Cyber security

Africa Confronts Stronger Threats as Workplace Social Tools Become Attack Vectors

Last year, the global average cost of a cybersecurity breach reached $4.9 million, according to IBM’s 2024 Cost of a Data Breach Report, underscoring how costly cyberattacks remain. Across corporate networks, threat actors are increasingly leveraging consumer platforms—LinkedIn, Facebook, WhatsApp—to deploy malware, harvest credentials, and infiltrate sensitive data by exploiting employees’ social media activity on […]
Read more

Cybersecurity Threats to Healthcare Surge as Check Point Warns of Rising Patient Safety Risks

Healthcare systems across the globe are facing unprecedented levels of cyberattacks, with Africa recording some of the steepest increases in 2025. According to a new report released by Check Point Software Technologies Ltd. (NASDAQ: CHKP) to mark World Patient Safety Day 2025. The report warns that hospitals and clinics are no longer just data targets […]
Read more
2025 Travel Boom Drives Visa Surge, Sparks Scams

2025 Travel Boom Drives Visa Surge, Sparks Scams

The global travel sector is experiencing an extraordinary surge in 2025, with visa applications for destinations worldwide reaching historic peaks. A collaborative report from the World Travel & Tourism Council (WTTC) and VFS Global projects that Africa’s Travel & Tourism industry could add US$168 billion to the continent’s economy and create over 18 million jobs. […]
Read more
Cyberattack Fallout - One Breach Can Destroy Your Business

FBI Reports Nearly 200,000 Phishing Attacks – Here’s How They’ve Evolved

The latest FBI’s Internet Crime Report reveals that phishing remains the most common cybercrime in the U.S., with over 193,000 complaints last year alone. But what’s more concerning than the volume is the shift in tactics – today’s attacks are cleaner, more convincing, and designed to fly under the radar. Cybersecurity experts at ZeroBounce are tracking the latest developments in phishing […]
Read more
Tanzania Police Force X Account Hacked, False Report of President's Death Circulates

Tanzania Police Force X Account Hacked, False Report of President’s Death Circulates

A social media account linked to the Tanzania Police Force was hacked on Tuesday morning, leading to the dissemination of unverified messages and even a live broadcast on the platform. Among the false information shared was a fake report claiming the death of President Samia Suluhu Hassan, which caused widespread confusion and concern. The compromised […]
Read more
Infostealers Exposed: How Cybercriminals Exploit Businesses for Just $100

Infostealers Exposed: How Cybercriminals Exploit Businesses for Just $100

Cyberattacks are more than just a technical nuisance—they’re a financial and reputational nightmare. A single data breach can cost companies millions and erode customer trust that took years to build. According to Vakaris Noreika, a cybersecurity expert at NordStellar, cybercriminals can purchase leaked data capable of triggering a devastating, million-dollar security breach for as little […]
Read more
Sophisticated Phishing Scheme Exploits Google Services to Steal Credentials

Sophisticated Phishing Scheme Exploits Google Services to Steal Credentials

Security researchers have uncovered a refined phishing operation leveraging Google’s services to deceive users into relinquishing their account credentials. The scheme came to light after Nick Johnson, a lead developer at the Ethereum Name Service, received a seemingly official email from Google, purporting that law enforcement had subpoenaed data from his account. The attackers created […]
Read more
Check Point's Infinity Platform Named Top AI-Powered Cybersecurity Solution in 2025 Miercom Assessment

Check Point’s Infinity Platform Named Top AI-Powered Cybersecurity Solution in 2025 Miercom Assessment

Check Point Software Technologies Ltd. has been recognized as the leading provider of AI-powered cybersecurity solutions, with its Infinity Platform earning the top rank in the 2025 Miercom Assessment. The evaluation underscored Check Point’s superior performance in critical areas such as security efficacy, Zero Trust implementation, and ease of use, setting a new benchmark for […]
Read more