Home
About
Solutions
WithSecure Corporate
F-Secure Consumer
Resources
Articles
Cybervision Humour
eBooks
Glossary of Terms
ID Theft Checker
Infographics
Local Threats
Useful links
Useful online security tips
Videos
Webinars
Whitepapers
Press
Newsletters
Cyber Security Bulletin
Cybervision Partner Newsletter
Local News
International News
Threats
POPIA
FAQ’s
Use RADAR to help comply
Contact
Blog
Cyber Security Bulletin
Cyber Security Bulletin
August 2024
Why robust software updates are important
New Report for Ransomware attacks
Paris 2024 faces a greater risk of malicious cyber activity
10 must-know tips for safe online shopping
How imposter scams generated $2.7 billion in just one year
7 sneaky Netflix scams to protect your Netflix account
US healthcare breaches – why hackers want patient data
Threats in the Wild
Read more
May 2024
How SA organisations can best counter & respond to cyberthreats
Generative AI – An Attacker’s View
Abusing search permissions on Docker directories
ITWeb Cyber Security Summit
WithSecure named Champion in 2024 Endpoint Protection Report
Threats in the Wild
Read more
March 2024
Spear phishing attacks
Cost of company data breaches in South Africa
Can my WhatsApp account get hacked?
Scams galore – don’t update later, update now!
ITWeb’s 19th annual Security Summit in Jhb this June
Threats in the Wild
Read more
November 2023
Launch of SA-Netherlands Cyber Security School
South Africa poised to become continent’s cybercrime capital
Insurance against cyber attacks becoming more necessary
AI: Why now and what does it mean for your security?
Test driving of WithSecure™ Elements CSPM
Half of Ransomware Groups operating in 2023 are new
Threats in the Wild
Read more
August 2023
AI and its Explosive Impact on Cyber Security
R10M fines for failure to report security compromises
Professionalization of Cyber Crime & What You Can Do
AI to render humans ‘second most intelligent creations’
WithSecure Rollback: now you can turn back time
SIEM, EDR, MDR in-house, or Managed Service?
Threats in the Wild
Read more
June 2023
New range of incident response by WithSecure
SA could become cybercrime capital of Africa
The biggest cyber security threats in SA
Nigeria ranking at 2nd most cyber-secure country in Africa
Ransomware driving professionalization of cyber crime
New & Dangerous threats to watch out for in 2023
Threats in the Wild
Read more
April 2023
Taking on every threat you’ll face, first.
Why your every password matters
Strategising cybersecurity: Why a risk-based approach is key
CSIR collaborating with SAPS over cybercrime investigations
Finnish President in state visit to South Africa
Security expert Mikko Hyppönen presenting at ITWeb Security Summit
Threats in the Wild
Read more
February 2023
AI-generated texts increase people’s exposure to threats
Cryptocurrency scam uses thousands of YouTube videos for victims
New game-changing technology for Ransomware protection
Microsoft Teams protection completes the Cyber Puzzle
North Korean attackers out themselves with operational security failure
Home security solution F-Secure’s F-Alert
ITWeb Security Summit to have over 60 leading speakers
Threats in the Wild
Read more
October 2022
For better or for worse: Predictions for the Internet
The Psychology of Attackers
Do you need a Red Team?
Are battery and solar inverters safe against cyber threats?
Cyber Security improving in Africa
Threats in the Wild
Read more
August 2022
Am I part of the problem?
