Kaspersky Lab recently announced the extension of its partnership with the South African Banking Risk Information Centre (SABRIC). The Moscow-based anti-virus provider renewed the memorandum of understanding (MOU) signed with the SABRIC in October 2017. According to the MOU, Kaspersky Lab offers specialized cybersecurity training to security professionals in South Africa’s major banks.
Formed by four major banks in South Africa, SABRIC is a non-profit organization that works to detect and prevent cybercrimes in the banking industry through public-private partnerships.
“The advent of digital technology has seen cybercrime increase at an alarming rate, as it is virtual in nature, enabling it to transcend time and physical proximity. In addition, the convenience and anonymity of the internet make it easy for criminals to perpetrate these crimes. Industry collaboration is, therefore, a critical component in the fight against organized cybercrime in the financial services space, and we therefore welcomed the opportunity to partner with Kaspersky Lab – given their immense expertise in global cybersecurity and deep threat intelligence,” said Kalyani Pillay, CEO at SABRIC.
“Today, no industry can operate optimally without technology. Yet this dependence on IT means that cyber threats are a growing global problem and as such, expertise in IT security has become critically important. Kaspersky Lab understands the world’s cyber threat landscape and our experts possess immense knowledge and experience in the detection and protection against growing threats. Transferring these skills is critical in the fight against cybercrime. This MOU has helped us to achieve just this, and we hope to continue working with SABRIC in this regard,” said Ben Gaum, Enterprise Lead at Kaspersky Lab Africa.
In related news, Kaspersky Lab recently uncovered AppleJeus, a malicious operation by North Korea’s cyber-hacking outfit ‘Lazarus Group’ to intrude on cryptocurrency exchanges and applications. Kaspersky Lab’s Global Research and Analysis Team (GReAT) discovered the unusual activity of attackers who penetrated into the network of an Asia-based cryptocurrency exchange using Trojanized trading software to steal cryptocurrencies.