Malvertising - davinciforensics

Malvertising: Accessing Your Data through Legitimate Advertising

Both consumers and businesses have long made the assumption that malware is delivered in a variety of ways, but most are through accessing low-level websites or opening email. As with any form of cyber hacking, the criminals have developed even more sophisticated methods and the most recent has been sending malware through legitimate advertising areas.  This process has opened the portal to unknowing consumers that are downloading everything from ransomware

The Benefits of Using a Third Party SIEM SOC Centre

Businesses in South Africa are learning the hard way that they cannot control cybercrime on their own. The sheer volume of security breaches in companies has escalated to such an extent that the cost is devastating to many organisations. The use of a third party SIEM SOC Centre is the one area that owners and managers can turn to for the type of cyber protection that is required. These are
5 Major Short List Topics to Help Deter Your Security Risk

5 Major Short List Topics to Help Deter Your Security Risk

Chief Information Security Officers have made some radical changes over the last year or so, including the understanding that security breaches involve a number of variables. From internal and external sources to the very technology that we use to do business, CISO’s are taking action to address these and other issues to deflect the risk of security problems.  The entire topic may seem overwhelming to some, but every company is

Recognising a Potential Insider Security Threat

While all companies want to take a sense of pride in the quality of people that are part of their hired team, the fact is that not all individuals have the type of loyalty and honesty that management wants. This is of special importance when it comes to the topic of a security threat and the professionals in this arena have identified a few key signs that can alert you
Cyber Attack Anatomy 101

Cyber Attack Anatomy 101

Cybercrime is the new “mafia” and if you haven’t taken it seriously in the past, you need to pay attention before you or your company become the latest victim. Cyberattacks are a lot more sophisticated, with many of the organisers setting themselves up in the same way that one would create a real technology company. They have all of the professional elements and they assume that companies are focused on