• Latest
  • All
  • How To
Screenshot of KEBS stolen data on auction

KEBS Suffers A Massive Data Breach

July 25, 2023
Peak Points

YouTube to Drop Ads When You’re Most Glued to the Screen

May 15, 2025
Safaricom-IXAfrica-Centres-1

Safaricom Partners with iXAfrica to Build Region’s First AI-Ready Data Centre

May 15, 2025
samsung one ui 8

One UI 8 Update: Is Your Samsung Device on the List?

May 15, 2025
Apple Music

Apple Music Now Lets Spotify Users Seamlessly Transfer Playlists

May 15, 2025
DHgate Tablet Cases deals
Kennedy Kachwanya, Chairperson BAKE

High Court Issues Ban on Internet Shutdowns by Government and Mobile Operators

May 14, 2025
Advanced Protection feature

Google Expands Advanced Protection in Android 16 to Tackle Spyware Threats

May 14, 2025
YouTube

YouTube Cracks Down on AI-Generated Fake Movie Trailers as Studios Quietly Profit

May 14, 2025
tiktok-ai

TikTok Launches AI Tool to Animate Photos into Short Videos

May 14, 2025
spotify-ai-dj

Spotify AI DJ Gets Smarter with Voice Command Personalisation

May 14, 2025
Infinix note 50 pro

Infinix Note 50 Pro Now Available for Pre-Order in Kenya

May 14, 2025
Google keep

You Can Now Bold and Format Text in Google Keep on the Web

May 13, 2025
Vivo-V50-Lite-5G-1

Vivo V50 Lite 5G Now Available for Pre-Order in Kenya

May 13, 2025
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
No Result
View All Result

KEBS Suffers A Massive Data Breach

ElvyLewis Ndungu by ElvyLewis Ndungu
July 25, 2023
in News
Reading Time: 3 mins read
261
0
Screenshot of KEBS stolen data on auction

The Kenya Bureau of Standards (KEBS) has suffered a massive data breach after being hit by a ransomware attack.

According to a report by FalconFeedsio, KEBS has been targeted by Rhysida Ransomware Group with the group publishing their data after KEBS failed to pay the ransom.

KEBS is the latest Government agency to suffer a data breach after Kenya Airport Authority (KAA) suffered a similar fate back in May.

About The Breach

The Rhysida Ransomware group is responsible for the attack and breach. The group has published 739GB of data belonging to KEBS for auction on the dark web after KEBS failed to pay the ransom.

The data entails sensitive information including financial records, emails, and product testing data.

Rhysida Ransomware Group

According to SentinelOne, the Rhysida Ransomware group was first observed in May this year. Since then, the group has been involved in several high-profile attacks around the world with their recent victim being KEBS.

Rhysida is deployed in several ways including phishing campaigns or via Cobalt strike or similar frameworks. The group then threatens the victims with public distribution of the stolen data if their demands are not met.

There has been a significant increase in the number of ransomware attacks with dire consequences following compromised organizations and businesses.

The recent surge in the frequency and sophistication of these attacks should be of concern to companies and organizations.

How to Protect Yourself From Malicious Banking Applications

Cybersecurity Practices Organizations Can Take to Safeguard Their Data

There are several measures that a company can take to safeguard their systems and protect their data from cyber threats. Such measures include:

  • Conducting regular security assessments and audits to identify potential systems vulnerabilities. In addition, this is to ensure that appropriate security controls are engaged and working correctly.
  • Educating and training employees on the best cyber security practices. Cybersecurity awareness training will help employees identify potential cyber threats they may encounter in emails or on the web.
  • Implementing proper password policies. Good password management policies include the use of strong passwords and enabling two-factor authentication on all systems.
  • Conducting regular network traffic scans and monitoring to identify potential threats.
  • Use of trusted and reputable anti-malware applications or tools capable of defending against malware threats.
  • Regular updates and patching of systems to fix known vulnerabilities.
  • Regular backup of data and implementing recovery plans. This will allow organizations to restore a copy of its in the event of an attack.

KEBS is yet to comment on the attack and data breach.

