Skip to content

2025

Sharp rise in cybercrime across Africa

A new INTERPOL Africa Cyberthreat Assessment Report, released on June 23, 2025, shows that cyber-related offences now comprise a substantial portion of criminal activity across the continent. Two-thirds of surveyed member countries said cybercrime made up a medium‑to‑high share of all reported crimes rising to over 30% in Western and Eastern Africa.

Securing news websites targeted for crime reporting

News organizations play a vital role in holding power to account. When they report on criminal activity, they often become targets themselves. Threats may include distributed denial of service (DDoS) attacks, website defacement, phishing attempts, or direct breaches of the content management system like WordPress. This post outlines how newspapers can secure their WordPress installations, what to do when hit by an attack, and how to build long-term resilience.

Strategy for advanced AKS

When organizations build cloud-native solutions in Kubernetes, especially with Azure Kubernetes Service (AKS), the need for control, security and scalability grows quickly. At the same time, there is equal pressure from developers to deliver fast, with flexibility and minimal friction in their workflows. Introducing GitOps, ArgoCD, Istio and Kubernetes Network Policies is one way to meet both sets of needs - but the solution is not without friction. It is about finding a balance between operational safety and developer speed, between structure and creativity.

Understanding Pegasus: The world’s most advanced spyware

Pegasus is a powerful and controversial spyware developed by the Israeli cyber-intelligence company NSO Group. It has become a symbol of the growing power and secrecy behind state-sponsored surveillance. This blog post explains what Pegasus is, how it works, and the impact it has had on cybersecurity and privacy around the world.

The consequences of the Ukraine-Russia war for cybersecurity

The ongoing war between Ukraine and Russia has not only reshaped global geopolitics but has also deeply affected the cybersecurity landscape. From the first days of conflict in 2014, and especially since the full-scale invasion in 2022, cyber operations have become a central feature of the war. These operations have targeted critical infrastructure, governments, private businesses, and civil society across Ukraine, Russia, and far beyond.

Cybersecurity in a world of geopolitical turbulence

In the spring of 2025, global conflicts and power struggles are redrawing the map of cyberspace. Cybersecurity has escalated into a high-level strategic concern as geopolitical tensions that flare from Washington and Moscow to Sanaa, Beijing and Brussels. Political upheaval in the United States, a drawn-out war in Europe, regional instability in the Middle East, and showdowns in East Asia all contribute to a volatile environment. For CIOs, CISOs, CEOs and the wider security community, this means navigating a new reality in which global crises and digital threats are inextricably linked.