CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◉ Threat Intelligence Mar 21, 2026

Afripol Focuses on Regional Cyber Challenges, Deepening Cooperation - Dark Reading

Dark Reading Archived Mar 21, 2026 ✓ Full text saved

Afripol Focuses on Regional Cyber Challenges, Deepening Cooperation Dark Reading

Full text archived locally
✦ AI Summary · Claude Sonnet


    CYBERSECURITY OPERATIONS CYBER RISK THREAT INTELLIGENCE MOBILE SECURITY NEWS Breaking cybersecurity news, news analysis, commentary, and other content from around the world, with an initial focus on the Middle East & Africa and the Asia Pacific Afripol Focuses on Regional Cyber Challenges, Deepening Cooperation Rapid digitization, uneven cybersecurity know-how, and growing cybercriminal syndicates in the region have challenged law enforcement and prosecutors. Robert Lemos,Contributing Writer December 17, 2025 4 Min Read SOURCE: JURGENS POTGIETER VIA SHUTTERSTOCK Law enforcement representatives from more than 40 African nations met Dec. 10 to discuss the ongoing challenges presented by cross-border cybercrime, standardizing on essential equipment and infrastructure, and educating officers on how to investigate and prosecute cybercrimes. At the Sixth Meeting of the Heads of National Liaison Offices (NLOs) in Algiers earlier this month, law-enforcement representatives from African nations discussed improving digital connectivity, widening the access to training for cyber investigations, and focusing on data to inform policing strategies, according to a statement published Dec. 10. The meeting marks progress of the African Union's collaborative law enforcement organizations, which have struggled with cross-border investigations into cybercriminal organizations over the past five years, but has recently marked significant wins. "The progress we have achieved in digital platforms, training delivery, and national coordination reflects the collective determination of our Member States to enhance their policing capabilities," Benaired Mohamed, the head of Afripol's Training and Capacity Building Division, said in the statement. Related:Operation Red Card 2.0 Leads to 651 Arrests in Africa African has experienced significant growth in digital adoption, but that growth has come with a rise in cybercrimes and cyberattacks. As a greater share of citizens access online services, often through mobile devices, cybersecurity has lagged, with African companies and government organizations failing to establish strong cyber-resilient infrastructure and services. The fast adoption of AI technologies promises to bolster national economies, but gives cybercriminals better tools to use in attacks.   While the number of cyberattacks against the average African organizations has declined over the year, it still remains well above the global average. Source: Check Point Software As a result, African organizations experienced an average of 3,153 cyberattacks every week in 2025, 61% higher than the global average, according to the report "2025 African Perspectives on Cyber Security," published by cybersecurity firm Check Point Software. The continued elevated risk for Africa means that law enforcement organizations need to improve quickly, says Ian Van Rensburg, head of security engineering Africa at Check Point Software. "Cross-border cooperation is now essential, as cybercriminals exploit legal and technical gaps between nations," he says. "But challenges remain: varying laws and concerns over data sensitivity still slow evidence sharing, even as digital threats move in real time." 'They're Talking to Each Other' While African nations have taken steps to improve and advance their legal frameworks and to gain the necessary skills to investigate and prosecute cybercrimes more effectively, legal and judicial gaps remain, as well as a lack of training opportunities and a shortfall in investigatory capacity, says Neal Jetton, director of Interpol's cybercrime unit. Related:Extra Extra! Announcing DR Global Latin America "The primary change for law enforcement is that we are always playing catch-up to the cybercriminals due to the evolving nature of the cybercriminal landscape," Jetton says. "The need for specialized cybercrime units is recognized by [African] law enforcement and being implemented." Over the past five years, African law enforcement agencies have dramatically improved their sophistication and their capabilities for collaboration, says Check Point's Van Rensburg. Coordinated operations across multiple countries are no longer exceptions, and investigations of entire criminal organizations are possible. In the past two years, Afripol and national law enforcement agencies have collaborated with Interpol and private companies to investigate cybercriminals gangs, seize their assets, and take down their infrastructure. "It's not perfect, but it's progress," Van Rensburg says, adding, "Five years ago, if a hacker in Lagos scammed someone in Nairobi, both countries would open separate investigations that went nowhere. Now? They’re talking to each other." Related:Cyberattacks