We’ve all heard of identity theft, but what about credential theft? Just like your personal information, your online credentials can be stolen by hackers and used to commit fraud. So …
Cybersecurity
-
- Cybersecurity
Comm100 Live Chat Provider Hacked to Spread Malware in Supply Chain Attack
by Susubiribi Brako Akomea 2 mins. readA novel supply chain attack involving the deployment of a trojanized installer for the Comm100 Live Chat program to disseminate a JavaScript backdoor has been linked to a threat actor …
- CybersecurityEast Africa
Cybercrime in Uganda: Stricter Laws Have Been Passed (Computer Misuse Amendment Bill 2022)
by Penelope Nhyira 3 mins. readCybercrime in Uganda: The Computer Misuse Amendment Bill 2022, which stiffens punishments for cybercrimes, was privately introduced by Muhammad Nsereko (Ind., Kampala Central) and approved by the Ugandan Parliament. The …
- Cybersecurity
Increasing Number of Cybercrime Organizations Using Sliver Command-and-Control Framework
As a substitute for Cobalt Strike, nation-state threat actors are increasingly embracing and incorporating the Sliver command-and-control framework in their infiltration campaigns. The prominence of Cobalt Strike as an attack …
- CybersecurityWest Africa
Kaspersky: 61% of Nigerian Internet Users Vulnerable to Online Payment Fraud
According to a recent digital payment survey undertaken by Kaspersky, 61% of Nigerian Internet users respondents had fallen victim to online fraud of a sort. Using online banking or mobile …