Tags: KEBS
SendShare152Tweet95
ElvyLewis Ndungu

ElvyLewis Ndungu

Just a guy who loves to code and has a passion for storytelling | Bringing you the latest on all things tech. You can reach me via [email protected] or on Twitter.

Related Posts

New KEBS Standard To Ensure ICT Products Are Accessible To The Impaired

New KEBS Standard To Ensure ICT Products Are Accessible To The Impaired

June 2, 2022
KEBS Intros New and Limited Access to Standards for Food Products

KEBS Intros Seamless System for Import Export Approvals

May 6, 2021
KEBS Intros New and Limited Access to Standards for Food Products

KEBS Intros New and Limited Access to Standards for Food Products

May 4, 2021
How to Report Substandard Masks to KEBS As Agency Supports Local Manufacturing

How to Report Substandard Masks to KEBS As Agency Supports Local Manufacturing

August 12, 2020
Kenya Bureau of Standards Details Under Par Masks During COVID-19

Kenya Bureau of Standards Details Under Par Masks During COVID-19

August 13, 2020
KEBS

Kenya Bureau of Standards Revises Standardization Scheme to Ease Product Certification

July 1, 2020

Latest

Peak Points

YouTube to Drop Ads When You’re Most Glued to the Screen

May 15, 2025
Safaricom-IXAfrica-Centres-1

Safaricom Partners with iXAfrica to Build Region’s First AI-Ready Data Centre

May 15, 2025
samsung one ui 8

One UI 8 Update: Is Your Samsung Device on the List?

May 15, 2025
Apple Music

Apple Music Now Lets Spotify Users Seamlessly Transfer Playlists

May 15, 2025
Kennedy Kachwanya, Chairperson BAKE

High Court Issues Ban on Internet Shutdowns by Government and Mobile Operators

May 14, 2025
Advanced Protection feature

Google Expands Advanced Protection in Android 16 to Tackle Spyware Threats

May 14, 2025

Best devices

budget smartwatches 2025

Best Budget Smartwatches To Buy in Kenya 2025

February 13, 2025

Best Infinix Smartphones To Buy in Kenya 2024

February 13, 2025

Best Laptops for Battery Life in 2024

August 21, 2024

Best “Battery Warrior” Smartphones To Buy in 2024

August 22, 2024

YouTube to Drop Ads When You’re Most Glued to the Screen

May 15, 2025

Safaricom Partners with iXAfrica to Build Region’s First AI-Ready Data Centre

May 15, 2025

Techweez is a fast growing influential source of technology news, reviews and analysis by leading tech geeks in the industry.

Follow Us

Editorials

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

Trump’s Tariffs Will Be the End of Affordable Tech

5 Ways to Prep Your Tech for Resale

The Weaponization of PDFs: How Cybercriminals Are Exploiting a Trusted Format

Introducing A Brainbox Quiz: Techweez’s Monthly Trivia Night!

5 Most Reliable Virtual Dollar Card Providers in Nigeria

More News

YouTube Cracks Down on AI-Generated Fake Movie Trailers as Studios Quietly Profit

TikTok Launches AI Tool to Animate Photos into Short Videos

Spotify AI DJ Gets Smarter with Voice Command Personalisation

Infinix Note 50 Pro Now Available for Pre-Order in Kenya

You Can Now Bold and Format Text in Google Keep on the Web

Vivo V50 Lite 5G Now Available for Pre-Order in Kenya

  • Terms Of Use
  • Techweez Brand
  • Privacy & Policy
  • Contact Us

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!

Hey there! Just a heads-up: we're big fans of cookies - both the digital and edible kind! 🍪 We use our cookies and some from third parties to ensure your browsing experience on our site is smooth sailing and secure.

 

But wait, there's more! We also use cookies to gather stats and insights on how you navigate our site. It's like getting a behind-the-scenes peek at your digital adventures!

 

Don't worry, you're in control. You can adjust your cookie settings anytime to suit your preferences. Feeling curious? Dive into our Privacy Policy for all the juicy details. Happy browsing! 🚀

Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
No Result
View All Result
  • News
  • Reviews
  • Features
  • Editorial
  • Automotive
  • Entertainment

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.