TelcoNews Australia - Telecommunications news for ICT decision-makers

Remote Access stories - Page 6

Kern wi fi

KernWi-Fi builds carrier-grade Yaesu IMRS network

Wed, 14th Jan 2026
#
firewalls
#
encryption
#
network security
KernWi-Fi deploys Australia's first carrier-grade Yaesu IMRS backbone, boosting reliability, security and scalability for VK amateur radio.
Corporate boardroom dusk cyber supply chain security locks chains

Codific sets 2026 priorities for boards on cyber risk

Tue, 13th Jan 2026
#
data protection
#
ransomware
#
cloud security
Codific urges boards to prioritise preemptive cyber defence, identity and supply-chain control as 2026 scrutiny and rules tighten.
Smart home night scene shadowy fox iot cyber espionage threat

Silver Fox APT & PowerG flaws expose key security risks

Tue, 13th Jan 2026
#
uc
#
encryption
#
iot security
NCC Group links Silver Fox's false-flag malware campaigns to ValleyRAT and uncovers critical PowerG flaws that can fully compromise alarms.
Office desktop update popup shadowy reflection hidden malware scene

HP warns of surge in polished fake updates & malware

Fri, 9th Jan 2026
#
malware
#
virtualisation
#
mfa
HP reports a surge in convincing fake software updates and staged prompts that trick users into installing stealthy, rapidly evolving malware.
Asus

ASUS unveils Copilot+ PCs with new ProArt & Zenbook

Wed, 7th Jan 2026
#
gaming
#
semiconductors
#
biometrics
ASUS debuts a Copilot+ PC line at CES 2026 with creator ProArt gear, dual‑screen Zenbooks and budget Vivobooks spanning three chip platforms.
Dark control room hackers red world map cyber attack stormy city

AI-fuelled cyber onslaught to hit critical systems by 2026

Tue, 23rd Dec 2025
#
firewalls
#
ransomware
#
digital transformation
AI-driven hackers are tipped to ramp up attacks on critical infrastructure and governments by 2026, exploiting ageing industrial systems.
Covert cyber espionage software download bug warning china russia

Chinese hackers fake Teams downloads in false flag ploy

Thu, 18th Dec 2025
#
malware
#
uc
#
martech
Chinese state-backed hackers mimic Microsoft Teams downloads in a false flag campaign to infect Chinese speakers and blame Russian actors.
Nicole henry 1422x800px

Security architecture for critical infrastructure: stabilising what cannot stop

Thu, 18th Dec 2025
#
firewalls
#
hybrid cloud
#
digital transformation
Australia's critical infrastructure faces rising state-backed cyber threats, forcing a shift to integrated, cloud-first security architectures.
Ai cyber attack scada control room red alert shadowy hacker

AI reshapes cyber threats as experts warn on automation

Fri, 12th Dec 2025
#
malware
#
ransomware
#
iot security
AI will transform cyber threats by 2026, experts say, but warn over-automation and legacy systems could imperil critical infrastructure.
Bitdefender one battle after another report 1

Fake Leonardo DiCaprio torrent spreads Agent Tesla trojan

Thu, 11th Dec 2025
#
endpoint protection
#
encryption
#
breach prevention
Fake torrents of Leonardo DiCaprio film One Battle After Another are spreading Agent Tesla malware that hijacks Windows PCs, experts warn.
Ransomware shutdown dark factory idle robots conveyors padlock scene

Industrial ransomware attacks surge, manufacturing hit hardest

Thu, 11th Dec 2025
#
virtualisation
#
ransomware
#
iot security
Industrial ransomware attacks climbed 13% in Q3 2025 to 742 cases worldwide, with manufacturing absorbing nearly three quarters of hits.
Ps morey haber

Watch out for these eight trends to impact cybersecurity teams in 2026

Wed, 10th Dec 2025
#
firewalls
#
data protection
#
vpns
Cybersecurity teams face digital border taxes, AI-first clouds, agentic AI threats and the end of VPNs as 2026 reshapes digital risk.
Red digital skull vs blue cyber shield ai warfare defense

AI-driven cyber wars to reshape security in 2026

Wed, 10th Dec 2025
#
firewalls
#
data protection
#
dr
AI-powered attackers and defenders will clash in 2026, driving autonomous breaches, VPN failures and stricter rules that reshape cyber security.
Cinematic ai identity silhouette between secure servers with shields

BeyondTrust & Ping join forces on unified AI identity

Wed, 10th Dec 2025
#
pam
#
mfa
#
cloud security
BeyondTrust and Ping Identity unveil unified AI-driven identity security fabric to tackle Zero Trust, silos and non-human access risks.
Masked hacker breaking into digital network data cloud security breach

Attackers exploit ScreenConnect & Microsoft 365 for breaches

Fri, 5th Dec 2025
#
firewalls
#
ransomware
#
network security
Attackers exploit unpatched ScreenConnect and Microsoft 365 credentials for unauthorised network access, raising breach risks for organisations worldwide.
Engineers collaborating 3d model virtual interface cloud data nodes

Siemens unveils cloud-based Simcenter X suite with AI & HPC

Fri, 5th Dec 2025
#
hpc
#
data management
#
siemens
Siemens launches Simcenter X Advanced, a cloud-based AI-powered engineering simulation suite with HPC access, boosting collaboration and design optimisation.
David

BeyondTrust & Ping Identity offer unified security via AWS

Thu, 4th Dec 2025
#
hybrid cloud
#
pam
#
cloud security
BeyondTrust and Ping Identity now offer unified identity security solutions as a single package in AWS Marketplace, simplifying procurement and deployment.
Bitdefender battlefield 6 1

Battlefield 6 fans targeted by malware hidden in fake game files

Wed, 26th Nov 2025
#
malware
#
gaming
#
advanced persistent threat protection
Cybercriminals target Battlefield 6 fans with malware disguised as pirated copies and trainers, risking data theft and remote PC control, warns Bitdefender Labs.
Modern office workspace people laptops desktops cloud collaboration remote

Parallels RAS 21.0 enhances hybrid cloud & user experience

Sat, 22nd Nov 2025
#
hybrid cloud
#
mfa
#
multi-cloud
Parallels has launched RAS 21.0, enhancing hybrid cloud management, security, and user experience for distributed workforces with multi-cloud support.
Ps leon poggioli

Top structural shifts set to reshape Australia's critical systems

Fri, 21st Nov 2025
#
vpns
#
digital transformation
#
advanced persistent threat protection
In 2026, Australian organisations will boost cybersecurity by enforcing asset visibility, cutting supply chain risks, and securing remote vendor access.