Cyber security

Sophisticated Phishing Scheme Exploits Google Services to Steal Credentials

Sophisticated Phishing Scheme Exploits Google Services to Steal Credentials

Security researchers have uncovered a refined phishing operation leveraging Google’s services to deceive users into relinquishing their account credentials. The scheme came to light after Nick Johnson, a lead developer at the Ethereum Name Service, received a seemingly official email from Google, purporting that law enforcement had subpoenaed data from his account. The attackers created […]
Read more
Check Point's Infinity Platform Named Top AI-Powered Cybersecurity Solution in 2025 Miercom Assessment

Check Point’s Infinity Platform Named Top AI-Powered Cybersecurity Solution in 2025 Miercom Assessment

Check Point Software Technologies Ltd. has been recognized as the leading provider of AI-powered cybersecurity solutions, with its Infinity Platform earning the top rank in the 2025 Miercom Assessment. The evaluation underscored Check Point’s superior performance in critical areas such as security efficacy, Zero Trust implementation, and ease of use, setting a new benchmark for […]
Read more
Kaspersky Uncovers TookPS Trojan Spreading Through Fake Software Sites

Kaspersky Uncovers TookPS Trojan Spreading Through Fake Software Sites

Security researchers at Kaspersky have identified a malicious campaign involving a Trojan-Downloader known as TookPS, which is distributed through fraudulent websites masquerading as legitimate sources for popular software. These fake sites offer free downloads of applications such as UltraViewer, AutoCAD, and SketchUp, tricking users into installing the Trojan instead. Since its discovery in early March, […]
Read more
Broken Cyber Windows Theory (By Javvad Malik)

Broken Cyber Windows Theory

Have you ever walked down a street with broken windows, burnt out cars, graffiti and felt a bit uneasy? There’s a reason for that, and it’s not just about aesthetics. The Broken Windows Theory, introduced by social scientists James Q. Wilson and George L. Kelling in 1982, suggests that visible signs of crime and antisocial […]
Read more

ESET Urges African Businesses to Adopt Cloud Cybersecurity Solutions

ESET, a leading international cybersecurity firm, has partnered with African businesses to promote the adoption of cloud-based security solutions, warning that outdated legacy systems are leaving companies vulnerable to data breaches and cyberattacks. The campaign targets African firms, particularly startups, aiming to enhance digital protection amid a rapidly growing economy that has attracted cybercriminals exploiting […]
Read more

How to stay ahead of cyber threats: Mimecast H2 2024 Global Threat Intelligence Report

In the second half of 2024, Mimecast processed more than 90 billion data points for over 42,000 customers, during the six-month period from July to December. 5 billion threats detected: Attackers are targeting core communication channels such as emails and cloud platforms. 68% of breaches linked to human error: Most breaches involve non-malicious employee mistakes, emphasising the […]
Read more
Massive Data Breach Compromises 2.7 Billion Records from IoT Manufacturer Mass Hydro

Massive Data Breach Compromises 2.7 Billion Records from IoT Manufacturer Mars Hydro

Mars Hydro, a Chinese company specializing in IoT grow lights, has exposed approximately 2.7 billion records due to an unsecured database. The breach, discovered by cybersecurity researcher Jeremiah Fowler, underscores critical vulnerabilities in IoT security practices. The exposed database, totaling 1.17 terabytes, was accessible without password protection and contained sensitive information including Wi-Fi network names, […]
Read more

New tax laws in Kenya: How the 2024 amendments aim to reshape investment and compliance

By Alex Kanyi and Lena Onyango Economic pressure on Kenya’s National Treasury has seen the rise of two significant legislative proposals: the Tax Laws (Amendment) Bill, 2024, and the Tax Procedures (Amendment) (No.2) Bill, 2024. In simple terms, these bills seek to address Kenya’s fiscal deficit by broadening the tax base, improving compliance, and aligning […]
Read more