ChannelLife Australia - Industry insider news for technology resellers

Threat detection stories - Page 4

Modern soc dark room analysts monitors world maps network threats

Simbian touts AI SOC growth as automation race intensifies

Last month
#
firewalls
#
digital transformation
#
cloud security
Simbian claims 15-fold customer surge as its AI-driven SOC agents vie to replace rules-based automation in the cyber defence arms race.
Visions of cb header

Visions of cyber attacks: The SonicSentry SOC in action on Christmas morning

Last month
#
firewalls
#
data protection
#
network security
While most slept through Christmas dawn, SonicSentry analysts foiled a 3am brute-force cyber attack on a French client's firewall.
Modern network control center unified dns dhcp ipam security observ

BlueCat unveils Horizon SaaS for unified netops control

Last month
#
saas
#
firewalls
#
hybrid cloud
BlueCat launches Horizon SaaS to unify DNS, DHCP, IPAM, security and observability, promising AI-assisted, self-healing intelligent networks.
Todd palmer   illumio

Illumio & Armis link tools to secure IT & OT estates

Last month
#
firewalls
#
siem
#
network security
Illumio and Armis expand their partnership to deliver integrated Zero Trust security for converged IT, OT and IoT estates worldwide.
Gov soc hybrid cloud security analysts monitoring critical infra

Gigamon named 2026 public sector observability leader

Last month
#
virtualisation
#
firewalls
#
hybrid cloud
Gigamon wins Frost & Sullivan's 2026 public sector observability award as governments battle cyber threats in complex hybrid IT estates.
Stealthy cloud server room data theft ghostly silhouette cable

Hackers ditch noisy ransomware for stealthy data theft

Last month
#
firewalls
#
data protection
#
dr
Hackers are abandoning noisy ransomware to quietly steal data, as a report finds 80% of top attack techniques now focus on evasion.
Immutable on prem data vault ransomware proof backup shield

Object First triples growth on ransomware-proof backups

Last month
#
storage
#
virtualisation
#
firewalls
Object First posts 183% bookings surge as demand soars for immutable on-premises backup storage to combat escalating ransomware threats.
Computer user multiple browser windows fake websites security risk

Study finds 28,000 fake domains mimic top websites

Last month
#
malware
#
phishing
#
advanced persistent threat protection
Study finds over 28,000 fake domains mimicking top global sites, exposing users to rising phishing, malware and industrial-scale squatting.
Soc cisos overwhelmed by red alerts few highlighted in focus

Cyber firms face 'verification crisis' on real risk

Last month
#
firewalls
#
devops
#
digital transformation
Cyber firms warned over 'verification crisis' as tools flag floods of flaws but only 0.47% prove exploitable, leaving real risk unresolved.
Crypto trading vault with circuit panels and multi asset security

Bitget, BlockSec unveil new security standard for UEX

Last month
#
devops
#
surveillance
#
crypto
Bitget and BlockSec launch a UEX Security Standard, urging provable, system-wide safeguards for unified multi-asset trading platforms.
Amelia foss

SonicWall unifies NSM for future-ready security ops

Last month
#
firewalls
#
migration
#
hybrid cloud
SonicWall folds legacy tools into Network Security Manager, unifying firewall analytics and reporting across its Unified Management platform.
Secure government datacenter hybrid cloud infrastructure shield

Gigamon wins Frost & Sullivan award for public sector

Last month
#
firewalls
#
hybrid cloud
#
hyperscale
Gigamon named Frost & Sullivan's 2026 Company of the Year for deep observability in global public sector network security and performance.
Arts centre melbourne spire cyber defence shields padlocks night

Arts Centre Melbourne deploys MDR services to contain phishing incident

Last month
#
firewalls
#
data protection
#
network security
Arts Centre Melbourne tightens cyber defences after a foiled phishing attack exposed gaps filled by Arctic Wolf's round-the-clock monitoring.
Corporate it soc monitors network diagrams red attack path analysis

SpecterOps unveils BloodHound Scentry identity risk service

Last month
#
devops
#
pam
#
cloud security
SpecterOps has launched BloodHound Scentry, a managed identity risk service to find and remediate attack paths across complex environments.
Ai unified endpoint management admin at desk flat illustration

Hexnode embeds upgraded Genie AI to run UEM actions

Last month
#
advanced persistent threat protection
#
it automation
#
physical security
Hexnode embeds its upgraded Genie AI into the UEM console, letting admins query inventory, execute device commands and automate fixes in chat.
Ai malware tentacles in corporate mac network stealing crypto

Bitdefender warns OpenClaw AI skills rife with malware

Last month
#
malware
#
firewalls
#
network security
Bitdefender says 17% of OpenClaw AI skills act maliciously, with crypto-focused tools spreading macOS infostealers into corporate networks.
Guardspace

Guardsquare buys Verimatrix XTD to boost mobile security

Last month
#
endpoint protection
#
devops
#
cloud security
Guardsquare snaps up Verimatrix's XTD tech, adding real-time mobile threat detection and response to its end-to-end app security platform.
Moody corporate cloud analytics server room cracked shield leak

Tenable reveals 'LookOut' flaws that endanger Google Looker

Last month
#
firewalls
#
data analytics
#
network security
Tenable warns 'LookOut' flaws in Google Looker could hand attackers server control, expose secrets and enable cross-tenant cloud access.
Anz enterprise datacenter cloud ransomware protection shield

Cohesity, Google Cloud boost backup threat detection

Last month
#
malware
#
data protection
#
dr
Cohesity deepens Google Cloud partnership to bake threat intel and sandbox scanning into backup, tackling stealthy malware in stored data.
Ai ghost hand server room software supply chain breach night

Developers' AI agents pose rising software supply risks

Last month
#
data protection
#
cloud security
#
application security
Developers granting AI agents broad, unsupervised access to code and systems are creating new software supply chain and data exposure risks.