Intelligent Tech Channels Issue 48 | Page 13

SECURITY NEWS
LogRhythm partners with SecLytics to deliver enhanced cybersecurity capabilities in Middle East

LogRhythm , a company powering security operations centres ( SOCs ) has partnered with SecLytics , a predictive threat intelligence solutions provider , to transform the security posture and streamline operations for SOC teams in the Middle East . Under the accord , LogRhythm and SecLytics will work hand-in-hand to provide enhanced threat intelligence capabilities and highperformance analytics , to mitigate new and evolving risks in the region . Through the collaboration , LogRhythm and SecLytics will enable organisations in the Middle East to seamlessly deliver Digital Transformation and protect their end-users with aligned early threat detection and response solutions .

“ Data breaches in the MENA region are reported to have reached an average cost of around $ 6.5 million , which is well above the global average incident cost of near $ 4 million ,” said Mazen A . Dohaji , Vice President , India , Middle East , Turkey & Africa ( iMETA ) at LogRhythm . “ Cybersecurity risks in the Middle East are becoming increasingly sophisticated and this is causing organizations in the region to suffer notable losses . Overcoming new threats requires cybersecurity organizations to bring together their capabilities to build a protected threat environment for businesses in the region . Our collaboration with SecLytics is building a security-first future in the Middle East ”
Saeed Abu-Nimeh , Co-Founder and CEO , SecLytics , said : “ We are working with LogRhythm to transform cyber resiliency in the Middle East and enable organisations to expand their applications and services without risk .”
Kaspersky reports on next level gamechangers in ransomware distribution and monetisation in South Africa , Kenya and Nigeria

As part of the analysis of the cybersecurity landscape in South

Africa , Kenya and Nigeria in 2021 , Kaspersky researchers have selected ransomware as the most dynamically changing type of threat . As the overall number of ordinary malware attacks in the region has decreased , ransomware operators have transformed their strategies to double extortion models .
The double extortion model first emerged in 2020 , when in addition to the ordinary ransom demands for the decryption code for victims ’ encrypted files , the ransomware operators have begun to also add a threat to publish the company ’ s papers online for everyone to see . In 2021 Darkweb forums or other platforms , including specifically created websites , saw a significant number of double extortion ransomware victim ’ s data disclosed .
According to Kaspersky , the reason for such a trend was the fact that nowadays most companies back up data , so they are no longer interested in paying a large sum of money for the return of encrypted documents . While it is common for cybercriminals to test a malware in a certain country and then shift to another one , the ransomware operators in South Africa , Kenya and
Nigeria seem to constantly circulate from one region to another : the moment one ransomware wave passes over one of the countries , the operator seems to quickly recall the operations and shift them to another region . •
INTELLIGENT TECH CHANNELS Issue 48 13