With the rise of ransomware, phishing, zero-day exploits and other cyberthreats, organizations worldwide are confronting a cybersecurity crisis that ...
Signed malware backed by a stolen EV certificate deployed legitimate RMM tools to gain persistent access inside enterprise ...
ESET researchers discover PromptSpy, the first known Android malware to abuse generative AI in its execution flow.
AI and generative AI aren’t just transforming the way we work; these technologies are also enabling new security threats. Bad actors are quickly upping ...
Employees and software using AI behind the scenes expose organisations to breaches, phishing, malware, and compliance failures.
Watch for account recycling: Kids often reuse usernames and passwords across platforms. That makes them easy targets if one ...
The region is scaling cloud adoption and intelligent systems at an extraordinary pace. But the same forces enabling this growth are also inadvertently reshaping cyber risk just as quickly ...
Understanding the risks now emerging at every layer of the AI stack.
Most companies have no clear picture of how many identities exist within their environment, what access they have or whether ...
Phishing attacks shift from people to AI By Romantia Mashabane, InternJohannesburg, 24 Feb 2026Richard Frost, head of technology solutions and consulting at Armata Cyber Security. AI-to-AI phishing is ...