one but two separate globe-trotting...

The importance of securing Data Centres in the digital age.

Despite the advantages that emerging technologies bring organisations, decision-makers need to realise that data remains the key behind business success. Riaan Badenhorst, General Manager,...

Key Signs To Watch Out For To Know If You’re Being Scammed Online

These days pretty much everyone is on the internet, unfortunately, not everyone is a good person. Online scammers are prevalent all over the web,...

Sophos warns internet users against Petya Ransomware outbreak

Many any organizations in Europe and the US were last week crippled by yet another ransomware attack known as “Petya”. This is the second...

Infographic: Understanding the WannaCry Ransomware

It is the name for a prolific hacking attack and known to be “Ransomware”, that holds your laptop surety till you pay a ransom....

ESET announces free online cybersecurity training for businesses in Kenya

Internet security company ESET East Africa has announced the availability of free cybersecurity training for businesses and their employees in Kenya. The ESET Cybersecurity Awareness...

The annual CIO East Africa Security Summit kicks off in Nairobi

CIO East Africa in conjunction with the International Data Group (IDG), yesterday held its second annual Africa Security Summit at the Norfolk Hotel, Nairobi....

New Kaspersky Embedded Systems Security for ATMs and POS Terminals Closes Major Security and...

With the tactics of cybercriminals becoming ever more sophisticated, and with regulatory pressures also mounting, financial enterprises are up against increasing hurdles when it...

Uiwix Ransomware Ain’t a New Version of WannaCry!

Chinese government authorities have warned against a new ransomware named "Uiwix", which is tested in the wild.  This new ransomware is lethal in its...

Hajime malware is affecting the Internet of Things devices worldwide

Kaspersky Lab has published the results of its investigation into the activity of Hajime – a mysterious evolving Internet of Things (IoT) malware that...

ESET supports call for standardized cybersecurity breach reporting

Internet security company ESET East Africa has added its voice to the call for legislation to compel organizations to share or release information to...

Sophos says its XG firewall is secure from WannaCry Ransomware

Security firm Sophos has issued a detection update for its customers after the WannaCry ransomware attack last week on Friday. The malware is reported...

Government computers and networks were not affected during global WannaCry Ransom attack, Mucheru

Following the recent WannaCry Ransom attack that hit the world on Friday, May 14, the Ministry of Information and Technology has moved to reassure...

Global Wannacry Ransomware Attack – Infographic

Ransomware WannaCrypt makes you cry? Struggling to survive from this large-scale cyber attack? This inforgraphic below lets you understand the history of WannaCrypt virus...

Kaspersky Lab Presents Cybersecurity Trends in the META Region

Kaspersky Lab brought together company experts, journalists and business guests from the Middle East, Turkey, and Africa for its annual Cyber Security Weekend that...

Sophos Server Protection products now optimized with CryptoGuard Technology

IT security firm Sophos has announced that its next-generation anti-ransomware 'CryptoGuard' technology is now available with its ‘Sophos Server Protection’ products. With this optimization,...

ICT CS Joe Mucheru urges private sector to boost investment in cybersecurity

ICT Ministry Cabinet Sectretary Mr. Joe Mucheru, has urged the private sector to bolster investment in cybersecurity to curb the growing incidences of cybercrime...

Kenyan companies accruing massive losses amidst rising cyberattacks

Banks have become the leading target of cybercrime as people increasingly adopt the use of financial technology. In fact, according to Serianu’s Cybersecurity Report...

Kenya Commercial Bank barred from using its banking software over piracy

Kenya Commercial Bank (KCB) Group has been barred from using a core banking software over IP infringement and software piracy.  This is after Nagalakshmi...

Nokia malware report reveals new all-time high in mobile device infections and major IoT...

The latest Threat Intelligence Report by Nokia has revealed a new all-time high in mobile device malware infections, a sharp increase in compromised smartphones and...

ESET signs M.O.U with @iLabAfrica centre to fight cybercrime in Kenya

Internet security company ESET East Africa has signed a memorandum of understanding (M.O.U) with Strathmore’s @iLabAfrica aimed at enhancing the fight against cybercrime in...

Banks expenditure on IT Security is 3x Higher than Non-Financial Organisations

Financial institutions are under pressure to ramp up security, with trends such as the increased take-up of mobile banking putting banks’ IT infrastructure defenses...

Sophos Announces Unified Security and Control solution for Mobile Devices, Laptops and IoT devices

  Sophos has today announced its the latest version of its Enterprise Mobility Management (EMM) solution. Known as Sophos Mobile 7, this new version extends containerization...

Guest Post: Ransomware – Should you pay?

Ransomware, a form of extortion malware is often disguised as innocuous emails, links or pop-ups, thereby easily hoodwinking gullible users to grant access into their...

How secure is your data, really?

More than 554 million data records were stolen during the first half of 2016, a 31% increase from the previous six months – and that...

Banks globally still finding it hard to manage online financial fraud

Banks and payment organizations globally are still finding it difficult to manage online financial fraud in today’s connected and complex technological landscape. This is...

Sophos launches new solution to Combat Low Security Awareness Among End-Users

Sophos has today launched a new advanced phishing attack simulator and training solution to combat low-security awareness among end-users.  Known as Sophos Phish Threat, the...

New Switcher Android Trojan Hacks Routers, Hijacks Traffic to other websites

Kaspersky Lab experts recently uncovered a remarkable evolution in Android OS malware: the Switcher Trojan. The Newly-discovered Trojan uses unsuspecting Android device users as...

CONNECT WITH US

5,406FansLike
1,253FollowersFollow
3,338FollowersFollow

TRENDING

Ngao Credit: How SMEs can benefit from Our Jijenge loan product

The coronavirus pandemic is hitting the global economy hard. While it is hard to exactly tell the extent the damage the virus will have...

24Bit Podcast Episode 23: Are Kenyans Ready for Cashless Matatu Payments?

In this latest episode of our 24Bit podcast, Emmanuel Chenze, Nick Kanali and Dickson Otieno discuss the new upcoming requirement by the NTSA to...

EDITOR'S PICK