Blog

Africa’s First Homegrown Spyware Fellowship: A Milestone in the Fight Against Digital Surveillance
As Africa’s digital landscape evolves, so does the threat of surveillance technology. With state actors increasingly deploying advanced spyware like

Email Sabotage: How African Civil Society Organizations Can Spot and Avoid Phishing Scams
Phishing emails are becoming more common, and are posing a serious threat to civil society organisations across Africa.

Defending Free Speech; The Crucial Role of Cybersecurity in Safeguarding the Rights of Africa’s Human Rights Defenders
In today’s world, digital security is essential for protecting freedom of speech, especially in Africa, where Civil

Infrastructure Resilience for Media Organisations and Human Rights Defenders in Nigeria
We are pleased to introduce the “Infrastructure Hardening and Digital Resilience for Media Organisations and Human Rights Defenders

Safeguarding Your Cause: Social Engineering Threats and How CSOs In Africa Can Stay Secure
Civil Society Organizations (CSOs) across Africa play a vital role in advocating for positive change, empowering communities,

Mercenary Spyware and Mitigation
A Quick Dive into Mercenary Spyware and Mitigation Techniques for African Activists
The menace of spyware has become