Inside the Sibanye Stillwater Cyber-Attack: How a Mining Giant Fended Off a Digital Threat

By |2024-08-05T08:52:19+02:00August 2nd, 2024|Cybersecurity, Services, Technology|

Inside the Sibanye Stillwater Cyber-Attack: How a Mining Giant Fended Off a Digital Threat Incident Overview On July 11, 2024, Sibanye Stillwater, a prominent global mining company, reported a severe cyber-attack that compromised its IT infrastructure. The attack, affecting systems across all its operations, was quickly identified and contained by the company's cybersecurity team. Nature

The Great Heist: 300 Million Rand Stolen from South Africa’s Department of Public Works

By |2024-07-17T10:32:06+02:00July 17th, 2024|Cybersecurity, Technology|

The Great Heist: 300 Million Rand Stolen from South Africa's Department of Public Works In a significant financial scandal revealed in July 2024, it was discovered that approximately 300 million rand had been stolen from South Africa's Department of Public Works and Infrastructure over the past decade. The theft was a result of prolonged cyberattacks

IT vs OT Assets

By |2022-11-01T13:52:27+02:00October 25th, 2022|Technology|

IT vs OT Assets IT and OT cyber security are sometimes confused as being the same thing, however they have fundamental differences in their requirements for securing assets. This is because IT assets are typically digital, and OT assets are typically physical. IT assets have developed prioritising Confidentiality, Integrity,

Water Treatment Plant Cyber attacks

By |2023-03-28T10:39:19+02:00February 2nd, 2022|Cybersecurity, Technology|

Water Treatment Plant Cyber attacks For a resource that is critical to all life on Earth, its treatment, composition and supply must be closely monitored to prevent harm. This also makes it a prime target to critically affect countries. Cyber-attacks are not a new threat, but they have become prevalent in recent years.

Cyber Attacks – Colonial Pipeline

By |2022-03-02T19:26:15+02:00February 2nd, 2022|Technology|

Cyber Attacks – Colonial Pipeline In today’s cyber age many fail to realise that significant threats to industries can come from software and online systems. These also make potential easy targets as many have not upgraded their security systems to account for these breaches. Numerous cyber-attacks have occurred worldwide, some affecting critical and

Go to Top