TelcoNews Australia - Telecommunications news for ICT decision-makers

Incident Response stories - Page 5

Flux result dad134d9 b62c 4dc7 82be c358b427e799

Dubber cuts observability costs by 25% with Grafana Cloud

Last month
#
virtualisation
#
uc
#
devops
Dubber trims observability run costs by 25% after shifting to Grafana Cloud, simplifying metrics, logs and monitoring across its global platform.
Pawel staniec catalogic software jpg

Security leaders warn backup gaps as threats evolve

Last month
#
virtualisation
#
data protection
#
dr
Security executives say organisations must move beyond simple backups, as Kubernetes, AI and ransomware strain recovery plans ahead of World Backup Day.
Flux result 86c5d3ff 8544 4b88 ac41 93781b8158bc

AppOmni adds Heisenberg mode after LiteLLM supply attack

Last month
#
virtualisation
#
cloud security
#
application security
AppOmni upgrades Heisenberg to help teams trace GitHub Actions and spot tainted dependencies after the LiteLLM supply chain breach.
Flux result 20060d8e 7292 4b00 9027 6d112c3fdc35

Gcore sees DDoS attacks surge to 1.3 million in Q4

Last month
#
gaming
#
ddos
#
network infrastructure
Gcore warns DDoS attacks hit 1.3 million in late 2025 as brief, high-volume floods and longer app assaults expose more sectors to risk.
Flux result 89c892f4 bb6f 446d ab90 b15476e99e4f

Phishing surge targets Gulf after Iran-Israel tensions

Last month
#
malware
#
firewalls
#
network security
Bitdefender reports a 130% jump in phishing and malware activity across Gulf markets, with fake invoices and banking lures driving attacks.
Flux result 5dc530d5 0ad9 41d3 92ee 0123be7b4b53

Tenable launches Hexa AI to automate security workflows

Last month
#
digital transformation
#
cloud security
#
iot security
Tenable unveils Hexa AI for its exposure management platform, promising to automate security tasks across IT, cloud and identity environments.
Tom 1

CrowdStrike extends flexible services model to partners

Last month
#
digital transformation
#
cloud security
#
advanced persistent threat protection
CrowdStrike broadens its consumption-based model into services, offering partners and new customers flexible access to incident response and advisory support.
Flux result 8910bca1 99ae 4239 a7bb 1c491f2f1d85

Ransomware attacks fall as CL0P & The Gentlemen surge

Last month
#
malware
#
firewalls
#
ddos
Qilin keeps top spot as ransomware incidents drop 8% in February, while CL0P and The Gentlemen post sharp gains and new AI risks emerge.
Daniel bernard headshot

CrowdStrike launches Charlotte AI AgentWorks ecosystem

Last month
#
hyperscale
#
cloud security
#
martech
CrowdStrike unveils Charlotte AI AgentWorks ecosystem with Accenture, AWS and OpenAI to let security teams build custom agents without code.
Flux result 57f66fd4 471b 47e6 a679 f64fe3859229

WatchGuard expands NDR portfolio for SMEs and MSPs

Last month
#
firewalls
#
network security
#
advanced persistent threat protection
WatchGuard adds embedded detection, managed monitoring and automated response to its NDR range to help SMEs and MSPs spot threats earlier.
Flux result 8926e588 7507 45de 80f7 1f3ff982140c

Veeam joins Cybersecurity Coalition as policy debates grow

Last month
#
virtualisation
#
data protection
#
dr
Veeam joins the Cybersecurity Coalition, boosting industry influence over data resilience, AI governance and post-attack recovery policy.
Flux result 110baaa4 c6d3 4b1c a508 287d019f2a12

Vorlon launches tools for AI agent security response

Last month
#
data protection
#
cloud security
#
socs
Vorlon unveils AI Agent Flight Recorder and Action Centre to help security teams trace activity across SaaS apps and coordinate responses.
Editorial ciso studying cloud saas dashboards ai security warning symbols incidents

Vorlon survey finds SaaS AI security gaps among CISOs

Last month
#
data protection
#
cloud security
#
application security
Vorlon survey reveals nearly all CISOs suffered SaaS and AI security incidents in 2025, despite high confidence in existing controls.
Flux result 21b28ffc 2d00 47ff 8fb1 45052168cbea

ControlMonkey adds observability recovery for cloud tools

Last month
#
saas
#
data protection
#
dr
ControlMonkey broadens disaster recovery to Datadog, New Relic and other observability tools, giving teams versioned snapshots of dashboards and alerts.
Secure enterprise control room ai agent nodes toolchain anomaly cloud

Miggo expands runtime defence for AI agents & tools

Last month
#
firewalls
#
network security
#
cloud security
Miggo extends its runtime security platform to map, monitor and rein in AI agents and MCP toolchains as live behaviour becomes attack focus.
Flux result 0b725e6f 488f 44c4 b57e 5c23a2bc516f

NetRise launches Provenance to trace open source risk

Last month
#
devops
#
iot security
#
iot
NetRise unveils Provenance, a tool to trace open source maintainers and stop risky dependencies before they spread through software.
Flux result f92b16d0 077a 40ea babc d8335b59a98f

Appdome launches Vault for mobile compliance history

Last month
#
mdm
#
application security
#
physical security
Appdome unveils Vault, a mobile app compliance history workspace with an AI agent to track, audit and reconstruct security controls.
Flux result 81086067 823c 4b83 a526 1c28b8e5447e

Cybermindz warns mental health absences hit cyber staff

Last month
#
advanced persistent threat protection
#
socs
#
risk & compliance
Cybermindz warns mental health-related absence could already be costing the UK, US and Australia's cyber sector more than 250,000 work days.
Flux result 9ba48638 c50c 403b 89dd 564a9c45c989

Meta AI agent exposes sensitive data in internal leak

Last month
#
data protection
#
digital transformation
#
pam
Meta says an internal AI agent's bad guidance exposed sensitive staff and user data to workers company-wide for hours, sparking security alarm.
Flux result 4cccdffa e627 44e4 9061 87014f0d98a3

AI agents blur human access lines in enterprise systems

Last month
#
data protection
#
devops
#
digital transformation
Most organisations cannot distinguish AI agents from human staff, exposing widening identity and access risks as autonomous tools spread.