Skip to main content

Cyber Security

Weekly CSC Blog

Alert - phishing investigation

| Super User | Cyber Security
We are constantly seeing new attempts for the cyber gangs to get access to our information, payment information and credit card details. While the specific example in this scenario is a South African based courier, I have seen the same types of attacks in multiple geographies and they follow the ...

Credential Theft Week 3

| Sandra Sehlapelo | Cyber Security
Continuing our J2 SOC Manager’s series on credential theft, this week we touch on some things you should be doing to protect yourself. We hope that you have found the first few pieces helpful and please feel free to get in contact us if you have questions, comments or want to further clarity. Aft...

Credential Theft Week 2

| Super User | Cyber Security
Continuing our J2 SOC Manager’s series on credential theft, this week we explore how attackers steal credentials on the local device. Future pieces will discuss other methods and prevention strategies. We hope you enjoy this series and feel free to get in contact us if you have questions, comment...

Credential Theft Week 1

| Super User | Cyber Security
Our J2 SOC Manager has created a series of pieces around credential theft. In the coming weeks we will unpack several methods of attack. In this, the first in the series, we start with some background information and a dive into attacking passwords in network traffic. Future pieces will discuss o...

Phishing 101 version 2.0

| Sandra Sehlapelo | Cyber Security
In a profit driven, ethically unconstrained criminal enterprise like phishing it is not surprising that threat actors have evolved to match the times. Rather than focus on techniques, this article will discuss how phishing applications have changed to match new security standards. It should be no...

The greatest asset becomes the biggest risk

| Sandra Sehlapelo | Cyber Security
It's never been more important to protect employees from cyber-attacks while also mitigating the risk they pose as trusted insiders. The erosion of the cyber perimeter as a result of new virtual workforce models necessitates a new approach, one that baselines activities and behaviours and protect...