TelcoNews Australia - Telecommunications news for ICT decision-makers

Threat intelligence stories - Page 11

Dim corporate server room mixed os racks chained ransomware lock

LockBit 5.0 ransomware targets Windows, Linux, ESXi

Wed, 18th Feb 2026
#
malware
#
virtualisation
#
data protection
New LockBit 5.0 ransomware hits Windows, Linux and ESXi in single campaigns, widening blast radius across mixed and virtualised environments.
Modern cybersecurity war room ai brain shield team collab

CompTIA launches SecAI+ to tackle AI security skills

Wed, 18th Feb 2026
#
malware
#
data protection
#
devops
CompTIA unveils SecAI+ certification to equip cybersecurity professionals with AI security, risk management and governance skills.
Ai cybersecurity global network cloud shield enterprise partners

Proofpoint revamps global partner network for AI era

Wed, 18th Feb 2026
#
digital transformation
#
hyperscale
#
cloud security
Proofpoint overhauls its partner network with richer incentives, tighter protections and AI-focused services to fuel recurring security revenue.
Brett chase

Australia's cyberattack surge demands a new approach to data resilience

Wed, 18th Feb 2026
#
malware
#
data protection
#
dr
Australia faces world's highest rate of serious cyberattacks, exposing millions and forcing a rethink of data resilience strategies.
Dark office night remote access shadowy hacker silent data theft

Data-only extortion surges as remote access abused

Wed, 18th Feb 2026
#
data protection
#
dr
#
vpns
Data-only extortion soars 11-fold as attackers 'log in instead of break in', abusing remote access tools for faster, stealthier raids.
Cinematic soc analysts network map cloud kubernetes identity alerts

ExtraHop boosts agentic SOC with richer network insight

Wed, 18th Feb 2026
#
virtualisation
#
hybrid cloud
#
pam
ExtraHop sharpens its network detection tools with deeper identity and Kubernetes insight to power more reliable agentic SOC automation.
Dim server room windows rack red warning remote access breach

Active exploitation seen in BeyondTrust access flaw

Mon, 16th Feb 2026
#
firewalls
#
network security
#
pam
Arctic Wolf says attackers are actively exploiting a critical BeyondTrust vulnerability in self-hosted remote access systems.
Asia pacific night map cyber breaches shipping supply chain

AI-fuelled supply chain cyber attacks surge in Asia-Pacific

Mon, 16th Feb 2026
#
firewalls
#
ransomware
#
network security
AI is supercharging supply chain cyber attacks across Asia-Pacific, with Group-IB warning single hacks now threaten thousands of victims.
Moody ai cyber ops room global map pulsing network lines

AI drives shift to persistent, low‑level cyber conflict

Sun, 15th Feb 2026
#
malware
#
firewalls
#
network infrastructure
Cyber operations have become constant, covert pressure in geopolitics, with AI-fuelled identity abuse replacing headline-grabbing cyberattacks.
Nighttime small office cyberattack screens red warnings global scope

AI-driven ransomware attacks surge, most go unreported

Fri, 13th Feb 2026
#
firewalls
#
data protection
#
ransomware
AI-fuelled ransomware hit record levels in 2025, with BlackFog warning that around 86% of attacks worldwide are never publicly disclosed.
Jan miller opswat

OPSWAT names Jan Miller CTO to lead new Technology Centre

Fri, 13th Feb 2026
#
malware
#
iot security
#
advanced persistent threat protection
OPSWAT appoints malware expert Jan Miller as CTO and puts him in charge of a new Technology Centre focused on AI-driven threat prevention.
Dark moody captcha puzzle morphing into shadowy cyber thief scene

LummaStealer returns post-takedown with ClickFix ruse

Fri, 13th Feb 2026
#
mfa
#
phishing
#
advanced persistent threat protection
LummaStealer roars back after domain takedown, using fake CAPTCHA ClickFix tricks and CastleLoader to spread via routine user actions.
Moody remote night home office video call anonymized face north korea cyber map

Okta warns of North Korean fraud in remote tech hiring

Fri, 13th Feb 2026
#
data protection
#
ransomware
#
hcm
Okta warns North Korean operatives are landing remote tech jobs with stolen and synthetic identities to fund the regime and enable cyber attacks.
Australian woman dating apps night scam shadows credit cards

McAfee warns Australians of AI-fuelled Valentine scams

Fri, 13th Feb 2026
#
data protection
#
endpoint protection
#
mdm
McAfee warns Australians AI-powered romance scams are surging ahead of Valentine's Day, with one in seven victims losing an average AUD $780.
Compromised iis server dark code web to gambling crypto icons

BADIIS malware hijacks IIS servers for covert SEO fraud

Fri, 13th Feb 2026
#
malware
#
firewalls
#
network security
BADIIS malware is hijacking over 1,800 IIS servers worldwide, quietly boosting illicit gambling and crypto phishing sites via poisoned SEO.
Modern soc dark room analysts monitors world maps network threats

Simbian touts AI SOC growth as automation race intensifies

Fri, 13th Feb 2026
#
firewalls
#
digital transformation
#
cloud security
Simbian claims 15-fold customer surge as its AI-driven SOC agents vie to replace rules-based automation in the cyber defence arms race.
Laptop under binary shield blocking hackers and malware icons

NordVPN taps CrowdStrike intel to bolster consumer security

Fri, 13th Feb 2026
#
malware
#
firewalls
#
data protection
NordVPN will use CrowdStrike threat intelligence to power its Threat Protection Pro tool, bringing enterprise-grade data to consumer security.
Ciso monitoring data flows shadowy ai deepfake cyberattack threat

CISOs confident in cyber skills but lag on AI threats

Thu, 12th Feb 2026
#
digital transformation
#
cloud security
#
socs
CISOs show strong faith in cyber defences yet less than two-thirds feel ready for fast-rising AI-driven attacks and deepfake threats.
Moody data center linux servers botnet ssh attacks asian city skyline

SSHStalker botnet preys on legacy Linux & cloud hosts

Thu, 12th Feb 2026
#
malware
#
firewalls
#
hyperscale
A newly uncovered SSHStalker botnet uses old-school IRC and legacy Linux exploits to hijack outdated corporate and cloud hosts at scale.
Moody datacenter night glowing shield cyber espionage ai theft

Google warns of AI model theft & state-backed misuse

Thu, 12th Feb 2026
#
malware
#
surveillance
#
cloud security
Google flags surging attempts to steal AI models as state-backed hackers weaponise Gemini for phishing, intel gathering and malware support.