Home Resources
Knowledge Hub

Intelligence, Insights &
Threat Research

Threat reports, security advisories, blog posts, and whitepapers from Citadel Africa's analyst team — grounded in the Kenyan and East African threat landscape.

All Resources
Showing 9 resources
Blog Post
Blog Post March 2026 8 min read
Ransomware in East Africa: How Attackers Are Targeting Kenyan Enterprises in 2026

A breakdown of the ransomware groups most active in Kenya, the sectors they are targeting, and the specific attack vectors security teams need to defend against right now.

Ransomware Kenya Defence
Read Article →
Whitepaper
Whitepaper February 2026 22 min read
Securing Large Language Models: A Practical Guide for African Enterprise Teams

As African enterprises adopt LLM-powered applications, this whitepaper covers the specific attack surface they introduce — from prompt injection to model inversion — and the controls that actually work.

AI Security LLM Governance
Download Whitepaper →
Blog Post
Blog Post February 2026 6 min read
Business Email Compromise: Why Kenyan Finance Teams Remain the Most Targeted

BEC losses in Kenya's financial sector continue to climb. This piece examines the social engineering techniques attackers use, the red flags most staff miss, and the controls that can stop a fraudulent transfer.

BEC Finance Phishing
Read Article →
Case Study
Case Study January 2026 10 min read
How a Kenyan Financial Institution Contained a Ransomware Attack in Under 4 Hours

An anonymised account of a Citadel Africa incident response engagement — from the first call to containment, forensic analysis, and recovery. What worked, what almost didn't, and the lessons learned.

Ransomware IR Financial Sector
Read Case Study →
Blog Post
Blog Post January 2026 9 min read
Kenya's Data Protection Act in 2026: What Security Professionals Need to Know

A practical guide to Kenya's data protection landscape — the obligations that matter most, the enforcement actions that have set precedent, and the security controls that satisfy both the regulator and reduce actual risk.

Compliance DPA Kenya
Read Article →
Whitepaper
Whitepaper December 2025 18 min read
Beyond the Checkbox: What a Real Penetration Test Looks Like and What It Should Deliver

Most organisations have had a pentest that produced a long list of CVEs they couldn't action. This whitepaper explains what a genuine, intelligence-led penetration test looks like — and how to brief and evaluate one.

Pen Testing Methodology Guide
Download Whitepaper →
Threat Report
Threat Report November 2025 15 min read
Mobile Money Threat Report: SIM-Swap and Fraud Attacks Targeting East Africa

A focused threat report on the criminal groups targeting Kenya's mobile money ecosystem — how SIM-swap fraud operations work, the scale of the problem, and the defensive measures that financial institutions should be implementing now.

Mobile Money SIM-Swap Fraud
Read Report →
Blog Post
Blog Post October 2025 7 min read
Why Every Kenyan Enterprise Needs an Incident Response Retainer Before It Needs One

The organisations that recover fastest from breaches are not necessarily the most secure — they are the ones that had a plan and a team ready before the attack happened. Here is why retainers exist and what to look for in one.

Incident Response Retainer Preparation
Read Article →
Threat Report
Coming Soon
Threat Report Q2 2026
Kenya Government & Public Sector Threat Report 2026

An in-depth analysis of the threat actors targeting Kenyan government institutions, public sector infrastructure, and state-owned enterprises — with actionable intelligence for security and ICT teams.

Government Public Sector APT
Notify me when published →

What We Publish

Four content formats — each designed for a different audience and purpose.

Threat Reports

In-depth intelligence reports on specific threats, threat actors, or the broader East African threat landscape. For CISOs and security managers who need strategic context.

Blog Posts

Shorter, practical articles on current threats, security techniques, and industry developments — written for security professionals and technically-minded business leaders.

Whitepapers

Deep technical or strategic papers on specific security domains. For practitioners, architects, and procurement teams making informed security investment decisions.

Case Studies

Anonymised accounts of real Citadel Africa engagements — what happened, how we responded, and what the outcome was. Evidence over assertion.

Stay Informed
Monthly Threat Intelligence Briefing

Receive Citadel Africa's monthly threat intelligence summary — the most significant threats active in Kenya and East Africa, delivered to your inbox on the first Monday of each month. No spam, no sales pitches. Just intelligence.

By subscribing, you agree to our Privacy Policy. Unsubscribe at any time.

Work With Us

Need a Custom Threat Briefing for Your Organisation?

Our threat intelligence team can produce a bespoke sector or organisation-specific threat briefing — going deeper than our public content. Contact us to discuss.