TelcoNews Australia - Telecommunications news for ICT decision-makers

Data exfiltration stories - Page 8

Illustration computer server room exposed cables digital locks broken cloud security

F5 breach exposes BIG-IP code & secrets, raising global risk

Thu, 16th Oct 2025
#
cloud security
#
advanced persistent threat protection
#
supply chain
F5 has suffered a major breach exposing BIG-IP source code and security flaws, raising global risks amid limited evidence of exploitation so far.
Realistic illustration hooded figure dimly lit room computer ghostly faces deepfakes code flaws

Cyberattacks exploit AI tools, deepfakes & critical software flaws

Wed, 8th Oct 2025
#
casb
#
iam
#
risk & compliance
Cyberattackers exploit AI tools, deepfakes and software flaws like Chrome extensions and Redis to breach enterprise systems and threaten executives.
Digital cloud warning signs data leak glowing lines cybersecurity threat

Tenable exposes Gemini Trifecta flaws risking user data theft

Thu, 2nd Oct 2025
#
cloud security
#
ai security
#
data privacy
Tenable exposed three critical flaws in Google's Gemini suite enabling unseen theft of sensitive user data, now patched by Google to prevent exploitation.
Digital lock breaking data breach ai system binary code shadowy figures

Gemini security flaws exposed millions to silent data breaches

Wed, 1st Oct 2025
#
advanced persistent threat protection
#
ai security
#
data privacy
Security flaws in Google's Gemini AI exposed millions to unseen data breaches by enabling attackers to manipulate logs, search history and browsing tools.
Digital shield surrounded by sparkling locks and abstract data streams cybersecurity defense

Elastic Security scores 99.3% in 2025 AV-Comparatives EPR test

Tue, 30th Sep 2025
#
firewalls
#
devops
#
siem
Elastic Security earned Certified status with a 99.3% effectiveness rate in AV-Comparatives' 2025 Endpoint Prevention and Response test, outperforming major rivals.
Digital lock surrounded by cloud shapes with shield icons data protection

Obsidian unveils real-time AI agent security for SaaS threats

Thu, 25th Sep 2025
#
saas
#
cloud security
#
physical security
Obsidian Security launches AI agent security to monitor and control autonomous AI risks in SaaS, addressing blind spots in cloud app data access and permissions.
Secure cloud illustration digital shields data streams monitored by security professionals

AppOmni & Cribl boost SaaS security & data control against new threats

Wed, 24th Sep 2025
#
saas
#
cloud security
#
advanced persistent threat protection
AppOmni and Cribl join forces to enhance SaaS security, offering improved visibility and data control to counter evolving cyber threats like UNC6395 attacks.
Ps shadowleak social tile 01

ShadowLeak exploit exposes ChatGPT users to silent AI data theft

Fri, 19th Sep 2025
#
advanced persistent threat protection
#
ai security
#
cybersecurity
Radware revealed ShadowLeak, a zero-click flaw letting attackers silently steal data from ChatGPT's AI agents on OpenAI servers, risking millions of business users.
Realistic illustration interconnected servers computers digital locks shields cyber threats

AI agents in business create new risks & urgent security needs

Thu, 11th Sep 2025
#
malware
#
digital transformation
#
phishing
Radware warns that autonomous AI agents in businesses expand cyber risk, urging stricter security as these systems create complex, hard-to-track attack pathways.
Shadowy figure glowing computer screen lock symbol australia cyberattack

Ransomware attacks in Australia soar by 110%, says Zscaler report

Wed, 10th Sep 2025
#
digital transformation
#
advanced persistent threat protection
#
supply chain
Ransomware attacks in Australia have surged 110% year-on-year, with manufacturing, healthcare, and government sectors hit hardest, says Zscaler report.
Double interview

Exclusive: Veeam urges faster data recovery as cyber threats escalate

Mon, 8th Sep 2025
#
data protection
#
ransomware
#
hybrid cloud
Amid rising AI-powered cyber attacks, ANZ businesses are ramping up cloud data resilience and recovery, reshaping industry strategies and investments.
Shadowy hacker using laptop with ghostly code flowing data escape

Stealerium malware surge prompts concern over new attack tactics

Sat, 6th Sep 2025
#
malware
#
advanced persistent threat protection
#
open source
Cybercriminals are increasingly exploiting open-source Stealerium malware to steal sensitive data, prompting warnings from Proofpoint researchers of new attack methods.
Computer network windows linux servers protected from ransomware threats shield

Pentera adds Cl0p ransomware testing for Windows & Linux

Thu, 4th Sep 2025
#
endpoint protection
#
encryption
#
advanced persistent threat protection
Pentera has added Cl0p ransomware testing to its platform, enabling organisations to safely assess defences on both Windows and Linux systems against this active threat.
Tense hooded figure dark room binary code shadowy office workers risk

Financial sector faces surge in cyberattacks & human risk

Thu, 4th Sep 2025
#
ransomware
#
phishing
#
advanced persistent threat protection
The global financial sector faces a 25% surge in cyberattacks for 2024, with nearly 45% of employees prone to phishing, raising critical human risk concerns.
Secure digital cloud with protective shields locks ai neural network data protection

Broadcom strengthens VMware Cloud Foundation with new AI security

Thu, 4th Sep 2025
#
firewalls
#
data protection
#
private cloud
Broadcom launches new AI-focused cyber security features for VMware Cloud Foundation to boost compliance and protect private clouds in regulated sectors.
Secure cloud network interconnected data centers cybersecurity compliance

Broadcom strengthens VMware Cloud with advanced compliance & security

Thu, 28th Aug 2025
#
firewalls
#
dr
#
private cloud
Broadcom enhances VMware Cloud Foundation with advanced compliance and security features to aid regulated organisations in tackling AI and cross-border cyber risks.
Cloud servers interconnected security breach red glowing server business office

Salesforce data theft campaign exposes SaaS integration risks

Thu, 28th Aug 2025
#
mfa
#
cloud security
#
martech
State-sponsored hackers have stolen OAuth2 tokens from Salesforce integrations, compromising hundreds of organisations and exposing risks in SaaS connectivity.
Shadowy figure surrounded by code on screens digital clouds network symbols cyber threat

Dark web job posts for AI & social engineering skills surge

Wed, 27th Aug 2025
#
malware
#
ransomware
#
cloud security
Dark web job posts for AI, cloud, and social engineering skills have surged, doubling from 2023 to 2024 and reaching 2025's total by midyear.
Cyberespionage shadowy figures accessing cloud data north america china

China-nexus hackers exploit cloud trust links in high-profile cyberespionage

Fri, 22nd Aug 2025
#
saas
#
cloud security
#
advanced persistent threat protection
China-linked hackers MURKY PANDA exploit trusted cloud relationships to conduct cyberespionage against North American government and tech sectors.
Bank building shadowy figures with laptops phishing hooks targeting employees illustration

Financial sector faces 25% jump in cyberattacks, led by phishing

Fri, 22nd Aug 2025
#
ransomware
#
phishing
#
advanced persistent threat protection
Cyberattacks on the financial sector have surged 25% in 2024, with phishing leading and nearly half of employees prone to clicking malicious links.