How SA organisations can best counter & respond to cyberthreats

Cyber resilience needs to be treated with equal seriousness and attention, whether you are running a small business or a giant multinational. Furthermore, institutions and enterprises also are not able to disregard abilities to prevent and withstand, as well as recover from the problems caused by cybersecurity incidents.

Generative AI – An Attacker’s View

Security for Security (S4S) who describe themselves as “the only security conference dedicated to collaboration and community” held an event recently that brought in an impressive audience. The event was to determine how generative Artificial Intelligence (AI) is used by hackers and how to protect against attacks of Generative AI.

Complete the form below to sign up to the Cyber Security Bulletin

Security Bulletin
First
Last

Abusing search permissions on Docker directories

Docker permissions combined with a number of other lower risk issues, resulted in an attack path that allowed privilege escalation to root from a low-privileged user.

ITWeb Cyber Security Summit

Join us at the cyber security summit at the Sandton Convention Centre in Johannesburg during the 4-5th of June with Cybervision having stands for both WithSecure and F-Secure cyber security solutions. The top cyber security experts in the world are presenting on the future of cyber security, including WithSecure’s Chief Information Security Officer, Christine Bejerasco.

WithSecure named Champion in 2024 Endpoint Protection Report

WithSecure (formerly known as F-Secure) Elements has been chosen in a survey of 1700 software users as the #1 solution for Endpoint Protection. Customers evaluated 17 software vendors on their customer experience, rating each offering in categories like product impact and service experience.

Threats in the Wild

South Africa
Cybercrime Insurance

This particular insurance in South Africa is remaining very scarce even though there has been a substantial increase in breach costs.

Justice Department suffers cyber attack again
The Department of Justice and Constitutional Development (DJ&CD) has suffered another cyber attack that has affected child maintenance payments.

International
Google Chrome browser suffers its 4th Zero Day attack

Chrome users are needing to update their browsers as a result of another exploit that occurred this month.

Threat trends
There are certain cyber threats that need to be looked out for during 2024 in order to stay protected.

The Supply Chain Threat report

In recent years, supply chain attacks have been numerous, successful, and highly impactful, the most recent example of which is the 3CX compromise. The obvious success of past supply chain attacks encourages attackers to attempt to replicate those successes. View the downloadable Supply Chain Threat Report.

This bulletin is intended to increase the security awareness in organisations by providing useful information to help enhance security and safety when using computing devices and the Internet.

Be sure to consider some of the cyber threats out there and consider these tips for protecting yourself and your devices. Until our next mailer, you can check out all the great resources we have available on our website.

The Cybervision Team