TelcoNews Australia - Telecommunications news for ICT decision-makers

Cybercrime stories - Page 15

Any use of network connected electronic devices such as computers or smartphones for criminal activity is classified as cybercrime. With a long history starting with the misuse of telephone systems (such as ‘phreaking’), cybercrime today includes the creation and distribution of viruses, ransomware, keyloggers and other malware, the download and use of malware produced by others, social engineering tactics such as phishing or (physical) impersonation, the theft and use of credentials for accessing computer systems or networks, and the theft of privileged data. Cybercrime is a broad and dynamic field, with cybercriminals constantly adapting their methods in pursuit of usually financial goals, but also occasionally seeking to disrupt, embarrass or shame their targets.
Digital world map asia pacific cyber risk detection binary code alerts

ThreatBook unveils ATI for APAC cyber risk detection & insight

Thu, 2nd Oct 2025
#
malware
#
siem
#
advanced persistent threat protection
ThreatBook launches its Advanced Threat Intelligence solution to enhance cyber risk detection in Asia Pacific, analysing billions of attack records daily.
Worried australian small business owner laptop digital security icons

ANZ warns small businesses after AUD $84 million cyber losses

Thu, 2nd Oct 2025
#
advanced persistent threat protection
#
email security
#
cybersecurity
ANZ warns Australian small businesses to stay vigilant as scams cause AUD $84 million losses amid rising cybercrime threats in 2024.
Smartphone app icons data streams shield privacy data protection illustration

Facebook, WhatsApp & TikTok most invasive, Discord safest

Thu, 2nd Oct 2025
#
data protection
#
data privacy
#
ai
Research finds Facebook, WhatsApp, and TikTok most privacy-invasive, while Discord tops the list for safeguarding user data and resisting AI training use.
Digital illustration secure data vault breached ai shapes futuristic padlocks quantum encryption cyber threats

Forrester forecasts agentic AI breaches & quantum spending surge by 2026

Thu, 2nd Oct 2025
#
data protection
#
encryption
#
iot security
Forrester predicts the first agentic AI data breach and a surge in quantum security spending by 2026, amid rising government control of telecoms.
Small australian business office employees computer digital shield security

Cyber insurance among small businesses surges amid rising threats

Thu, 2nd Oct 2025
#
data protection
#
ransomware
#
martech
Cyber insurance among Australian small businesses has surged 50% amid rising cybercrime threats, with incidents costing an average of AUD $49,600 each.
Camouflaged dog silhouette lurking near globe with networked computer screens

Detour Dog malware uses DNS TXT records to hijack 30,000 sites

Thu, 2nd Oct 2025
#
advanced persistent threat protection
#
cybersecurity
#
threat intelligence
The Detour Dog malware has covertly hijacked over 30,000 websites globally, exploiting DNS TXT records to deliver stealthy, location-targeted attacks.
Snarling dog silhouette behind servers network web globe icons dns infection

Detour Dog exploits DNS to target 30,000 sites with covert malware

Wed, 1st Oct 2025
#
malware
#
firewalls
#
network security
Threat group Detour Dog has exploited DNS to covertly infect over 30,000 websites since 2020, shifting from scam redirects to malware delivery via server-side attacks.
Australian small business office employees computers lock digital shield cybersecurity

Australian SMEs urged to bolster cyber defences as attacks surge

Wed, 1st Oct 2025
#
malware
#
data protection
#
mfa
As cyberattacks rise, Australian SMEs urged to boost defences with staff training and multi-factor authentication during Cybersecurity Awareness Month.
Person protected by concentric digital shields binary codes cybersecurity

Experts call for people-centred cyber resilience & data focus

Tue, 30th Sep 2025
#
advanced persistent threat protection
#
quantum computing
#
risk & compliance
Experts urge a people-centred approach to cyber resilience, focusing on human behaviour, layered defences, and robust data governance amid evolving threats.
Computer monitor travel booking website robotic hands automated bots interaction

Automated bots now account for majority of traffic to travel sites

Thu, 25th Sep 2025
#
ai
#
cybersecurity
#
online fraud
Automated bots now make up nearly 60% of visits to travel websites, disrupting bookings and prices across the global tourism sector, a new report reveals.
Realistic hacker at computer with digital symbols login screens microsoft 365 credential theft

Barracuda warns of surge in advanced OAuth phishing

Thu, 25th Sep 2025
#
firewalls
#
mfa
#
phishing
Barracuda warns of a surge in advanced OAuth phishing attacks exploiting Microsoft 365 and other platforms to steal access tokens and bypass multifactor authentication.
Shield symbol in front of computer and government building cyber protection public sector

KnowBe4 & Carahsoft partner to boost public sector cyber defences

Thu, 25th Sep 2025
#
advanced persistent threat protection
#
email security
#
education, learning & training
KnowBe4 partners with Carahsoft to enhance public sector cybersecurity by offering AI-driven human risk management via Carahsoft's reseller network and NASA SEWP V contract.
Teenagers in hoodies in dark room with glowing computer screens and digital spider web cyber attacks

Teens charged in SCATTERED SPIDER cyber attacks as experts warn of ongoing risks

Wed, 24th Sep 2025
#
ransomware
#
encryption
#
mfa
Two UK teenagers linked to SCATTERED SPIDER have been charged for cyberattacks disrupting Transport for London, amid ongoing global cyber threats.
Quantum computing breaking traditional encryption digital locks

Experts warn on risks and readiness ahead of World Quantum Day

Tue, 23rd Sep 2025
#
data protection
#
digital transformation
#
encryption
Quantum computing's rise promises breakthroughs but threatens current encryption, urging urgent adoption of post-quantum security by businesses worldwide.
Ps fvpr launch

Firevault unveils offline digital vault to combat rising cyber risks

Tue, 23rd Sep 2025
#
data protection
#
dlp
#
breach prevention
Firevault launches offline digital vault system to shield businesses and directors from rising cyber breach risks and hefty fines in the UK and worldwide.
Masked cybercriminal at computer global online phishing operations

Microsoft disrupts RaccoonO365 phishing operation targeting 365 users

Wed, 17th Sep 2025
#
malware
#
ransomware
#
mfa
Microsoft has seized 338 websites linked to RaccoonO365, disrupting a phishing service that stole 5,000 Microsoft 365 credentials across 94 countries.
Traditional bank digital security circuit patterns shadowy hackers australian

Agentic AI reshapes banking security, raising efficiency & risks

Wed, 17th Sep 2025
#
storage
#
malware
#
uc
Agentic AI is transforming Australian banking security, boosting efficiency but raising risks as cybercriminals exploit AI in 80% of ransomware attacks.
Computer screen hidden malicious code image file digital malware shadowy user

Cyber attackers use images & built-in tools to bypass defences

Mon, 15th Sep 2025
#
malware
#
phishing
#
advanced persistent threat protection
HP Wolf Security reveals cyber attackers increasingly use images and legitimate system tools to hide malware, making threats harder to detect and block.
Tired it worker at desk with monitors stress cyber defense education

Education sector improves against ransomware but IT staff suffer

Fri, 12th Sep 2025
#
edutech
#
ransomware
#
encryption
Education institutions have improved ransomware defences and reduced costs, but IT staff face high anxiety and burnout amid growing AI-driven cyber threats.
Realistic illustration interconnected servers computers digital locks shields cyber threats

AI agents in business create new risks & urgent security needs

Thu, 11th Sep 2025
#
malware
#
digital transformation
#
phishing
Radware warns that autonomous AI agents in businesses expand cyber risk, urging stricter security as these systems create complex, hard-to-track attack pathways.