Likely Part of Military Operation in Venezuela Building Capacity and Collaboration Among the priorities for Afripol are the adoption of investigative tools that can adapt to the latest criminal tactics and techniques to help agencies deal with the fast-moving threat landscape and regular training for investigators, rather than annual seminars, says Check Point's Van Rensburg. In addition, the national police agencies have worked toward better encrypted channels for case communication and to harmonize legal frameworks, so that evidence collected in one country can be used to prosecute criminals in another country, he says. "They've made progress by standardizing digital evidence procedures, so a laptop seized in Kenya can support a prosecution in Nigeria," Van Rensburg says. "Before this, cases often collapsed due to incompatible standards." Interpol's Jetton agrees that building out law enforcement's capacity to investigate cybercrimes through training and cooperation is critically important. The only way to prosecute cybercriminals syndicates, which are increasingly moving in from Southeast Asia, is to cooperate regionally and internationally, he says. "It is important for Interpol and Afripol to work together to build a unified and effective response targeting transnational cyber threats," Jetton says, pointing to initiatives like Interpol's African Joint Operation against Cybercrime (AFJOC), which leverages Interpol global network and intelligence-sharing mechanisms with Afripol's regional network and focus to plan, coordinate, and executive effective regional operations. "The benefits of cross-border collaboration are many," he says. "For both organizations [Interpol and Afripol], cross-border collaboration is a strategic priority, and both are working to strengthen institutional ties between national offices, with the goal to overcome procedural and jurisdictional barriers." Read more about: DR Global Middle East & Africa About the Author Robert Lemos Contributing Writer Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline Journalism (Online) in 2003 for coverage of the Blaster worm. Crunches numbers on various trends using Python and R. Recent reports include analyses of the shortage in cybersecurity workers and annual vulnerability trends. Want more Dark Reading stories in your Google search results? ADD US NOW More Insights Industry Reports Frost Radar™: Non-human Identity Solutions 2026 CISO AI Risk Report Cybersecurity Forecast 2026 The ROI of AI in Security ThreatLabz 2025 Ransomware Report Access More Research Webinars Building a Robust SOC in a Post-AI World Retail Security: Protecting Customer Data and Payment Systems Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need Securing Remote and Hybrid Work Forecast: Beyond the VPN AI-Powered Threat Detection: Beyond Traditional Security Models More Webinars Editor's Choice CYBERSECURITY OPERATIONS Why Stryker's Outage Is a Disaster Recovery Wake-Up Call byJai Vijayan MAR 12, 2026 5 MIN READ CYBER RISK What Orgs Can Learn From Olympics, World Cup IR Plans byTara Seals MAR 12, 2026 THREAT INTELLIGENCE Commercial Spyware Opponents Fear US Policy Shifting byRob Wright MAR 12, 2026 9 MIN READ Want more Dark Reading stories in your Google search results? 2026 Security Trends & Outlooks THREAT INTELLIGENCE Cybersecurity Predictions for 2026: Navigating the Future of Digital Threats JAN 2, 2026 CYBER RISK Navigating Privacy and Cybersecurity Laws in 2026 Will Prove Difficult JAN 12, 2026 ENDPOINT SECURITY CISOs Face a Tighter Insurance Market in 2026 JAN 5, 2026 THREAT INTELLIGENCE 2026: The Year Agentic AI Becomes the Attack-Surface Poster Child JAN 30, 2026 Download the Collection Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. SUBSCRIBE Webinars Building a Robust SOC in a Post-AI World THURS, MARCH 19, 2026 AT 1PM EST Retail Security: Protecting Customer Data and Payment Systems THURS, APRIL 2, 2026 AT 1PM EST Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need WED, APRIL 1, 2026 AT 1PM EST Securing Remote and Hybrid Work Forecast: Beyond the VPN TUES, MARCH 10, 2026 AT 1PM EST AI-Powered Threat Detection: Beyond Traditional Security Models WED, MARCH 25, 2026 AT 1PM EST More Webinars White Papers Autonomous Pentesting at Machine Speed, Without False Positives Fixing Organizations' Identity Security Posture Best practices for incident response planning Industry Report: AI, SOC, and Modernizing Cybersecurity The Threat Prevention Buyer's Guide: Find the best AI-driven threat protection solution to stop file-based attacks. Explore More White Papers GISEC GLOBAL 2026 GISEC GLOBAL is the most influential and the largest cybersecurity gathering in the Middle East & Africa, uniting global CISOs, government leaders, technology buyers, and ethical hackers for three power-packed days of innovation, strategy, and live cyber drills. 📌 BOOK YOUR SPACE
    💬 Team Notes
    Article Info
    Source
    Dark Reading
    Category
    ◉ Threat Intelligence
    Published
    Mar 21, 2026
    Archived
    Mar 21, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