Preventing Digital Disruption in the Cold Supply Chain | Lessons from the Peter Green Ransomware Attack
Preventing Digital Disruption in the Cold Supply Chain | Lessons from the Peter Green Ransomware Attack Michael Pretorius June 5, 2025 Blog What Happened | A Cold Chain Brought To A Halt By Ransomware. In May 2025, UK-based logistics company Peter Green Chilled, a supplier for major supermarket chains like Tesco, Aldi, and Sainsbury’s –
Safeguarding South Africa’s Skies: Lessons from the SAA Cyberattack
Safeguarding South Africa’s Skies: Lessons from the SAA Cyberattack Michael Pretorius May 12, 2025 Blog A Wake-Up Call for National Infrastructure On May 3, 2025, South African Airways (SAA) experienced a significant cyberattack that disrupted its website, mobile application, and several internal operational systems. The breach prompted immediate action, including the activation of disaster management
Safeguarding South Africa’s Skies: Lessons from the SAA Cyberattack Read More »
The Bybit Cryptocurrency Heist: How Hackers Stole $1.5 Billion in Ethereum
The Bybit Cryptocurrency Heist: How Hackers Stole $1.5 Billion in Ethereum Michael Pretorius April 29, 2025 Blog Cryptocurrency thefts have become a growing threat in the digital finance industry, but the Bybit crypto hack of 2025 has shattered records as the largest digital heist in history, with hackers making off with a staggering $1.5 billion
The Bybit Cryptocurrency Heist: How Hackers Stole $1.5 Billion in Ethereum Read More »
How the NotPetya Cyberattack Exposed Vulnerabilities in Critical Infrastructure
How the NotPetya Cyberattack Exposed Vulnerabilities in Critical Infrastructure Michael Pretorius March 20, 2025 Blog Cybersecurity threats are evolving rapidly, and one of the most devastating attacks in recent history was NotPetya. Initially disguised as ransomware, NotPetya was, in reality, a destructive cyber weapon that targeted Ukraine in 2017 but quickly spread across the globe.
How the NotPetya Cyberattack Exposed Vulnerabilities in Critical Infrastructure Read More »
4 Guidelines for Managing the Mobile Paradox
Draft 4 Guidelines for Managing the Mobile Paradox Michael Pretorius January 10, 2025 Blog It seems as if with every passing day, the technology surrounding us evolves exponentially. And that’s because it is. From Apple’s Vision Pro to Quantum Computers, there is no shortage of technological capability. Although, this opens a world of possibilities, it
4 Guidelines for Managing the Mobile Paradox Read More »
From Vulnerability to Victory: Supply Chain Security for SMEs
Draft From Vulnerability to Victory: Supply Chain Security for SMEs Michael Pretorius January 10, 2025 Blog A chain is only as strong as its weakest link. Therefore, small businesses need to solidify every aspect of their supply chain. Over the years, you will likely have heard of many supply chain breaches due to third-party organisations.
From Vulnerability to Victory: Supply Chain Security for SMEs Read More »
Data Breach Prevention and Response: Building an Effective Incident Response Plan
Draft Data Breach Prevention and Response: Building an Effective Incident Response Plan Michael Pretorius January 10, 2025 Blog With the ever-increasing reliance on digital systems and the rising sophistication of cyber threats, organisations face a daunting challenge in protecting their sensitive data from potential breaches. A data breach can have far-reaching consequences, including financial losses,
Data Breach Prevention and Response: Building an Effective Incident Response Plan Read More »