ChannelLife Australia - Industry insider news for technology resellers

Data exfiltration stories

Ai cyber attack scada control room red alert shadowy hacker

AI reshapes cyber threats as experts warn on automation

Last week
#
data exfiltration
AI will transform cyber threats by 2026, experts say, but warn over-automation and legacy systems could imperil critical infrastructure.
London developer workstation ai coding security protective dome view

Backslash unveils MCP Security to safeguard AI coding

Last week
#
data exfiltration
Backslash launches MCP Security to monitor AI coding agents on developer machines, tackling data leaks, prompt injection and privilege abuse.
Red digital skull vs blue cyber shield ai warfare defense

AI-driven cyber wars to reshape security in 2026

Last week
#
data exfiltration
AI-powered attackers and defenders will clash in 2026, driving autonomous breaches, VPN failures and stricter rules that reshape cyber security.
Ai cyber threats hooded figure machine identity chaos 2026

CrowdStrike warns AI will redefine cyber threats by 2026

Last week
#
data exfiltration
AI will redefine cyber threats by 2026, CrowdStrike warns, driving prompt-injection attacks, zero-day surges and machine identity chaos.
Corporate it soc ai neural network monitors blue modern office

Netskope adds MCP controls to secure enterprise AI use

Last week
#
data exfiltration
Netskope adds Model Context Protocol controls to its One platform, giving security teams new tools to monitor and lock down AI agent traffic.
Cinematic data center corridor ai shield cybersecurity blue glow

Check Point updates Quantum firewall to secure AI use

Last week
#
data exfiltration
Check Point updates Quantum firewall with AI-aware controls, aiming to curb data leakage, model abuse and new automated cyber attacks.
Uk soc cloud network ai chat breach alerts worried analysts

NCSC warns AI prompt injection could drive huge UK data breaches

Last week
#
data exfiltration
UK cyber agency warns that misunderstanding AI prompt injection risks could trigger data breaches surpassing past SQL attacks in scale.
Masked figure using laptop dimly lit room glowing data lines cyber threats

HP predicts surge in AI-driven cyber threats & cookie theft by 2026

This month
#
data exfiltration
HP warns of rising AI-driven cyber threats by 2026, including increased cookie theft and attacks on device and identity security in organisations.
Office employees computers digital shadows ai threats cybersecurity shield

BlackFog launches ADX Vision to combat rising shadow AI risks

This month
#
data exfiltration
BlackFog unveils ADX Vision, a tool to monitor and block unauthorised AI use at work, addressing rising shadow AI data security risks.
Shadowy hackers dark room multiple screens cloud icons cyber espionage us cloud networks

WARP PANDA cyberespionage group targets US cloud networks

This month
#
data exfiltration
China-linked WARP PANDA cyberespionage group targets US cloud networks, exploiting vulnerabilities in Microsoft 365, VMware, and more for sustained data access.
James headshot

Exclusive: Cohesity's James Blake warns on rising ransomware risks

This month
#
data exfiltration
Ransomware attacks cost Australian organisations AUD $42 billion annually, urging a shift from prevention to pragmatic cyber resilience amid rising threats.
Automated cloud security digital shield interconnected lines threat detection

Rapid7 unveils Curated Intelligence Rules to automate AWS firewall

Last month
#
data exfiltration
Rapid7 launches Curated Intelligence Rules to automate AWS firewall updates, helping security teams swiftly counter evolving cyber threats with minimal manual effort.
Computer screen with shield security icons modern office digital protection

Sophos integrates threat intelligence into Microsoft Copilot

Last month
#
data exfiltration
With Microsoft Copilot integration, Sophos seeks to enable real-time security analysis within Microsoft 365 and Teams environments.
Digital illustration network computer servers shadowy infiltrators vigilant professionals monitoring screens

AI-driven cyber threats & defences to reshape security by 2026

Last month
#
data exfiltration
AI-driven cyber threats will transform security by 2026, with evolving attacks, multi-agent systems, and a reshaped role for Chief Information Security Officers.
Secure cloud infrastructure data protection server racks shield icons

Infoblox unveils advanced AWS integrations for cloud security & IPAM

Last month
#
data exfiltration
Infoblox launches new AWS integrations to streamline hybrid cloud IP management and enhance security with advanced firewall threat intelligence tools.
Australian police arrest masked hackers at computer desks cybercrime bust

Australian, global agencies cripple major cybercrime malware tools

Last month
#
data exfiltration
Australian and global law enforcement, aided by Proofpoint, have disrupted Rhadamanthys and VenomRAT malware families used in cyberattacks worldwide, including in Australia.
Michael freeman

2026: The Year an Individual Operates Like a Nation-State

Last month
#
data exfiltration
By 2026, AI will empower individuals with hacker tools rivaling nation-states, radically transforming cyber threats and defences worldwide.
Hcaptcha

Browser Agents Are Racing Ahead. Their Safety Isn’t

Last month
#
data exfiltration
Popular browser agents lack safeguards against abuse, posing new risks like account takeovers and payment fraud for online services, warns hCaptcha.
Secure digital network encryption locks quantum particles cybersecurity advanced threats

Gigamon boosts GigaVUE platform for quantum-safe encryption

Last month
#
data exfiltration
Gigamon unveils enhanced GigaVUE 6.12 platform, equipping firms with quantum-safe encryption tools to counter rising cryptographic threats by 2030.
Shield encasing web browser window with digital threat elements for security

SquareX wins SINET16 Innovator Award for browser security

Last month
#
data exfiltration
SquareX wins the 2025 SINET16 Innovator Award for its pioneering browser security solution protecting organisations from advanced web-based cyber threats.