Zambia: Cyber Law & Rights

Screenshot 2025 04 18 144304

In April 2025, Zambia enacted a new Cyber Security and Cyber Crimes Act aimed at strengthening national security and combating cybercrime. The legislation grants authorities the power to monitor electronic communications, including calls, emails, and online content, under certain conditions. While the government asserts that these measures are necessary to address online fraud and protect […]

Cyber Intel for a Safe Future

Screenshot 2025 04 17 151825

In a pivotal step towards reinforcing national cybersecurity, a bipartisan effort has been made to extend the protections provided by the Cybersecurity Information Sharing Act of 2015. The proposed Cybersecurity Information Sharing Extension Act aims to uphold a critical framework that enables the secure exchange of cyber threat intelligence between the public and private sectors. […]

CVE Funding Crisis: Cyber Alert

Screenshot 2025 04 17 151210

On April 16, 2025, the cybersecurity community faced a significant challenge as the U.S. Department of Homeland Security’s contract with MITRE Corporation for managing the Common Vulnerabilities and Exposures (CVE) program was set to expire. The CVE program has been a cornerstone in identifying and tracking publicly disclosed software vulnerabilities, enabling organizations worldwide to prioritize […]

Gladinet Flaw Exposes Risks

Screenshot 2025 04 16 203229

In today’s fast-paced digital environment, file-sharing platforms play a vital role in business operations. However, the discovery of a critical flaw in a widely used solution by Gladinet brings a stark reminder that vulnerabilities can lurk beneath the surface. Recent investigations have revealed that a zero-day deserialization vulnerability in CentreStack – Gladinet’s enterprise file-sharing platform […]

DaVita Hack: Healthcare Lessons

Screenshot 2025 04 16 202848

The recent ransomware attack on DaVita Inc., a leading provider of kidney dialysis services, underscores the escalating cybersecurity threats facing the healthcare industry. With over 2,600 outpatient centers and services reaching approximately 200,000 patients annually, DaVita’s operations were disrupted when parts of its network were encrypted. Despite implementing contingency measures to maintain patient care, the […]

UAE Cyber Strength in Unity

Screenshot 2025 04 16 200732

In an era where digital transformation is accelerating, the United Arab Emirates (UAE) stands out for its proactive approach to cybersecurity. The recently released State of the UAE Cybersecurity Report 2025, a collaboration between the UAE Cyber Security Council and CPX, underscores the importance of a collective strategy involving public entities, private sectors, and the […]

Crypto Theft via Budget Phones

Screenshot 2025 04 16 195918

In a world where convenience often outweighs caution, budget Android phones are flying off the shelves. But some of these pocket-friendly devices carry more than just affordability. They come preloaded with malicious software engineered to silently hijack your crypto wallets -and you might never see it coming. Recent research has unveiled a disturbing trend: spyware […]

Modern Hacktivism Unmasked

Screenshot 2025 04 16 195234

In today’s complex cyber landscape, the line between independent hackers and state influenced cyber operations has blurred considerably. What once appeared as radical activism is now increasingly a tool deployed by government-linked groups targeting critical infrastructure. While traditional hacktivism focused on symbolically defacing websites or staging nuisance-level attacks, recent incidents suggest a far more calculated […]

Next Ransomware Wave Unveiled

Screenshot 2025 04 16 194839

In today’s digital world, ransomware attacks are rapidly evolving and impacting organizations across the globe. New threat actors such as RansomHub, Arkana, CrazyHunter, NightSpire, and others are intensifying their tactics, targeting a wide range of businesses. In March 2025, RansomHub alone compromised 84 organizations while new groups continue to develop sophisticated methods that combine advanced […]

HelloKitty Ransomware Back

Screenshot 2025 04 16 194307

As ransomware threats grow more persistent and technically complex, a familiar adversary has re-emerged- HelloKitty. First spotted in 2020, this malware strain has now returned with new and advanced variants, threatening not just Windows, but also Linux and ESXi environments. With evolved encryption, broader targeting strategies, and a mysterious geographical footprint, HelloKitty is yet another […]