When corporate data is exposed on a dedicated leak site, the consequences linger long after the attack fades from the news cycle.
ESET Research’s latest Threat Report summarises cybersecurity trends observed through ESET telemetry and expert analysis during H2 2025 ...
Threat actors are exploiting security gaps to weaponize Windows drivers and terminate security processes, and there may be no ...
Gadget on MSN
SA becomes phishing hub of Africa
Social engineering dominates cyber attacks in South Africa, exploiting heavy reliance on card-based payment systems.
Ransomware Help announces industry-leading success rate and introduces enhanced money-back policy for unrecoverable ...
Ransomware attacks surged 52% in 2025, with supply chain breaches nearly doubling as groups like Qilin drive record monthly ...
Researchers discovered a vulnerable driver embedded in Reynolds' ransomware, illustrating the increasing popularity of the ...
A member of the Crazy ransomware gang is abusing legitimate employee monitoring software and the SimpleHelp remote support tool to maintain persistence in corporate networks, evade detection, and ...
New structured recovery model ensures faster turnaround and greater transparency for affected businesses. Our enhanced ...
Partnerships with Hiscox, Zurich, MAPFRE, and SURA highlight the company’s reliability in high-stakes data recovery.
As ransomware recedes, a new more dangerous digital parasite rises ...
Accenture Cybersecurity warns over difficult to detect, “sophisticated toolset” being deployed as part of extortion campaigns ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results