TelcoNews Australia - Telecommunications news for ICT decision-makers

Incident Response stories - Page 25

Malaysia office worker laptop warning social engineering cert abuse

ReliaQuest warns of BaoLoader surge & trust attacks

Thu, 15th Jan 2026
#
firewalls
#
ransomware
#
network security
ReliaQuest warns BaoLoader and trust-based lures are surging, as attackers ditch zero-days for social engineering and valid certificates.
Enterprise soc night identity security analyst monitors network

One Identity adds AI threat response to Manager 10.0

Thu, 15th Jan 2026
#
hybrid cloud
#
siem
#
pam
One Identity's Manager 10.0 adds AI-driven threat response, risk-based governance and a new browser interface to tackle identity attacks.
Scott harrell

Infoblox to buy Axur to bolster AI-powered threat defence

Thu, 15th Jan 2026
#
malware
#
firewalls
#
network security
Infoblox agrees to buy AI-driven threat hunter Axur, aiming to curb phishing and brand abuse beyond the traditional network perimeter.
Secure multi cloud shield radar containers central console dark

Rapid7, ARMO unite to bolster cloud runtime security

Thu, 15th Jan 2026
#
hybrid cloud
#
hyperscale
#
cloud security
Rapid7 partners with ARMO to embed cloud runtime detection into its Command Platform, unifying exposure management and live threat response.
Moody phone cracked shield leaked data fragments hacker shadows

Instagram denies breach after 17m user records leak

Thu, 15th Jan 2026
#
data protection
#
mfa
#
phishing
Instagram denies a data breach after a dataset on 17m users appears on hacking forums, blaming old leak scraps and a fixed reset bug.
Dark ops room analysts monitors network alerts las vegas night scene

Black Hat to debut cyber war room documentary in Vegas

Thu, 15th Jan 2026
#
ransomware
#
advanced persistent threat protection
#
socs
Black Hat will premiere Semperis documentary Midnight in the War Room in Las Vegas, spotlighting the human cost of cyber conflict.
It control room cyberattack recovery blue network resilience

2026: Resilience, the new foundation of cybersecurity

Thu, 15th Jan 2026
#
data protection
#
dr
#
ransomware
Cybersecurity in 2026 pivots from building higher walls to one core question: how fast can organisations recover when attacks inevitably hit?.
Cinematic circuitry padlock over data center racks digital network

AI's 2026 security fallout: identity chaos & deepfake fear

Wed, 14th Jan 2026
#
digital transformation
#
cloud security
#
phishing
OpenText warns 2026 will bring an AI‑driven identity crisis, deepfake-fuelled scams and decision overload that many firms are not ready for.
Adlink

ADLINK gains IEC 62443-4-1 nod for secure edge R&D

Wed, 14th Jan 2026
#
robots
#
uc
#
devops
ADLINK secures IEC 62443-4-1 certification, formalising a secure-by-design R&D framework for its industrial edge and OT computing products.
Pieter danhieux

Agentic AI double agents expose dangerous security gaps

Wed, 14th Jan 2026
#
application security
#
devsecops
#
supply chain
Agentic AI promises rapid software gains, but a recent Claude Code cyberattack shows how “double agents” can outpace unprepared developers.
Korean office network room unlocked server identity breach scene

Kyowon, Instagram cases expose APAC identity flaws

Wed, 14th Jan 2026
#
pam
#
mfa
#
phishing
Kyowon outage and an Instagram bug expose entrenched identity security gaps across APAC, from credential hygiene to privileged access.
Anz office control room ai governance dashboard cloud security

Progress forecasts orchestration-led AI shift in 2026

Wed, 14th Jan 2026
#
data protection
#
hybrid cloud
#
digital transformation
Progress predicts 2026 will mark a shift from AI pilots to orchestrated, governed platforms, widening the gap between leaders and laggards.
Cloud datacenter soc at night dashboards malicious ai bot traffic

Hydrolix unveils Bot Insights to expose costly AI bots

Wed, 14th Jan 2026
#
cloud security
#
socs
#
edge security
Hydrolix launches Bot Insights to reveal hidden AI bot traffic and six-figure cost leaks, promising real-time visibility across CDNs.
George gerchow

AI to transform business risk, trust & compliance by 2026

Wed, 14th Jan 2026
#
uc
#
data protection
#
dr
AI will reshape risk, trust and compliance in 2026 as firms swap hype for embedded tools, tighter controls and higher regulatory scrutiny.
Corporate boardroom dusk cyber supply chain security locks chains

Codific sets 2026 priorities for boards on cyber risk

Tue, 13th Jan 2026
#
data protection
#
ransomware
#
cloud security
Codific urges boards to prioritise preemptive cyber defence, identity and supply-chain control as 2026 scrutiny and rules tighten.
Motorola solutions avigilon visual alerts 1

Motorola unveils AI Visual Alerts for on-prem security

Tue, 13th Jan 2026
#
data protection
#
digital transformation
#
edge computing
Motorola launches Avigilon Visual Alerts, an on-prem AI system that spots bespoke safety and security risks across complex camera networks.
Small office cybersecurity cloud shield network minimalist illustration

CrowdStrike & Nord Security partner to target SMBs

Tue, 13th Jan 2026
#
firewalls
#
digital transformation
#
network security
CrowdStrike teams with Nord Security to bundle Falcon tools with secure access for SMBs via NordLayer and MSP marketplace Pax8.
Cinematic neural shield over corporate office cybersecurity scene

Agentic AI poised to transform cyber defence & search

Sat, 10th Jan 2026
#
digital transformation
#
cx
#
martech
Agentic AI is set to move from hype to frontline tool by 2026, autonomously steering cyber defence workflows and search-led marketing.
Macbook system alert with unplugged logitech mouse headset desk

Logitech issues manual macOS patches after apps fail

Sat, 10th Jan 2026
#
gaming
#
digital entertainment
#
windows
Logitech users on macOS must install manual patches for Options+ and G Hub after an expired certificate stopped both apps from launching.
Office desktop update popup shadowy reflection hidden malware scene

HP warns of surge in polished fake updates & malware

Fri, 9th Jan 2026
#
malware
#
virtualisation
#
mfa
HP reports a surge in convincing fake software updates and staged prompts that trick users into installing stealthy, rapidly evolving malware.