ChannelLife Australia - Industry insider news for technology resellers

Infosec stories - Page 26

Secure hybrid cloud identity protection rapid enterprise recovery

Cohesity boosts identity resilience for hybrid AD, Entra

Fri, 23rd Jan 2026
#
data protection
#
dr
#
ransomware
Cohesity has expanded its Identity Resilience tools to detect, block and rapidly undo attacks on hybrid Active Directory and Entra ID.
Nighttime corporate office saas breach server alerts costs

AppOmni study pegs average SaaS breach at USD $1.365m

Fri, 23rd Jan 2026
#
saas
#
digital transformation
#
cloud security
AppOmni study finds average SaaS breach costs USD $1.365m, as customers report big time savings, fewer audit issues and faster detection.
Cinematic financial data center cloud security encryption control

Data Privacy Day spotlight on control, resilience, design

Fri, 23rd Jan 2026
#
data protection
#
dr
#
ransomware
Data Privacy Day shifts focus from policy to proof, as firms embed control, resilience and design into complex hybrid data estates.
Vincent hwang

AI surge exposes cloud security gaps, report warns

Fri, 23rd Jan 2026
#
saas
#
firewalls
#
data protection
New global survey warns a widening 'complexity gap' leaves AI-driven, multi-cloud environments outpacing organisations' security defences.
Cloud computing classroom open padlocks security risk training

Misconfigured cloud training labs open paths to attacks

Fri, 23rd Jan 2026
#
firewalls
#
hyperscale
#
cloud security
Misconfigured cloud training labs on AWS, Google Cloud and Azure expose major firms to live attacks via overly permissive access roles.
Andy thomas kynd lrg(2)

KYND: big firms leave critical cyber flaws unpatched

Thu, 22nd Jan 2026
#
malware
#
application security
#
cybersecurity
Major firms are leaving known, actively exploited cyber flaws unpatched for six months or more, sharply heightening breach risks.
Moody us govt office laptop suspicious email shadowy figure

LOTUSLITE backdoor targets US policy bodies with lures

Thu, 22nd Jan 2026
#
phishing
#
advanced persistent threat protection
#
email security
Politically themed LOTUSLITE phishing campaign hits US policy bodies, using DLL sideloading and espionage-focused backdoor tactics.
Anxious worker crowded inbox suspicious job offers data risk

Bitdefender warns of surge in fake job recruitment scams

Thu, 22nd Jan 2026
#
malware
#
uc
#
data protection
Bitdefender warns of a global surge in fake job emails posing as Amazon, Carrefour and the NHS, stealing data, money and account logins.
Modern soc security ops centre wall displays endpoint monitoring

CrowdStrike study touts 273% ROI on modern endpoint security

Thu, 22nd Jan 2026
#
endpoint protection
#
digital transformation
#
cloud security
CrowdStrike cites a Forrester study claiming 273% ROI and USD $5m in three-year benefits from consolidating legacy endpoint security.
Modern soc security ops center mdr unified cloud monitoring hd

Rapid7 unveils MDR service built for Microsoft users

Thu, 22nd Jan 2026
#
siem
#
cloud security
#
socs
Rapid7 has launched a Microsoft-focused MDR service that fuses Defender telemetry with its SIEM and global SOC for unified threat response.
Yochai corem  2

Check Point unveils AI-ready Exposure Management suite

Thu, 22nd Jan 2026
#
firewalls
#
network security
#
cloud security
Check Point launches AI-ready Exposure Management suite to close remediation gaps as organisations leave half of known vulnerabilities unpatched.
Modern coworking space device security cable locks empty chair

Hybrid work drives surge in device theft & visual hacks

Thu, 22nd Jan 2026
#
firewalls
#
data protection
#
endpoint protection
Hybrid work fuels surge in device theft and visual hacking, as Kensington warns cheap physical locks could avert multimillion‑dollar breaches.
Modern corporate soc room analysts monitoring future 2028 security

Gartner: half of firms adopt zero-trust data by 2028

Thu, 22nd Jan 2026
#
data analytics
#
ai security
#
risk & compliance
Gartner predicts half of organisations will adopt zero-trust data governance by 2028 as synthetic AI content undermines traditional data trust.
Stormy tangled server cloudscape it team data leaks high contrast

Cloud security skills gap widens as AI adoption surges

Thu, 22nd Jan 2026
#
saas
#
firewalls
#
data protection
AI-fuelled cloud adoption is outpacing security teams, with Fortinet warning a widening 'complexity gap' leaves hybrid estates exposed.
Isometric german data center secure network shield infrastructure

Deutsche Telekom boosts API security with Akamai deal

Thu, 22nd Jan 2026
#
cloud security
#
risk & compliance
#
zero trust security
Deutsche Telekom Security taps Akamai's certified service scheme to bolster API defences and microsegmentation for high‑risk sectors.
Office pc social network warning suspicious file download cursor

LinkedIn DMs abused to spread Python-based malware

Wed, 21st Jan 2026
#
firewalls
#
endpoint protection
#
devops
Attackers are abusing LinkedIn private messages to deliver Python-based malware via booby-trapped archives, ReliaQuest has warned.
Australia isometric night cyber defence ai secure infrastructure

AI arms race to reshape Australia's cyber defences by 2026

Wed, 21st Jan 2026
#
malware
#
wearables
#
data protection
AI-powered attacks and defences, quantum threats and smart city risks are set to transform Australia's cyber security landscape by 2026.
Fortinetfinals 098

Closing the visibility gap in board-level cyber risk

Wed, 21st Jan 2026
#
firewalls
#
dr
#
digital transformation
Boards face a widening cyber visibility gap as AI, legacy systems and shadow tools outpace governance, testing resilience and oversight.
Modern gpu data center with runtime protection shield layers

Check Point targets securing AI factories at runtime

Wed, 21st Jan 2026
#
firewalls
#
hyperscale
#
network security
Check Point sets out a runtime security blueprint for AI factories as enterprises scale GPU-heavy data centres and face mounting GenAI attacks.
Matthew graham

Why Australia must aim higher on the Essential Eight

Wed, 21st Jan 2026
#
mfa
#
cloud security
#
phishing
Australia's Essential Eight has become the cyber benchmark, but clinging to basic compliance leaves organisations exposed to identity-led threats.