FutureFive Australia - Consumer technology news from the future

Threat actors stories - Page 2

Moody server room red alert cracked shield cyber vulnerabilities

Rapid7 warns exploited software flaws more than double

Last month
#
firewalls
#
ransomware
#
network security
Rapid7 warns exploited high and critical software flaws more than doubled in 2025, as attackers compress disclosure-to-attack windows.
Secure ai software engineer workstation multi screens cinematic night

Harness unveils AI Security & coding tools for DevSecOps

Last month
#
devops
#
application security
#
advanced persistent threat protection
Harness has launched AI Security and Secure AI Coding tools to spot and block vulnerabilities in AI-powered apps and AI-generated code.
Moody corporate night office fileless ransomware cloud lock reflection

LeakNet adopts ClickFix lures & Deno fileless loader

Last month
#
storage
#
uc
#
firewalls
Ransomware group LeakNet adopts ClickFix lures and a Deno-based fileless loader to scale attacks and evade traditional endpoint defences.
Browser extension thief mask crypto coin shield wallet protection

Okta helps disrupt ShieldGuard crypto-stealing extension

Last month
#
mfa
#
crypto
#
phishing
Okta and partners pull rogue ShieldGuard Chrome extension that stole crypto wallet data and bypassed browser defences via custom code.
Sarah

Saving the weekend: How SonicWall's SonicSentry SOC stopped a Saturday night cyberattack

Last month
#
firewalls
#
data protection
#
network security
SonicWall's SonicSentry SOC cut short a Saturday night cyberattack, spotting rogue ScreenConnect activity and isolating a compromised PC.
Email attachment20260318 3378197 f4nol6

Australia warned over AI-fuelled surge in cyberwarfare

Last month
#
ransomware
#
digital transformation
#
advanced persistent threat protection
Australia faces AI-driven cyberwarfare “boiling point” as attacks surge, ransomware payouts soar and security remains dangerously reactive.
Corporate cyberattack command center world map dashboards scene

HPE report warns cyberattacks now run like big business

Last month
#
malware
#
firewalls
#
vpns
HPE warns cybercriminals now run attacks like global enterprises, using repeatable workflows, automation and AI to outpace defences.
Jason

SentinelOne names Jason Duerden ANZ area vice president

Last month
#
firewalls
#
endpoint protection
#
data analytics
SentinelOne appoints Jason Duerden ANZ area vice president to drive cyber growth in government, critical infrastructure and AI security.
Ai cyberattack shadow figure robotscreens red alarm extortion

AI agents drive surge in cyber threats & extortion

Last month
#
malware
#
data protection
#
ransomware
AI agents are fuelling a new wave of cyber risk, as criminals weaponise automation to speed up ransomware and sharpen extortion tactics.
Ai ddos storm dark data streams overwhelming global internet map

AI-fuelled DDoS attacks surge past eight million globally

Last month
#
firewalls
#
ddos
#
network security
AI-driven botnets fuel eight million DDoS attacks in late 2025, as multi-vector assaults hit 30 Tbps and strain global critical services.
Moody cloud padlock human silhouettes identity theft pixels

Cloud identity compromise now drives most cyber attacks

Last month
#
malware
#
uc
#
firewalls
Cloud identity compromise now drives over 80% of cyber incidents, as attackers increasingly abuse trusted accounts and workplace tools.
Email attachment20260312 2842926 viqsh8

Fake Claude AI ads spread malware to target developers

Last month
#
cloud security
#
phishing
#
application security
Fake Claude AI search ads are spreading info-stealing malware, hijacking developer credentials and cloud access via spoofed download sites.
Hooded hacker in dim middle east government office night scene

Conflict sparks surge in Middle East cyber espionage

Last month
#
phishing
#
email security
#
cybersecurity
New research links Iran conflict to a swift surge in tightly targeted cyber espionage across Middle Eastern governments and embassies.
Dark office pc abstract code symbolizing fileless malware night scene

Attackers abuse Deno runtime to deploy fileless malware

Last month
#
edr
#
cybersecurity
#
keylogging
Hackers are abusing the trusted Deno JavaScript runtime to run fileless CastleRAT malware solely in memory and evade endpoint defences.
Moody corporate cloud data center breach glowing cubes leaking

Salesforce guest flaws fuel large-scale data harvesting

Last month
#
saas
#
crm
#
firewalls
Misconfigured Salesforce Experience Cloud guest profiles are being exploited for mass data harvesting, with up to 400 firms possibly affected.
Industrial control room with digital shield protecting infrastructure

Claroty named Leader in 2026 Gartner CPS security report

Last month
#
iot security
#
cx
#
martech
Claroty again named a Leader in Gartner's 2026 CPS Protection Platforms Magic Quadrant as industrial cyber-physical threats intensify.
Hybrid cloud network stolen digital identity glowing key figure

Google report warns identity is weak link in cloud

Last month
#
malware
#
ransomware
#
hybrid cloud
Attackers are ditching malware for stolen identities, misconfigurations and abused AI tools, Google warns in its latest cloud threat report.
Hooded hacker over asia pacific skyline ai ransomware cloud web

Ransomware surges across Asia-Pacific as AI fuels risk

Last month
#
data protection
#
ransomware
#
digital transformation
Ransomware attacks in Asia-Pacific surged 59% in 2025 as rapid digitalisation and AI adoption fuel faster, more targeted cyber extortion.
Doctor anxious at pc patient data leaking into ai clouds scene

GenAI drives patient data policy breaches in healthcare

Last month
#
malware
#
data protection
#
cloud security
GenAI use in healthcare is fuelling patient data policy breaches, with regulated records making up 89% of AI-linked violations, research shows.
Aditya

Kernel in the crosshairs: The BlackSanta threat campaign targeting recruitment workflows

Last month
#
storage
#
phishing
#
hcm
A stealthy BlackSanta malware spree is hijacking HR recruitment workflows, killing endpoint defence tools and exfiltrating sensitive data.