FutureFive Australia - Consumer technology news from the future

Cyber Threat stories - Page 7

Visions of cb header

Visions of cyber attacks: The SonicSentry SOC in action on Christmas morning

Thu, 12th Feb 2026
#
firewalls
#
data protection
#
network security
While most slept through Christmas dawn, SonicSentry analysts foiled a 3am brute-force cyber attack on a French client's firewall.
Todd palmer   illumio

Illumio & Armis link tools to secure IT & OT estates

Thu, 12th Feb 2026
#
firewalls
#
siem
#
network security
Illumio and Armis expand their partnership to deliver integrated Zero Trust security for converged IT, OT and IoT estates worldwide.
Global supply chain network dark web overlay cyber shield

Bitsight unveils dark web tool to secure supply chains

Wed, 11th Feb 2026
#
data protection
#
martech
#
advanced persistent threat protection
Bitsight launches an AI-driven dark web monitoring tool to give organisations earlier warning of cyber threats targeting key suppliers.
John milionis 1200px x 800px

Aussie Broadband named Fortinet Australia Partner 2025

Tue, 10th Feb 2026
#
uc
#
firewalls
#
network infrastructure
Fortinet crowns Aussie Broadband its Australia Partner of the Year 2025, also naming it Telco Partner of the Year amid wider channel honours.
Untitled design  6

Safer Internet Day and the New Reality of Cyber Responsibility in Education

Tue, 10th Feb 2026
#
data protection
#
dr
#
ransomware
As Safer Internet Day nears, schools face rising cyber threats, third-party risks and new duties that push security into the boardroom.
Glowing neural network shield ai cybersecurity cloud servers

Palo Alto revamps NextWave to reward AI security platforms

Fri, 6th Feb 2026
#
firewalls
#
digital transformation
#
network security
Palo Alto overhauls NextWave to reward partners building AI-driven security platforms and services over traditional product sales volume.
Mg 3 01

Searchlight Cyber appoints Michael Gianarakis as CEO

Thu, 5th Feb 2026
#
fintech
#
advanced persistent threat protection
#
socs
Searchlight Cyber has promoted former product chief Michael Gianarakis to CEO as founder Ben Jones moves to a strategic board role.
Abstract circuit shield cloud ai brain network cybersecurity lock

Radware unveils Agentic AI Protection for autonomous agents

Thu, 5th Feb 2026
#
firewalls
#
data protection
#
digital transformation
Radware launches Agentic AI Protection to secure autonomous agents at runtime, tackling prompt injection, tool abuse and data exposure risks.
Glowing digital shield over world map asia pacific cybersecurity

Cybersecurity as a Service market to hit USD $83.96bn

Thu, 5th Feb 2026
#
firewalls
#
data protection
#
ransomware
Cybersecurity as a Service market forecast to soar from USD $17.60bn in 2024 to USD $83.96bn by 2034, driven by threats and skills gaps.
Gina mccintltd.com  43

AI, cyber threats & the rise of strategic data privacy

Mon, 2nd Feb 2026
#
data protection
#
ransomware
#
digital transformation
AI-fuelled cyber threats and stricter rules are forcing APAC organisations to treat data privacy as a strategic advantage, not mere compliance.
Dim uk office night red lock screens shadowy usb insider theft

NCC warns of surge in ransomware & insider threats

Fri, 30th Jan 2026
#
ransomware
#
endpoint protection
#
pam
NCC flags fourth straight monthly rise in ransomware attacks and growing efforts by major gangs to recruit insiders and cyber staff.
Dimly lit office worker shakes hands with shadowy hacker monitor

Ransomware gangs step up insider recruitment, says NCC

Fri, 30th Jan 2026
#
data protection
#
ransomware
#
endpoint protection
Ransomware gangs are stepping up efforts to recruit insiders, warns NCC Group, as December 2025 attacks jump 13% to 784 globally.
Peter waring

Why SOC 2 Type 2 certification matters for brokers

Thu, 29th Jan 2026
#
data protection
#
dr
#
document management
Insurance brokers must scrutinise software vendors' SOC 2 Type 2 security to safeguard client data, compliance and operational resilience.
John and peter

Dell warns of rising cyber 'resilience debt' in Australia

Thu, 29th Jan 2026
#
data protection
#
dr
#
network infrastructure
Dell warns Australian firms face mounting “resilience debt” as prevention outspends recovery, leaving backups exposed to cyberattacks.
Lotem finkelsteen 2

AI drives 70% surge in weekly cyber attacks in 2025

Thu, 29th Jan 2026
#
firewalls
#
ransomware
#
hybrid cloud
AI-fuelled automation drove a 70% surge in weekly cyber attacks in 2025, with nearly 2,000 incidents per organisation, Check Point warns.
Moody human silhouette data fragments facing shadowy ai privacy loss

AI heightens data privacy risks & reshapes digital trust

Thu, 29th Jan 2026
#
data protection
#
digital transformation
#
application security
AI's rapid spread, weak data governance and rising scepticism are reshaping digital trust and sharply escalating privacy risks.
Australian boardroom glowing lock table data lifecycle privacy

AI and data breaches force new approach to privacy

Wed, 28th Jan 2026
#
data protection
#
hybrid cloud
#
digital transformation
Rising data breaches and rapid AI adoption are forcing Australian boards to rethink privacy, shifting focus from perimeter security to full data lifecycle.
Cinematic us soc ai brain highlighting critical network threats

Check Point unveils AI-ready continuous exposure management

Sat, 24th Jan 2026
#
firewalls
#
network security
#
cloud security
Check Point launches AI-ready Exposure Management to plug remediation gaps, unifying threat intelligence, prioritisation and automated fixes.
Moody office worker phishing remote access cursor corporate net

Phishing campaign exploits RMM tools for stealthy access

Fri, 23rd Jan 2026
#
firewalls
#
network security
#
phishing
Phishing campaign uses stolen logins and trusted RMM tools like GoTo Resolve and LogMeIn to quietly maintain access to corporate systems.
Moody us govt office laptop suspicious email shadowy figure

LOTUSLITE backdoor targets US policy bodies with lures

Thu, 22nd Jan 2026
#
phishing
#
advanced persistent threat protection
#
email security
Politically themed LOTUSLITE phishing campaign hits US policy bodies, using DLL sideloading and espionage-focused backdoor tactics.