BlackFog Partners with Telkom Business to Curb Cyber Crime Against SMMEs
BlackFog partners with Telkom Business, a South African telecommunications provider operating in over 38 countries across Africa for cybersecurity.
BlackFog partners with Telkom Business, a South African telecommunications provider operating in over 38 countries across Africa for cybersecurity.
2021 is already a record-breaking year for the cybercrime industry. We discuss the top 5 cyberattacks of 2021 and how they might have been prevented.
BlackFog ARM 64 edition for now available for Windows 10 and 11 computers such as Microsoft’s Surface Pro X and virtual machines.
Organizations have spent years developing and implementing different solutions for keeping sensitive data secure. While the Data Loss Prevention (DLP) model has been one of the most popular approaches for addressing these security pain points, Anti Data Exfiltration (ADX) provides a new solution to this problem.
Over the last few years, leaked data from some of the most devastating cyberattacks has found its way onto the Dark Web, a trend that seems to be increasing with the notable rise in double extortion ransomware attacks. Ransomware attack tools are routinely used to carry out these attacks. Every day we read [...]
[lwptoc] BlackFog provides essential protection from cyberattack using on-device data exfiltration. In order to activate the application on your device it is necessary to apply the license key as detailed below. First you will need to download and install the application onto your device. Please download the application for your device from our [...]
Cyberattacks like the Colonial Pipeline attack have become disturbingly frequent. The US Federal government is now mandating a Zero trust architecture across all departments. We look at how data exfiltration is an important part of this new mandate.
With data theft extortion, instead of a single ransom demand, there may be hundreds or thousands. In most cases, cybercriminals are adopting a dual-revenue model where a single, large-scale ransom demand is accompanied by individual ransoms for affected parties.
No decision maker wants to be profiled in major media as being asleep at the wheel while a massive data breach, ransomware attack, or malicious insider incident unfolds at their organization.
Cybercriminals continue to find ways around web application firewalls, but there are better options for preventing attacks such as data exfiltration prevention.
With a significant increase in value of cryptocurrencies over the past year, 2021 is on pace to exceed 2018 as the “year of cryptojacking”. Cryptojacking experts are seeing steady upward momentum every year, along with new threats and risks.
Looking back at the cyberattacks of 2020, selecting what we see as the top 10 was no easy task. Attacks were frequent, particularly when it came to ransomware, which rose seven-fold last year. We discuss how data exfiltration prevention could have stopped the top 10 cyberattacks of 2020.