A founding partner of the Krebs Stamos Group, Krebs most recently served as the first director of CISA.
Seeing high volumes of domain queries without destination IP addresses in the DNS is usually considered a malicious activity.
This report provides an overview of the global cyber threat landscape and a discussion on the geopolitical, regional and industry threat landscape for different geographical regions.
The data compromise impacted money transfers to and within Eswatini and within Namibia and Zambia.
Commercial ICT recently completed a project in the public schooling sector that entailed the comprehensive overhaul of a Gauteng school’s IT security.
Drive Control Corporation has also added the SADC to its Symantec distribution region.
It's critical to remember Zero Trust is an ongoing effort, rather than a single technology or implementation, says Wayne D'sa, CEO of CipherWave Business Solutions.
The company announces joint investments in Dig Security, Enso Security and Zero Networks.
Despite being relatively new, the malware already supports information exfiltration, persistence, anti-analysis features, and encrypted C2 communications.
The Cybereason Ransomware True Cost to Business Study reveals that 80% of companies that paid a ransom demand were hit again.
Cyber security debt is when security programmes and tools don't keep pace with digital initiatives, exposing the business to increased security risks.