Blogs & insights
Latest Dark Nuvens blogs
AI is changing the game and so are the risks
We all know that in today’s fast-moving digital world, it’s not a matter of if your systems will be prodded by cybercriminals, it’s when. From phishing and ransomware to insider mistakes and misconfigurations, every connected device or cloud service adds to your “attack surface.”
For many African businesses — especially those without large IT teams or expensive security tools — the risk can feel overwhelming. That’s why Dark Nuvens offers a cost-effective Vulnerability Assessment service (VAaaS) designed to uncover and fix weaknesses before criminals exploit them.
Close your cybersecurity gaps before attackers find them
We all know that in today’s fast-moving digital world, it’s not a matter of if your systems will be prodded by cybercriminals, it’s when. From phishing and ransomware to insider mistakes and misconfigurations, every connected device or cloud service adds to your “attack surface.”
For many African businesses — especially those without large IT teams or expensive security tools — the risk can feel overwhelming. That’s why Dark Nuvens offers a cost-effective Vulnerability Assessment service (VAaaS) designed to uncover and fix weaknesses before criminals exploit them.
No business is too small: Why hackers are interested in you
Think your business is too small to be hacked? Think again. In 2024, 70% of organisations globally suffered a significant cyber attack, and small...
Bridging the cyber skills gap: Outsourcing your cybersecurity needs
Cybercrime is rising fast, but skilled professionals who can defend against it are in short supply, especially across Africa. Building a full-time...
Caught in the web: How cyber ‘spiders’ harvest your personal information
Ever heard of cyber spiders? They’re not the creepy kind but are just as dangerous. Cyber spiders are bots used by criminals to scan the internet,...
The Hacker News feed
The Hacker News Most trusted, widely-read independent cybersecurity news source for everyone; supported by hackers and IT professionals — Send TIPs to admin@thehackernews.com
- CISA Adds Actively Exploited XSS Bug CVE-2021-26829 in OpenPLC ScadaBR to KEVby info@thehackernews.com (The Hacker News) on November 30, 2025 at 9:23 am
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities (KEV) catalog to include a security flaw impacting OpenPLC ScadaBR, citing evidence of active exploitation. The vulnerability in question is CVE-2021-26829 (CVSS score: 5.4), a cross-site scripting (XSS) flaw that affects Windows and Linux versions of the software via
- Legacy Python Bootstrap Scripts Create Domain-Takeover Risk in Multiple PyPI Packagesby info@thehackernews.com (The Hacker News) on November 28, 2025 at 4:27 pm
Cybersecurity researchers have discovered vulnerable code in legacy Python packages that could potentially pave the way for a supply chain compromise on the Python Package Index (PyPI) via a domain takeover attack. Software supply chain security company ReversingLabs said it found the "vulnerability" in bootstrap files provided by a build and deployment automation tool named "zc.buildout." "The
- North Korean Hackers Deploy 197 npm Packages to Spread Updated OtterCookie Malwareby info@thehackernews.com (The Hacker News) on November 28, 2025 at 4:18 pm
The North Korean threat actors behind the Contagious Interview campaign have continued to flood the npm registry with 197 more malicious packages since last month. According to Socket, these packages have been downloaded over 31,000 times, and are designed to deliver a variant of OtterCookie that brings together the features of BeaverTail and prior versions of OtterCookie. Some of the
- Why Organizations Are Turning to RPAMby info@thehackernews.com (The Hacker News) on November 28, 2025 at 11:09 am
As IT environments become increasingly distributed and organizations adopt hybrid and remote work at scale, traditional perimeter-based security models and on-premises Privileged Access Management (PAM) solutions no longer suffice. IT administrators, contractors and third-party vendors now require secure access to critical systems from any location and on any device, without compromising
- MS Teams Guest Access Can Remove Defender Protection When Users Join External Tenantsby info@thehackernews.com (The Hacker News) on November 28, 2025 at 8:33 am
Cybersecurity researchers have shed light on a cross-tenant blind spot that allows attackers to bypass Microsoft Defender for Office 365 protections via the guest access feature in Teams. "When users operate as guests in another tenant, their protections are determined entirely by that hosting environment, not by their home organization," Ontinue security researcher Rhys Downing said in a report









