TelcoNews Australia - Telecommunications news for ICT decision-makers

Infosec stories - Page 28

Laptop with secure browser windows and locks cybersecurity scene

CrowdStrike to buy Seraphic to secure browser sessions

Wed, 14th Jan 2026
#
endpoint protection
#
pam
#
cloud security
CrowdStrike moves deeper into browser security with Seraphic buy, tying in SGNL identity tech to protect in-session activity and AI use.
Glowing security shield over windows pc retiring legacy drivers

Microsoft patches zero-day, kills legacy Windows drivers

Wed, 14th Jan 2026
#
mdm
#
risk & compliance
#
cybersecurity
Microsoft's first 2026 Patch Tuesday fixes an exploited DWM zero-day, strips decades-old modem drivers and tackles Secure Boot risks.
Hybrid cloud landscape glass data sphere on tightrope profit pressure

AI in 2026: fragile data, hybrid clouds & profit race

Wed, 14th Jan 2026
#
saas
#
data protection
#
dr
AI in 2026 will be less about dazzling breakthroughs and more about fragile data, hybrid clouds and investor pressure for real profits.
George gerchow

AI to transform business risk, trust & compliance by 2026

Wed, 14th Jan 2026
#
uc
#
data protection
#
dr
AI will reshape risk, trust and compliance in 2026 as firms swap hype for embedded tools, tighter controls and higher regulatory scrutiny.
Corporate boardroom dusk cyber supply chain security locks chains

Codific sets 2026 priorities for boards on cyber risk

Tue, 13th Jan 2026
#
data protection
#
ransomware
#
cloud security
Codific urges boards to prioritise preemptive cyber defence, identity and supply-chain control as 2026 scrutiny and rules tighten.
Ciso glass office cloud servers machine identities access locks

CSPM set to vanish as machine identities drive risk

Tue, 13th Jan 2026
#
firewalls
#
network security
#
pam
CSPM tools will vanish as a separate market by 2026, Tenable says, as CISOs pivot spend to machine identity risk and permissions sprawl.
Smart home night scene shadowy fox iot cyber espionage threat

Silver Fox APT & PowerG flaws expose key security risks

Tue, 13th Jan 2026
#
uc
#
encryption
#
iot security
NCC Group links Silver Fox's false-flag malware campaigns to ValleyRAT and uncovers critical PowerG flaws that can fully compromise alarms.
Small office cybersecurity cloud shield network minimalist illustration

CrowdStrike & Nord Security partner to target SMBs

Tue, 13th Jan 2026
#
firewalls
#
digital transformation
#
network security
CrowdStrike teams with Nord Security to bundle Falcon tools with secure access for SMBs via NordLayer and MSP marketplace Pax8.
Experts

AI, geopolitics & supply chains reshape cyber risk

Tue, 13th Jan 2026
#
data protection
#
ransomware
#
digital transformation
Rapid AI rollout, geopolitical rifts and fragile supply chains are upending cyber risk, straining outdated security and compliance regimes.
Blockchain chain around glowing circuit lock quantum safe blue

Zama forecasts privacy-first, quantum-safe finance

Mon, 12th Jan 2026
#
data protection
#
encryption
#
cloud security
Zama predicts privacy-first compliance tools and quantum-safe cryptography will become standard for regulated onchain finance by 2026.
Multicloud soc analysts filtering aws azure gcp security alerts

Astra unveils cloud scanner to cut misconfig alert noise

Mon, 12th Jan 2026
#
devops
#
hyperscale
#
cloud security
Astra launches a continuous cloud scanner for AWS, Azure and GCP, promising fewer false alerts by validating which risks are truly exploitable.
Moody illustration ai driven financial scams puppet trading phone

AI-driven 'Truman Show' trading scam hits app stores

Mon, 12th Jan 2026
#
mfa
#
crypto
#
fintech
AI-powered 'Truman Show' scam uses OPCOPRO app and fake trading rooms in official stores to steal cash and victims' digital identities.
Hybrid on prem private cloud to public cloud secure data flow

Concentric AI brings Private Scan Manager to Azure

Sat, 10th Jan 2026
#
data protection
#
private cloud
#
hybrid cloud
Concentric AI launches Private Scan Manager on Azure, letting regulated sectors keep sensitive data in private cloud while using SaaS tools.
Cinematic browser shattered glass keys spilling leaked tokens

Intruder uncovers 42,000 leaked tokens in web apps

Sat, 10th Jan 2026
#
devops
#
cloud security
#
application security
Intruder finds over 42,000 sensitive tokens hidden in JavaScript bundles, exposing a major blind spot in modern web app security tools.
Interlocking shields secure data exchange between office buildings

Kiteworks & Concentric AI partner on data security

Fri, 9th Jan 2026
#
data protection
#
encryption
#
cloud security
Kiteworks and Concentric AI join forces to tie AI-driven data discovery to automated controls on sensitive information shared externally.
Office desktop update popup shadowy reflection hidden malware scene

HP warns of surge in polished fake updates & malware

Fri, 9th Jan 2026
#
malware
#
virtualisation
#
mfa
HP reports a surge in convincing fake software updates and staged prompts that trick users into installing stealthy, rapidly evolving malware.
Glowing neural network shield protecting hybrid multicloud data

Thales unveils AI Security Fabric for runtime threats

Fri, 9th Jan 2026
#
data protection
#
hybrid cloud
#
digital transformation
Thales launches AI Security Fabric to shield enterprise LLM and agentic AI apps from runtime threats like prompt injection and data leakage.
Robotic puzzle arm over corporate network risky ai security

OWASP unveils first Top 10 risks for agentic AI use

Fri, 9th Jan 2026
#
data protection
#
endpoint protection
#
digital transformation
OWASP has launched its first Top 10 list for agentic AI, warning autonomous systems act as a powerful but risky new digital workforce.
Shadowy hacker ai malware deepfake fraud cyber attack grid

AI-native malware & deepfakes to dominate 2026 cyber risk

Fri, 9th Jan 2026
#
malware
#
data protection
#
ransomware
AI-native malware, deepfake fraud and attacks on connected devices will dominate enterprise cyber risk in 2026, VIPRE has warned.
Australian city skyline cybersecurity shield rising cyber attacks

Cybersecurity Act drives surge in reporting as attacks rise

Fri, 9th Jan 2026
#
firewalls
#
data protection
#
ransomware
Australia's Cybersecurity Act drives a surge in breach reporting as attacks soar, exposing rising business losses and tougher penalties.