Importance of Collaborative Security
Protecting African businesses against cybercrimes
Managed Endpoint Detection & Response (MDR)
Shipment Scams and the Theft of Credit Card info
Threats in the Wild
Read more
June 2022
Organisations fall short on cyber security Attack Surface resilience
Malware distribution campaign claiming victims
Important Cyber Security practices
Single cloud portal for improved visibility
Why Hackers Targeted Big Retail in SA
Spotted in the Wild
Read more
April 2022
Cyber Security industry growth – shortage of professionals
Cyber Security Courses
F-Secure Corporate Security relaunches as WithSecure™
US places Kaspersky on security risk list
Employee Awareness of Cyber Security
Travellers a key target for cybercriminals
SA has largest rise in cyber attacks
Why your every password matters
Threats in the Wild
Read more
October 2021
Mobile Malware & the Evolution of Risk
4 Mobile Security threats – what to do about them
Beyond backup and recovery – PoPI Act compliance requires understanding of how data is managed
How Account Take-Overs Happen
Whitepaper on ROI of Cyber Security
Webinars
Key Data Protection Strategies to Prevent Cyber Attacks
Understanding the Phishing Kill Chain to build Holistic Phishing Defence
Threats in the Wild
Read more
August 2021
How organisations can tackle Ransomware
Beyond backup & recovery – POPI Act & data management
Why cyber security is failing organisations – how First Response helps solve it
Threats in the Wild
Free Cyber Security test
Read more
June 2021
Your personal details don’t interest anyone. Or do they?
What is spyware?
Free Webinar – key cybersecurity tips for POPIA and Cybercrimes bill
How to know if a website is secure
Protecting Salesforce Cloud against malicious content
Tips for secure gaming
In the Wild threats
Read more
April 2021
The Connected Home’s Next Wave Report
Endpoint Detection and Response (EDR)
How to go incognito and browse in private
How to keep your money safe online
Spotted in the Wild
Read more
February 2021
Conduct a free cyber security test
Comprehensive MS Office 365 Protection
How to prepare for the first 24 hours of a cyber attack
How data breaches fuel cybercrime for the whole family
POPIA Webinar with F-Secure and Michalsons Attorneys
WhatsApp & the Facebook Conundrum
Slow migrations from WhatsApp
Spotted in the Wild
Read more
November 2020
Attack Prediction, Prevention, Detection & Response
People Required for Cyber Security
Brand Improvement with Cyber Security
Protecting Higher Education from Cyber Attacks
Spotted in the Wild
Read more
September 2020
Common email Security Threats
F-Secure ID Protection
Importance of Incidence Response
Spotted in the Wild
Read more
July 2020
Using F-Secure RADAR to help comply with the POPI Act
F-Secure Cloud Protection for MS Office 365
Covid-19 Pandemic Cyber Security Challenges
The Impact of Cyber Attacks Increases Over Time
Recent Attacks – Life Heathcare Group; Garmin
In the Wild – Threats
Read more
May 2020
Cyber Security Guide during Lockdown
F-Secure excels in AV-Tests
The Facebook Conundrum
F-Secure recognised as Gartner Peer Insights Customer’s Choice for Vulnerability Assessment
Spotted in the Wild
Read more
April 2020
Do not forget about the threat of Phishing
If your company data is breached, should you pay a ransom?
The cyber security risks of working from home
WordPress Security
Read more
November 2019
5 ways to take the risk out of cyber shopping
F-Secure Application Control: Part 2
Gone Phishing
Click here for Malware
Latest Cyber Attack Threats
Read more
October 2019
City of Johannesburg suffers Ransomware Attack
F-Secure Travel Tips
DDos attack affects numerous local ISPs
Vulnerabilities inside the network
Latest Cyber-Attack Threats
Read more
September 2019
F-Secure Webinar on vulnerability management & GDPR
Compromised websites
Why one should invest in cyber security
Social Media Hacks
Backing Up crucial to company success
Latest Cyber-Attack Threats
Read more
August 2019
Importance of updating software
What is a VPN?
How SSL works
Checking for Vulnerabilities
GDPR – Cybersecurity landscape
Latest Cyber-Attack Threats
Read more
July 2019
Remove redundant e-mail accounts
Secure your info with DataGuard
Cyber-crime, the new scourge
Dangers of impersonation attacks
Read more
Complete the form below to sign up to the Cyber Security Bulletin
Security Bulletin
Name
*
First
Last
*
Last
Email
*
reCAPTCHA
Submit
Search for: