FutureFive New Zealand - Consumer technology news & reviews from the future

Threat modelling stories

Cybersecurity analyst ai red teaming prompt injection shield branching

Novee launches AI red teaming tool for LLM app risks

Last month
#
devops
#
cloud security
#
application security
Novee unveils an autonomous AI red teaming tool to probe LLM apps for prompt injection, jailbreaks and other emerging security flaws.
Fletcher davis

BeyondTrust warns of 467% rise in enterprise AI agents

Last month
#
crm
#
hyperscale
#
pam
BeyondTrust warns a surge of unsupervised AI agents is creating a hidden “shadow workforce” with admin-level access inside enterprises.
Cybersecurity analyst dashboard network risks two click workflow

NetSPI unveils AI-led workflow redesign for pentesting

Last month
#
devops
#
cloud security
#
application security
NetSPI unveils an AI-powered overhaul of its pentesting platform UX, promising two-click workflows and sharper risk-based remediation focus.
Sleek enterprise datacenter servers shielded secure blue glow

Lineaje unveils UnifAI to secure enterprise agentic AI

Last month
#
data protection
#
digital transformation
#
application security
Lineaje launches UnifAI, a security and governance layer to centralise control, discovery and policy for enterprise agentic AI deployments.
Ai data center construction with digital twin secure infra

TrendAI, Nvidia bring digital twin security to AI hubs

Last month
#
firewalls
#
hybrid cloud
#
digital transformation
TrendAI and Nvidia link DSX Air with digital twin security tools so AI datacentre “factories” can be hardened before hardware is built.
Kim wuyts headshot

Women in cybersecurity, what it really looks like, and where you can fit

Last month
#
risk & compliance
#
data privacy
#
cybersecurity
Women hold under a quarter of cyber roles, but the field is broader, more human and more open to curiosity than many women are told.
Asian engineer cybersecurity breach red warnings cloud repos

Claude Code flaws expose new risks in AI dev tools

Last month
#
devops
#
cloud security
#
application security
Claude Code flaws found by Check Point could let malicious repos run code and grab API keys before developers confirm a project is trusted.
Nighttime cybersecurity ops center email alerts ai shield scene

IRONSCALES adds AI agents to counter next‑gen phishing

Last month
#
uc
#
data protection
#
cloud security
IRONSCALES' Winter 2026 Release debuts three AI agents, outbound encryption and Teams deepfake defences to counter next‑gen phishing.
Connected tractor combine wheat field cyber threat clouds

NCC warns of rising cyber risks to connected farming

Last month
#
agricultural technology
#
ransomware
#
cloud security
NCC warns that insecure connected farm machinery could let cyber attacks disrupt harvests, cut yields and threaten food supply chains.
Cybersecurity ops room female leader collaborative team risk mgmt

Women call for visibility & voice in cybersecurity

Last month
#
risk & compliance
#
cybersecurity
#
recruitment
Women in cybersecurity demand real visibility and inclusion, warning that lack of female voices skews risk, products and leadership decisions.
Megan squire

Stop framing deepfake harassment of women as a social problem - It's a cybersecurity problem

Last month
#
ransomware
#
genai
#
ai
Non-consensual deepfake abuse of women is not just online harassment but cybercrime, demanding full threat intelligence and security action.
Story 299992

Codific maps five cyber paths threatening power grids

Fri, 27th Feb 2026
#
virtualisation
#
dr
#
ransomware
Codific warns power grids face repeat cyberattack patterns and urges utilities to bolster resilience to outages and cascading disruption.
Story 300075

OpenClaw AI assistant surge sparks major security fears

Fri, 27th Feb 2026
#
malware
#
phishing
#
application security
A rapid surge in OpenClaw AI assistant use has left tens of thousands of exposed systems and a trail of hijacked tools and malicious add-ons.
Smartphone face scan with concentric shields anti deepfake security

3DiVi sets four-layer defence for face authentication

Thu, 19th Feb 2026
#
data protection
#
devops
#
surveillance
3DiVi unveils four-layer defence model to harden face authentication against deepfakes and spoofing as remote ID checks surge globally.
Modern cybersecurity war room ai brain shield team collab

CompTIA launches SecAI+ to tackle AI security skills

Wed, 18th Feb 2026
#
malware
#
data protection
#
devops
CompTIA unveils SecAI+ certification to equip cybersecurity professionals with AI security, risk management and governance skills.
European child laptop home safe ai shields padlocks trust circle

Safer Internet Day spotlights AI, trust & child safety

Tue, 10th Feb 2026
#
data protection
#
surveillance
#
encryption
Safer Internet Day highlights how AI is transforming online trust, child protection and digital commerce, amid calls for stricter safeguards.
Cinematic cloud datacenter ai silhouette protecting data streams

AI reshapes data privacy as firms shift to real-time defence

Thu, 29th Jan 2026
#
saas
#
data protection
#
devops
AI-driven cloud adoption is forcing firms to swap static privacy checklists for continuous, real-time defence of sensitive data flows.
Whatsapp strict account settings header

WhatsApp unveils lockdown mode for high-risk users

Wed, 28th Jan 2026
#
data protection
#
surveillance
#
encryption
WhatsApp launches Strict Account Settings, a lockdown mode offering tighter privacy and security for journalists and other high‑risk users.
Modern car cutaway ecus wiring hpc chips engineers in lab

GlobalLogic, Elektrobit deepen software-defined car push

Fri, 23rd Jan 2026
#
devops
#
cartech
#
hpc
GlobalLogic and Elektrobit are deepening their 15-year alliance to accelerate software-defined vehicles, safety, cyber security and HPC.
Modern european factory ai robots zero trust cybersecurity

Industrial AI drives new approach to OT cyber security

Thu, 22nd Jan 2026
#
firewalls
#
cloud security
#
iot security
Industrial AI and IT/OT convergence are forcing factories to abandon closed networks and adopt hybrid, zero trust cyber security architectures.