ChannelLife Australia - Industry insider news for technology resellers

Threat detection stories - Page 3

Moody enterprise server room chains ransomware hidden encryption

Polymorphic ransomware, shadow encryption hinder recovery

Last month
#
storage
#
malware
#
data protection
Polymorphic ransomware and 'shadow encryption' are rapidly rising, Index Engines warns, making attacks harder to detect and recovery riskier.
Moody nighttime office insider copying files digital security shield

Insider risk costs soar as AI reshapes workplace data

Last month
#
data protection
#
endpoint protection
#
pam
Insider risk now costs organisations an average USD $19.5 million a year as AI reshapes data access and employee negligence drives losses.
Secure dev workstation multi monitors code warnings shield icon

Anthropic unveils Claude Code Security to scan codebases

Last month
#
devops
#
cloud security
#
application security
Anthropic unveils Claude Code Security, an AI tool that scans codebases for complex bugs, verifies risks and suggests patches for developers.
Ciso hesitates at glowing deploy button in ai cyber soc

CISOs cautious as agentic AI adoption in security lags

Last month
#
firewalls
#
data protection
#
manufacturing
CISOs slow-roll agentic AI in defence, even as they brace for more advanced, AI-boosted attacks and rising personal liability risks.
Global upg. phase 2 partner blog header 1 1200x500px

Upgrade advantage: Why security enhancements matter for MSPs and MSSPs

Last month
#
firewalls
#
vpns
#
digital transformation
For MSPs and MSSPs, next-gen firewall upgrades are now critical to stay secure, competitive and ready for relentless cyber threats.
Cloud identity recovery security glowing shield canada us growth

Cayosoft posts 76% ARR surge on identity recovery boom

Last month
#
saas
#
dr
#
hybrid cloud
Cayosoft posts 76% ARR jump for 2025 as identity recovery demand soars and it wins major public sector and enterprise customers.
Cinematic data center night firewall crack ransomware attack icon

Barracuda links 2025 ransomware wave to firewall flaws

Last month
#
firewalls
#
data protection
#
ransomware
Barracuda warns that unpatched firewalls and weak accounts drove 90% of 2025 ransomware attacks, as threats spread in mere hours.
Secure cloud platform shields locks customer experience data iso

CrowdStrike, Qualtrics link up to secure AI-driven data

Last month
#
data protection
#
digital transformation
#
cloud security
CrowdStrike links Falcon Shield with Qualtrics XM to extend SaaS security, monitoring and automated policy enforcement across experience data.
Internal auditors anxious over ai driven fraud in dark office

Internal auditors fear AI fraud but lack readiness

Last month
#
data analytics
#
digital transformation
#
fintech
Internal auditors warn AI-driven fraud is surging, but most concede they lack the tools, skills and time needed to spot it effectively.
Dim server room admin workstation security shield network nodes

12Port unveils AI session intelligence for PAM security

Last month
#
data protection
#
pam
#
mfa
12Port adds AI-powered session intelligence to its agentless PAM platform, promising real-time detection and disruption of risky admin activity.
Oil refinery renewables control room power loss venting steam dusk tension

OT cyber threats shift from spying to disruption in 2025

Last month
#
ransomware
#
iot security
#
advanced persistent threat protection
Cyber attacks on industrial systems in 2025 shifted from quiet spying to coordinated operations aiming to disrupt critical infrastructure.
Brett chase

Australia's cyberattack surge demands a new approach to data resilience

Last month
#
malware
#
data protection
#
dr
Australia faces world's highest rate of serious cyberattacks, exposing millions and forcing a rethink of data resilience strategies.
Dark office night remote access shadowy hacker silent data theft

Data-only extortion surges as remote access abused

Last month
#
data protection
#
dr
#
vpns
Data-only extortion soars 11-fold as attackers 'log in instead of break in', abusing remote access tools for faster, stealthier raids.
Cinematic soc analysts network map cloud kubernetes identity alerts

ExtraHop boosts agentic SOC with richer network insight

Last month
#
virtualisation
#
hybrid cloud
#
pam
ExtraHop sharpens its network detection tools with deeper identity and Kubernetes insight to power more reliable agentic SOC automation.
Julie davila

AI code is creating security bottlenecks for Australia businesses

Last month
#
data protection
#
devops
#
digital transformation
AI coding tools are speeding software delivery for Australian firms but overwhelming security teams and exposing unprecedented risks.
Ai governance zero trust secure data center corridor shield

Xiid & Cytex link AI governance with zero trust access

Last month
#
firewalls
#
data protection
#
ransomware
Xiid and Cytex join forces to fuse AI governance with zero trust access, targeting shrinking attack paths and stricter cyber regulation.
Jan miller opswat

OPSWAT names Jan Miller CTO to lead new Technology Centre

Last month
#
malware
#
iot security
#
advanced persistent threat protection
OPSWAT appoints malware expert Jan Miller as CTO and puts him in charge of a new Technology Centre focused on AI-driven threat prevention.
Dark moody captcha puzzle morphing into shadowy cyber thief scene

LummaStealer returns post-takedown with ClickFix ruse

Last month
#
mfa
#
phishing
#
advanced persistent threat protection
LummaStealer roars back after domain takedown, using fake CAPTCHA ClickFix tricks and CastleLoader to spread via routine user actions.
Cinematic soc night ai alert dashboards hidden apps control

Okta unveils tools to detect & govern shadow AI risks

Last month
#
pam
#
cloud security
#
application security
Okta launches Agent Discovery to uncover and rein in shadow AI agents, mapping risky app access and tightening identity-based controls.
Moody remote night home office video call anonymized face north korea cyber map

Okta warns of North Korean fraud in remote tech hiring

Last month
#
data protection
#
ransomware
#
hcm
Okta warns North Korean operatives are landing remote tech jobs with stolen and synthetic identities to fund the regime and enable cyber attacks.