Inside the Sibanye Stillwater Cyber-Attack: How a Mining Giant Fended Off a Digital Threat

By |2024-08-05T08:52:19+02:00August 2nd, 2024|Cybersecurity, Services, Technology|

Inside the Sibanye Stillwater Cyber-Attack: How a Mining Giant Fended Off a Digital Threat Incident Overview On July 11, 2024, Sibanye Stillwater, a prominent global mining company, reported a severe cyber-attack that compromised its IT infrastructure. The attack, affecting systems across all its operations, was quickly identified and contained by the company's cybersecurity team. Nature

CrowdStrike Update Triggers Global Windows BSOD Issues

By |2024-07-25T09:23:26+02:00July 25th, 2024|Cybersecurity, Services, Uncategorised|

CrowdStrike Update Triggers Global Windows BSOD Issues A recent update to CrowdStrike's Falcon sensor has caused significant disruptions worldwide by triggering Blue Screen of Death (BSOD) errors on Windows systems. This incident has affected various sectors including airlines, banks, broadcasters, and other critical infrastructure globally, leading to substantial outages and operational difficulties.   The Incident:

The Great Heist: 300 Million Rand Stolen from South Africa’s Department of Public Works

By |2024-07-17T10:32:06+02:00July 17th, 2024|Cybersecurity, Technology|

The Great Heist: 300 Million Rand Stolen from South Africa's Department of Public Works In a significant financial scandal revealed in July 2024, it was discovered that approximately 300 million rand had been stolen from South Africa's Department of Public Works and Infrastructure over the past decade. The theft was a result of prolonged cyberattacks

NHLS Hit by Ransomware Attack

By |2024-07-04T10:21:15+02:00July 4th, 2024|Cybersecurity, Services|

South Africa's National Health Laboratory Service (NHLS) Hit by Ransomware Attack Overview of NHLS The National Health Laboratory Service (NHLS) is a vital entity within South Africa's healthcare system, offering diagnostic pathology services to public health facilities across the nation. Established in 2001, the NHLS operates over 265 laboratories, providing essential services such as blood

The Latest Windows Zero Day

By |2024-06-21T10:25:00+02:00June 21st, 2024|Cybersecurity, Services|

The Latest Windows Zero Day In the ever-evolving landscape of cybersecurity, Windows users find themselves once again in the spotlight due to a recently discovered security flaw. This latest vulnerability poses significant risks, potentially affecting millions of users worldwide. Understanding the nature of this flaw, its implications, and the steps you can take to protect

The SolarWinds Attack: Discovery and Impact (Part 1 of 2)

By |2024-06-21T10:52:56+02:00May 30th, 2024|Cybersecurity|

The SolarWinds Attack: Discovery and Impact Discovery of the Attack The discovery of the SolarWinds attack began with an unusual incident at FireEye, a leading cybersecurity firm known for its expertise in threat detection and response. In early December 2020, FireEye detected a breach in its own network, which prompted an internal investigation. FireEye's security

Rio Tinto Cyber Attack

By |2024-05-08T11:09:24+02:00April 9th, 2024|Cybersecurity|

Unveiling Vulnerabilities: Understanding the Rio Tinto Cyber Attack and Its Impact on Mining In today's digital world, the mining industry faces growing threats from cyber-attacks, which can disrupt operations and cause financial harm. A notable incident involving Rio Tinto, a major global mining company, highlights these risks and calls for better cybersecurity practices across the

How a vulnerability evolves over time

By |2024-05-06T09:37:43+02:00February 9th, 2023|Cybersecurity, Services|

When it comes to disclosed cybersecurity vulnerabilities, there are important factors that can change over time. The first of these factors is the ease of exploitation or Exploit Code Maturity. Initially, an exploit could be merely theoretical and Unproven. Over time, Proof of Concept code could become available for certain scenarios, and then evolve into

Common Vulnerability Scoring System Introduction

By |2024-05-06T09:37:28+02:00November 10th, 2022|Cybersecurity, Services|

The Common Vulnerability Scoring System (CVSS) is an open framework created to help incident response teams in an organization. It is used to summarize the principal characteristics of software, hardware and firmware vulnerabilities. It also allows for easy comparison of a vulnerability relative to other vulnerabilities. As of writing, the CVSS specification is on version

Water Treatment Plant Cyber attacks

By |2023-03-28T10:39:19+02:00February 2nd, 2022|Cybersecurity, Technology|

Water Treatment Plant Cyber attacks For a resource that is critical to all life on Earth, its treatment, composition and supply must be closely monitored to prevent harm. This also makes it a prime target to critically affect countries. Cyber-attacks are not a new threat, but they have become prevalent in recent years.

Go to Top