Over 10 years we help companies stay secure. Cyberium Converged Solutions is a values-driven technology cybersecurity solution provider.

Gallery

Contacts

A28 Kifaru (Kofisi) , Nyagumi Road, Nairobi

US +1 9808002188 KEN +254723398599

Security and Risk Management
Security and Risk Management Leaders Primer

Security and Risk Management Leaders Primer

Report By Gartner As organizations go full in with digital initiatives, security and risk management leaders must help the business actualize value in an increasingly distributed risk decision-making environment built for real-time adaptability and resilience through risk-based programs. The Gartner report helps organizations design, develop, govern and manage their specific security and risk management (SRM) […]

Cybersecurity Threat Security Vulnerabilities
CronRAT Malware Targets Linux Servers

CronRAT Malware Targets Linux Servers

Security researchers at Sansec (https://sansec.io/research/cronrat) have found a new stealth attack that targets Linux servers and uses a non-existent calendar day to stay off the radar. This Remote Access Trojan (RAT) masks the actions of the attack by using the date February 31 and targets Linux-based web stores to trigger online payment skimmer threats. The […]

Cybersecurity Threat Security Vulnerabilities
OpenSSH Moves to Prevent ‘Capture Now, Decrypt Later’ Attacks

OpenSSH Moves to Prevent ‘Capture Now, Decrypt Later’ Attacks

OpenSSH has joined the high-stakes fight to protect data from quantum computers. The latest version of the widely used encryption and connectivity tool has been fitted with new features to prevent “capture now, decrypt later” attacks linked to advancements in quantum computing. Security experts warn that advanced threat actors are already stealing and storing encrypted […]

Security Vulnerabilities
Chrome 100 Update Patches High-Severity Vulnerabilities

Chrome 100 Update Patches High-Severity Vulnerabilities

The latest Chrome security update started rolling out with patches for 11 vulnerabilities. Ten of the addressed vulnerabilities were reported by external researchers. Of these, eight are rated “high severity” and two “medium severity.” Six of the externally reported security holes are use-after-free bugs, which in some cases can lead to code execution. Five of […]

Cyber Security Program
Five Areas for Improving Cybersecurity Maturity

Five Areas for Improving Cybersecurity Maturity

Building an effective cyber security program in today’s environment is more challenging than ever. A growing amount of connected devices paired with an IT network and perimeter that is more decentralized than ever due to cloud functionality and remote work, has resulted in organizations struggling to keep security operations maintained efficiently. All this, on top […]

Cybersecurity Threat
Protect Your Organisation Against the Threat of Magecart

Protect Your Organisation Against the Threat of Magecart – The Steps Towards Mitigation

Magecart has definitely gathered mainstream media attention over the last couple of years. Perhaps it’s the high-profile nature of many of their targets (British Airways, Forbes, Equifax, Macy’s) to name but a few. Magecart is best described as a cybercrime syndicate that specialises in cyberattacks involving digital credit card theft, by skimming online payment forms. […]