ChannelLife Australia - Industry insider news for technology resellers

Social Engineering stories - Page 3

Corporate soc phishing simulation risk dashboard shield email icons

KnowBe4 launches AI defence agents for risk training

Last month
#
phishing
#
socs
#
email security
KnowBe4 expands its AIDA suite with AI defence agents to automate security training, phishing simulations and human risk measurement.
Editorial world map storm network lines ransomware hooded nodes

CrowdStrike flags faster AI-driven cyber attacks worldwide

Last month
#
ransomware
#
cloud security
#
phishing
AI-fuelled cyber attacks are spreading faster worldwide, CrowdStrike warns, as breakout times plummet and criminals weaponise mainstream tools.
Editorial cloud datacenter security control room ai ops 37f8d2

Upwind finds prompt detection can run under millisecond

Last month
#
firewalls
#
network security
#
cloud security
Upwind unveils sub-millisecond prompt threat detection for LLMs, claiming 95% precision using Nvidia models to secure live AI workloads.
Editorial illustration corporate criminal network ops map servers

HPE Threat Labs spot industrialised cybercrime surge

Last month
#
malware
#
firewalls
#
vpns
HPE Threat Labs warns cybercrime now runs like big business, as AI-fuelled, industrial-scale attacks hammer government and finance.
Kawin

KnowBe4 appoints Kawin Boonyapredee as APJ CISO advisor

Last month
#
digital transformation
#
cx
#
phishing
KnowBe4 names Dr Kawin Boonyapredee APJ CISO advisor to steer human risk and AI cyber threat strategy from a new base in Singapore.
Simon

The agentic evolution: Why high-fidelity data is the lifeblood of the modern SOC

Last month
#
iot security
#
phishing
#
iot
As AI-powered attacks shatter old perimeters, SOCs race to agentic operations where high-fidelity data becomes security's vital lifeblood.
Cinematic soc night world map threat graphs cyber analyst monitoring

Cyware unveils Agentic AI Fabric for threat defence

Last month
#
advanced persistent threat protection
#
socs
#
genai
Cyware launches Agentic AI Fabric, adding goal-driven analyst agents to automate threat intel, detection engineering and incident response.
Digital login screen shadows identity theft binary chains art

Barracuda warns of surge in credential-focused attacks

Last month
#
malware
#
firewalls
#
ransomware
Barracuda reports a global surge in identity-based cyber attacks, with stolen credentials, supply-chain abuse and weaponised PDFs on the rise.
Moody server room red alert cracked shield cyber vulnerabilities

Rapid7 warns exploited software flaws more than double

Last month
#
firewalls
#
ransomware
#
network security
Rapid7 warns exploited high and critical software flaws more than doubled in 2025, as attackers compress disclosure-to-attack windows.
Office worker ai email security green calm vs red phishing streams

Abnormal AI rolls out Attune 1.0 to fight AI cyberattacks

Last month
#
uc
#
phishing
#
advanced persistent threat protection
Abnormal AI launches Attune 1.0, a behavioural model that spots AI-crafted cyberattacks by learning normal workplace communication patterns.
Moody corporate night office fileless ransomware cloud lock reflection

LeakNet adopts ClickFix lures & Deno fileless loader

Last month
#
storage
#
uc
#
firewalls
Ransomware group LeakNet adopts ClickFix lures and a Deno-based fileless loader to scale attacks and evade traditional endpoint defences.
Browser extension thief mask crypto coin shield wallet protection

Okta helps disrupt ShieldGuard crypto-stealing extension

Last month
#
mfa
#
crypto
#
phishing
Okta and partners pull rogue ShieldGuard Chrome extension that stole crypto wallet data and bypassed browser defences via custom code.
Corporate cyberattack command center world map dashboards scene

HPE report warns cyberattacks now run like big business

Last month
#
malware
#
firewalls
#
vpns
HPE warns cybercriminals now run attacks like global enterprises, using repeatable workflows, automation and AI to outpace defences.
Corporate soc email security analysts unified cloud phishing bec

VIPRE email security integrates with Microsoft Defender

Last month
#
cloud security
#
phishing
#
advanced persistent threat protection
VIPRE links its Integrated Email Security with Microsoft Defender, unifying phishing and BEC detections in a single Defender console view.
Shadowy hacker cyber attack on hospital mobile device management

Stryker probes global cyber attack via MDM systems

Last month
#
dr
#
ransomware
#
iot security
Stryker says a cyber attack disrupted internal systems, with investigators examining mobile device tools as experts warn of rising state-linked threats.
Ai cyberattack shadow figure robotscreens red alarm extortion

AI agents drive surge in cyber threats & extortion

Last month
#
malware
#
data protection
#
ransomware
AI agents are fuelling a new wave of cyber risk, as criminals weaponise automation to speed up ransomware and sharpen extortion tactics.
Smartphone red siren app shadowy cables israel data surveillance

Fake Red Alert app used in Android spyware smishing

Last month
#
endpoint protection
#
mdm
#
phishing
Attackers push fake Red Alert Android app via SMS, turning Israel rocket warning tool into spyware that steals messages, contacts and location.
Home office devices suspicious messages shields locks flat vector

Norton unveils Genie scam detection assistant in ChatGPT

Last month
#
cloud security
#
phishing
#
physical security
Norton launches Genie scam assistant in ChatGPT, letting users tag @Norton to analyse emails, texts, images and links for fraud risks.
Moody cloud padlock human silhouettes identity theft pixels

Cloud identity compromise now drives most cyber attacks

Last month
#
malware
#
uc
#
firewalls
Cloud identity compromise now drives over 80% of cyber incidents, as attackers increasingly abuse trusted accounts and workplace tools.
Smartphone banking login fraud detection shadowy hand warning

BioCatch unveils DeviceIQ to spot banking fraud pre-login

Last month
#
biometrics
#
mfa
#
fintech
BioCatch launches DeviceIQ to scan mobile and web devices before login, spotting AI-driven fraud and compromised handsets in milliseconds.