Afripol and Interpol are spearheading Africa's battle against cybercrime, uniting police forces, standardizing digital evidence, and closing loopholes that once let hackers operate freely across borders.
Qilin ransomware has targeted Capital + Safi in a high-profile December 2025 attack. Learn how the breach unfolded and what it signals for the future of digital security.
Blackshrantac has added demilac, Inc to its list of ransomware victims in a surge of December attacks. This feature investigates the coordinated efforts of cybercriminal groups and the growing threat to global data security.
A ransomware attack on Diaz-Gill Laboratory Medicine spotlights growing cyber risks for South African healthcare providers, with sensitive data and patient safety hanging in the balance.
Hamas-linked APT Ashen Lepus is intensifying malware attacks on Middle Eastern governments, exploiting diplomatic documents and advanced evasion techniques to steal sensitive data—even after the Gaza ceasefire.
A devastating ransomware attack has paralyzed La Rabta Hospital in Tunis, locking staff out of vital systems and putting patient care at risk. Netcrook explores how this incident reveals deep vulnerabilities in healthcare cybersecurity.
A Hamas-linked cyber-espionage group has evolved into a major threat, using sophisticated malware to infiltrate diplomatic networks across the Middle East—even as war raged in Gaza.
Leadway Assurance, one of Nigeria's top insurers, has been targeted by ransomware hackers threatening to release sensitive data. This feature investigates the breach, its implications for customers and the financial sector, and the rising tide of cybercrime in Africa.
Kazu ransomware gang has targeted Leadway Assurance, Nigeria's leading insurance firm, in a high-profile cyber extortion case. Learn about the attack, its implications, and what it means for the future of cyber risk in African finance.
Shanya is the latest packer-as-a-service empowering ransomware groups to bypass endpoint detection and response tools worldwide. Explore how this stealthy tool works, which gangs use it, and how defenders can adapt.