FutureFive New Zealand - Consumer technology news & reviews from the future

Cyber attacks stories - Page 3

Flux result ee5ad0d5 3607 4258 9d99 6077b9989b34

Databricks launches Lakewatch to counter AI attacks

Last month
#
firewalls
#
data analytics
#
siem
Databricks unveils Lakewatch, an AI-driven security platform aiming to replace legacy SIEM tools and counter automated cyber attacks.
Google wiz ai cloud defense illustration cloud fortress locked storm

Google closes Wiz deal & unveils AI security tools

Last month
#
virtualisation
#
firewalls
#
data protection
Google folds Wiz into its cloud security arm and launches AI-driven tools to counter rapidly evolving, automated cyber threats.
Global managed cybersecurity partnership incident response puzzle

LevelBlue & SentinelOne expand global security tie-up

Last month
#
ransomware
#
siem
#
cloud security
LevelBlue deepens ties with SentinelOne in a global pact to deliver unified AI-driven MDR, SIEM and incident response services.
Elia zaitsev   headshot

CrowdStrike launches AI tools for cloud, MDR & data

Last month
#
data protection
#
digital transformation
#
cloud security
CrowdStrike unveils AI-driven tools spanning cloud, MDR and data security as firms race to counter faster, increasingly automated cyber threats.
Realistic office server room after data outage it staff restoring backups

World Backup Day warns firms on untested recoveries

Last month
#
storage
#
malware
#
data protection
World Backup Day prompts warnings that untested restores and AI-era data demands are leaving mid-sized firms dangerously exposed.
Corporate soc monitoring unified cloud shield threat detect

Broadcom launches Symantec CBX cloud security platform

Last month
#
firewalls
#
ransomware
#
digital transformation
Broadcom unveils Symantec CBX, a unified cloud XDR platform blending Symantec and Carbon Black tech to simplify advanced threat defence.
Editorial world map storm network lines ransomware hooded nodes

CrowdStrike flags faster AI-driven cyber attacks worldwide

Last month
#
ransomware
#
cloud security
#
phishing
AI-fuelled cyber attacks are spreading faster worldwide, CrowdStrike warns, as breakout times plummet and criminals weaponise mainstream tools.
Editorial corporate security leader incident response cloud risk operations center

Commvault, TIME launch CISO award for cyber resilience

Last month
#
data protection
#
devops
#
digital transformation
Commvault and TIME unveil a CISO of the Year award spotlighting security leaders driving cyber resilience amid rising AI and cloud threats.
Editorial illustration corporate criminal network ops map servers

HPE Threat Labs spot industrialised cybercrime surge

Last month
#
malware
#
firewalls
#
vpns
HPE Threat Labs warns cybercrime now runs like big business, as AI-fuelled, industrial-scale attacks hammer government and finance.
Security operations center analyst alert workflow automation cloud endpoint

Elastic drops endpoint fees as it adds workflow automation

Last month
#
endpoint protection
#
siem
#
cloud security
Elastic scraps per-endpoint XDR fees and adds native workflow automation in a bid to lower cyber costs and widen security coverage.
Moody soc under attack shadowy intruder blind speed stealth

Google Mandiant report spots faster, stealthier cyberattacks

Last month
#
virtualisation
#
firewalls
#
data protection
Google's latest Mandiant report warns cyberattacks are faster and stealthier as AI-powered tools narrow defenders' response times to seconds.
Devvret rishi x annekagupta

Rubrik deepens identity security & AI governance push

Last month
#
data protection
#
dr
#
pam
Rubrik links Microsoft Defender with new AI governance engine SAGE to speed identity attack recovery and tighten control of autonomous agents.
Editorial world map middle east highlight network warning lines

NCC Group warns Iran cyber threats spread worldwide

Last month
#
gaming
#
firewalls
#
network security
Iran-linked cyber attacks are spreading beyond the Middle East, with firms tied to Israel or the US warned they face heightened global risk.
Mathivanan v

ManageEngine adds EDR & Zero Trust access to platform

Last month
#
malware
#
firewalls
#
vpns
ManageEngine folds EDR and Zero Trust private access into Endpoint Central, unifying endpoint management and security in one console.
Modern enterprise soc unified cloud server network threat maps hub

Simbian launches AI platform for unified cyber ops

Last month
#
devops
#
cloud security
#
application security
Simbian unveils an AI-driven cyber security platform uniting offence and defence via a shared Context Lake to speed, link and automate response.
Gal naor x ted oade x ken barth

World Backup Day shifts focus from speed to recovery

Last month
#
storage
#
data protection
#
dr
World Backup Day now spotlights recoverability and data integrity as AI, cloud volatility and flash costs reshape corporate storage priorities.
Aron brand x oded nagel x ravit sadeh x itay uman

World Backup Day spotlights backups as boardroom issue

Last month
#
storage
#
data protection
#
dr
World Backup Day now warns boards that backup is no mere IT chore, but a frontline defence against ransomware targeting recovery itself.
Digital login screen shadows identity theft binary chains art

Barracuda warns of surge in credential-focused attacks

Last month
#
malware
#
firewalls
#
ransomware
Barracuda reports a global surge in identity-based cyber attacks, with stolen credentials, supply-chain abuse and weaponised PDFs on the rise.
Night power plant partial blackout europe mideast cloud silhouettes

Politically driven cyber-physical attacks surge globally

Last month
#
physical security
#
risk & compliance
#
cybersecurity
Politically charged cyber-physical attacks surge as low-tech intrusions hit industrial control systems linked to Iran- and Russia-backed groups.
Office worker ai email security green calm vs red phishing streams

Abnormal AI rolls out Attune 1.0 to fight AI cyberattacks

Last month
#
uc
#
phishing
#
advanced persistent threat protection
Abnormal AI launches Attune 1.0, a behavioural model that spots AI-crafted cyberattacks by learning normal workplace communication patterns.