Skip to content
Internal Security Policy Toolkit
Audience Categories
Media Organizations
Civil Society
Vulnerable Groups
Businesses
Cyber Security Enthusiasts
Incidence Report
Resources
Blog
Community
Menu
Internal Security Policy Toolkit
Audience Categories
Media Organizations
Civil Society
Vulnerable Groups
Businesses
Cyber Security Enthusiasts
Incidence Report
Resources
Blog
Community
Media Organizations
Civil Society
Vulnerable Groups
Businesses
Cyber Security Enthusiasts
Threat Intelligence
Category
News & Updates
October 15, 2024
Digital Access and Resilience Tools for a Just Future
At the same time, across the globe, tools designed for social justice organizations are emerging as vital resources for building digital resilience and protecting activists, civil society groups, and marginalized communities
cybersecurity training
digital resilience
digital transformation
September 9, 2024
From Phishing to Quishing: How Cybercriminals Are Evolving Their Tactics
Quishing typically involves a malicious actor creating a QR code that leads to a harmful website. This QR code is then attached to a phishing email, text message, printed flyer, or shared via social media.
Cybersecurity Threat
financial fraud
Identity Theft
September 6, 2024
Intel Wrap – August
This month focuses again on a Chrome vulnerability being exploited in the wild, Flutterwave gaining PSP License in Ghana, new Qilin Ransomware attacks targeting Chrome browsers and a vulnerability in a popular WordPress cache plugin.
Chrome credential theft
Chrome vulnerability
CVE-2024-7965
August 15, 2024
Africa’s Digital Leap: Spiro Expands into Nigeria’s Ogun State while Ghana Revolutionizes Road Defect Reporting with Mobile App
The enhanced maintenance programme tends to deploy development in the nation's roads and highways. With the launch of digitalised initiatives, 4G penetration tends to increase from 15% to 80% over the next 3 years through the Next-Gen Infra Cos (NGIC)
4G penetration
battery-swapping
electric vehicles
August 5, 2024
Nigerian Tech Innovations: OPay Boosts Financial Security & Intron Health Advances AI-Powered Healthcare
When a potential scam is identified, the system triggers an immediate double confirmation before any transaction occurs. This pause enables the users to verify the recipients and transaction details, effectively detecting scams in their tracks before any damage is done.
African accents
AI-powered healthcare
financial security
May 30, 2024
From Piggy Bank to Pig-Butchering: How to Keep Your Finances Safe
The scam blends elements of romance and investment fraud, it is a highly profitable scheme, allowing scammers to steal hundreds of millions of dollars worldwide in recent years. However, the true extent of the damage caused by pig butchering scams is hard to measure
LOAD MORE
Scroll to Top