Go to main content
Home

Home
  • Home
  • CYBER-ACTU
  • CYBER
    • CYBERDOC
    • BUSINESS ANALYTICS
    • CYBERJURIDICTION
    • CYBERINTERVIEW
    • ECONOMICS OF CYBERSECURITY
    • GEOCYBER & CYBERSTRATEGY
  • GOOD PRACTICES
    • CYBER GOOD PRACTICES
    • TOOLBOX
  • ANALYSIS
    • AFTER DEATH
    • FORENSICS
  • CYBER ALERTS
  • CYBER-TV
  • SCHEDULE

Main navigation

  • Home
  • CYBER-ACTU
  • CYBER
  • GOOD PRACTICES
  • ANALYSIS
    • AFTER DEATH
    • FORENSICS
  • CYBER ALERTS
  • CYBER-TV
  • SCHEDULE

ANALYSES FORENSICS

Fil d'Ariane

  1. Home
ANALYSE FORENSICS

Detailed analysis of Windows kernel driver vulnerabilities

16/01/2022
ANALYSE FORENSICS

Android/FakeAdBlocker hijacks URL shortening services and iOS calendars to deliver Trojans to Android devices

26/07/2021
ANALYSE FORENSICS

And the Egregor ransomware

23/12/2020
ANALYSE FORENSICS

Africa Cybersecurity Mag website inaccessible: Fault, bug or human error?

30/11/2020
ANALYSE FORENSICS

The bjCSIRT analyzes the malicious wordpress plugin IOptimization

27/08/2020
without
ANALYSE FORENSICS

SANS DFIR Summit 2019 - Recap

29/09/2019
Home

Africa CyberSecurity Mag is a specialized magazine on Cybersecurity, CyberDefence, CyberJurisdiction and Digital Protection published by the company CyberSpector . The magazine focuses on CyberSecurity news in Africa and around the world and organizes several specific activities (conferences, webinars, study and reflection days).

Email : contact@cybersecuritymag.africa

Africa Cyber News

South Africa
Algeria
Angola
Botswana
Burkina Faso
Burundi
Benign
Cameroon
Cape Verde
Central African Republic
Comoros
Ivory coast
Djibouti
Eswatini
Egypt
Eritrea
Ethiopia
Gabon
Gambia
Ghana
Guinea
Guinea-Bissau
Equatorial Guinea
Kenya
Lesotho
Liberia
Libya
Madagascar
Malawi
Mali

 

Morocco
Mauritius
Mauritania
Mozambique
Namibia
Niger
Nigeria
Uganda
Rwanda
RD Congo
Rep. Congo
Seychelles
Sierra Leone
Somalia
Sudan
South sudan
Senegal
Saint Thomas
Tanzania
Chad
Togo
Tunisia
Zambia
Zimbabwe

 

 

Tous droits réservés Africa Cybersecurity Mag by CyberSpector - 2023

Footer

  • Confidentiality
  • CGU
  • Cookies
  • Legal Notice
  • Newsletters
  • Sitemap
  • RSS
  • About
  • Contact