2TS

Michael Pretorius

Peter Green Chilled | Ransomware Attack

Preventing Digital Disruption in the Cold Supply Chain | Lessons from the Peter Green Ransomware Attack

Preventing Digital Disruption in the Cold Supply Chain | Lessons from the Peter Green Ransomware Attack Michael Pretorius June 5, 2025 Blog What Happened | A Cold Chain Brought To A Halt By Ransomware.  In May 2025, UK-based logistics company Peter Green Chilled, a supplier for major supermarket chains like Tesco, Aldi, and Sainsbury’s –

Preventing Digital Disruption in the Cold Supply Chain | Lessons from the Peter Green Ransomware Attack Read More »

SAA Cyberattack

Safeguarding South Africa’s Skies: Lessons from the SAA Cyberattack

Safeguarding South Africa’s Skies: Lessons from the SAA Cyberattack Michael Pretorius May 12, 2025 Blog A Wake-Up Call for National Infrastructure On May 3, 2025, South African Airways (SAA) experienced a significant cyberattack that disrupted its website, mobile application, and several internal operational systems. The breach prompted immediate action, including the activation of disaster management

Safeguarding South Africa’s Skies: Lessons from the SAA Cyberattack Read More »

Crypto Currency Heist

The Bybit Cryptocurrency Heist: How Hackers Stole $1.5 Billion in Ethereum 

The Bybit Cryptocurrency Heist: How Hackers Stole $1.5 Billion in Ethereum  Michael Pretorius April 29, 2025 Blog Cryptocurrency thefts have become a growing threat in the digital finance industry, but the Bybit crypto hack of 2025 has shattered records as the largest digital heist in history, with hackers making off with a staggering $1.5 billion

The Bybit Cryptocurrency Heist: How Hackers Stole $1.5 Billion in Ethereum  Read More »

How the NotPetya Cyberattack Exposed Vulnerabilities in Critical Infrastructure

How the NotPetya Cyberattack Exposed Vulnerabilities in Critical Infrastructure Michael Pretorius March 20, 2025 Blog Cybersecurity threats are evolving rapidly, and one of the most devastating attacks in recent history was NotPetya. Initially disguised as ransomware, NotPetya was, in reality, a destructive cyber weapon that targeted Ukraine in 2017 but quickly spread across the globe.

How the NotPetya Cyberattack Exposed Vulnerabilities in Critical Infrastructure Read More »

From Vulnerability to Victory: Supply Chain Security for SMEs

Draft From Vulnerability to Victory: Supply Chain Security for SMEs Michael Pretorius January 10, 2025 Blog A chain is only as strong as its weakest link. Therefore, small businesses need to solidify every aspect of their supply chain. Over the years, you will likely have heard of many supply chain breaches due to third-party organisations.

From Vulnerability to Victory: Supply Chain Security for SMEs Read More »

Data Breach Prevention and Response: Building an Effective Incident Response Plan

Draft Data Breach Prevention and Response: Building an Effective Incident Response Plan Michael Pretorius January 10, 2025 Blog With the ever-increasing reliance on digital systems and the rising sophistication of cyber threats, organisations face a daunting challenge in protecting their sensitive data from potential breaches. A data breach can have far-reaching consequences, including financial losses,

Data Breach Prevention and Response: Building an Effective Incident Response Plan Read More »