• +27 (0) 10 221 1341
  • admin@ndt.co.za
Twitter Linkedin Instagram
  • Home
  • About Us
  • Clients
  • Services
    • Biometrics
    • Cyber Security
    • Software Development & Testing
    • Frameworks, Prototypes And Designs
    • Certification Training
  • Upcoming Training
  • News & Insights
  • Get In Touch

  • Home
  • About Us
  • Clients
  • Services
    • Biometrics
    • Cyber Security
    • Software Development & Testing
    • Frameworks, Prototypes And Designs
    • Certification Training
  • Upcoming Training
  • News & Insights
  • Get In Touch

Blog

Cyber security
Five Reasons a Stateful Firewall Is a Must-Have for Business

Protect your network, simplify security, and keep threats out with a stateful firewall. A stateful firewall is capable of tracking the state of active connections between devices on the network. It logs when devices are requesting data, sending data, or […]

by Sigmateq Team

Continue Reading

Artificial Intelligence  ·  Cyber Threats
AI-Assisted Attacks Top Cyber Threat for Third Consecutive Quarter – Gartner

AI-enhanced malicious attacks are a top concern for 80% of executives, and for good reason, as there is a lot of evidence that bad actors are exploiting the technology. For the third consecutive quarter, Gartner has found that cyber attacks […]

by Sigmateq Team

Continue Reading

Cyber security
5 Most Common Malware Techniques in 2024

Tactics, techniques, and procedures (TTPs) form the foundation of modern defense strategies. Unlike indicators of compromise (IOCs), TTPs are more stable, making them a reliable way to identify specific cyber threats. Here are some of the most commonly used techniques, […]

by Sigmateq Team

Continue Reading

Cyber security
New CRON#TRAP Malware Infects Windows by Hiding in Linux VM to Evade Antivirus

Cybersecurity researchers have flagged a new malware campaign that infects Windows systems with a Linux virtual instance containing a backdoor capable of establishing remote access to the compromised hosts. The “intriguing” campaign, codenamed CRON#TRAP, starts with a malicious Windows shortcut […]

by Sigmateq Team

Continue Reading

Artificial Intelligence  ·  Cyber security
Eliminating AI Deepfake Threats: Is Your Identity Security AI-Proof?

Artificial Intelligence (AI) has rapidly evolved from a futuristic concept to a potent weapon in the hands of bad actors. Today, AI-based attacks are not just theoretical threats—they’re happening across industries and outpacing traditional defense mechanisms. The solution, however, is not […]

by Sigmateq Team

Continue Reading

Cyber security
New Phishing Kit Xiū gǒu Targets Users Across Five Countries With 2,000 Fake Sites

Cybersecurity researchers have disclosed a new phishing kit that has been put to use in campaigns targeting Australia, Japan, Spain, the U.K., and the U.S. since at least September 2024. Netcraft said more than 2,000 phishing websites have identified the […]

by Sigmateq Team

Continue Reading

Cyber security
The Ultimate Pentest Checklist for Full-Stack Security

Given the expanding attack surface coupled with the increasing sophistication of attacker tactics and techniques, penetration testing checklists have become essential for ensuring thorough assessments across an organization’s attack surface, both internal and external. By providing a structured approach, these […]

by Sigmateq Team

Continue Reading

Cyber security
ISO 27001 and the Evolution of Secure Coding

In 2022, the release of the ISO 27002:2022 document included additions to enable information security professionals to address the latest information security risks. One of the most prominent additions is 8.28 Secure Coding, which provides requirements for protecting sensitive data […]

by Sigmateq Team

Continue Reading

Cloud Computing  ·  Risk management
5 Ways to Reduce SaaS Security Risks

As technology adoption has shifted to be employee-led, just in time, and from any location or device, IT and security teams have found themselves contending with an ever-sprawling SaaS attack surface, much of which is often unknown or unmanaged. This […]

by Sigmateq Team

Continue Reading

Applications Security
Seven Challenges of Embedded Software Security Testing in 2024

We live in a world that depends on embedded software. It’s in the cars we drive, the elevators we use and the planes we travel in. As these systems become increasingly complex, the security and functionality of embedded software systems […]

by Sigmateq Team

Continue Reading

12345
Page 3 of 5
  • Recent Posts

    • PECB ISO 22301 Certification Training: 17 – 21 November 2025
    • Link between Business Continuity and Cybersecurity
    • PECB ISO 27001 Certification Course: 17 – 21 Novembre 2025
    • FunkLocker Ransomware Detection: FunkSec Operators Leverage AI to Target U.S., Europe, and Asia
    • PECB ISO 22301 Certification Training – Why Is Business Continuity Important?
  • Recent Comments

    No comments to show.

Contact

  • info@sigmateq.co.za
  • +27 87 153 8656
  • sigmateq.co.za

Address

  • #32, Private Bag X9976 Sandton 2146

Explore

  • Home
  • About
  • Services
  • News
  • Contact
Copyright © 2000 - 2022 Siqmateq, All Right Reserved.