DataCentreNews India - Specialist news for cloud & data centre decision-makers

Threat Landscape stories - Page 3

Roi karo

Check Point unveils four-pillar AI security strategy

Last month
#
firewalls
#
hybrid cloud
#
digital transformation
Check Point launches four-pillar AI security strategy and three targeted acquisitions to secure networks, workspaces and AI agents.
Asia pacific night map cyber breaches shipping supply chain

AI-fuelled supply chain cyber attacks surge in Asia-Pacific

Last month
#
firewalls
#
ransomware
#
network security
AI is supercharging supply chain cyber attacks across Asia-Pacific, with Group-IB warning single hacks now threaten thousands of victims.
Modern it soc abstract ai brain dashboards secure cloud locks

Proofpoint buys Acuvity to secure AI agents at work

Last month
#
data protection
#
digital transformation
#
cloud security
Proofpoint snaps up AI security specialist Acuvity to police 'agentic workspaces' as enterprises rush to deploy copilots and agents.
Soc cisos overwhelmed by red alerts few highlighted in focus

Cyber firms face 'verification crisis' on real risk

Last month
#
firewalls
#
devops
#
digital transformation
Cyber firms warned over 'verification crisis' as tools flag floods of flaws but only 0.47% prove exploitable, leaving real risk unresolved.
Australian cybersecurity control room ai threats safe internet

AI reshapes cyber threats as Safer Internet Day nears

Last month
#
firewalls
#
ddos
#
network security
AI-driven agents and rising network attacks are reshaping cyber risks, experts warn, as Safer Internet Day 2026 urges 'verified trust' online.
Jonathan dixon

CrowdStrike names Jonathon Dixon to lead JAPAC growth

Last month
#
ransomware
#
endpoint protection
#
digital transformation
CrowdStrike appoints veteran executive Jonathon Dixon to lead JAPAC, driving Falcon platform adoption and regional cyber security growth.
Rockwell automation senior executives

Rockwell opens Singapore SOC to secure Asia Pacific OT

Last month
#
firewalls
#
ransomware
#
digital transformation
Rockwell opens a 24/7 Singapore security operations centre to monitor and defend industrial OT networks across the Asia Pacific region.
Glowing neural network shield ai cybersecurity cloud servers

Palo Alto revamps NextWave to reward AI security platforms

Last month
#
firewalls
#
digital transformation
#
network security
Palo Alto overhauls NextWave to reward partners building AI-driven security platforms and services over traditional product sales volume.
Moody corporate office night remote access malware attack scene

Screensaver phishing installs remote access tools covertly

Last month
#
storage
#
firewalls
#
ransomware
Attackers are abusing Windows screensaver files in a spearphishing campaign to stealthily install remote access tools on business systems.
Dr. ren%c3%a9e burton infoblox 1

Global router hijack campaign silently reroutes DNS

Last month
#
firewalls
#
network security
#
iot security
A global “shadow DNS” campaign is hijacking vulnerable Wi‑Fi routers, silently rerouting users' web traffic towards scams and malware.
Software engineer multi monitor secure coding ai brain office

Security Journey unveils AI-era developer manifesto

Last month
#
application security
#
devsecops
#
supply chain
Security Journey launches AI-era developer manifesto and revamped platform to embed secure coding into everyday workflows and tooling.
Dim soc with unattended monitors red alerts world map shadow

Ignored low-priority alerts fuel real enterprise breaches

Last month
#
firewalls
#
endpoint protection
#
encryption
Ignored 'low-risk' security alerts are seeding real enterprise breaches, with Intezer warning of dozens of overlooked threats each year.
Australian city night cctv hacker warning shadowy silhouette

Critical flaw found in IDIS Cloud Manager CCTV viewer

Last month
#
ransomware
#
iot security
#
phishing
A critical ICM Viewer flaw lets a single malicious click hijack IDIS CCTV hosts, exposing Australian networks to deep lateral attacks.
Australia modern data center cloud security partnership awards

Data#3, Perfekt, Secureware win 11:11 APAC honours

Last month
#
dr
#
digital transformation
#
hyperscale
Data#3, Perfekt and Secureware have been named 11:11 Systems' top Asia-Pacific partners in inaugural awards for cloud and security projects.
Images

Okta names Dan Mountstephen to lead APJ identity push

Last month
#
digital transformation
#
cloud security
#
partner programmes
Okta appoints Dan Mountstephen to steer Asia Pacific and Japan growth, sharpening its identity-led cyber and AI security strategy.
Cybersecurity ops room analyst monitoring ai threat map alerts

AI security drives demand for faster pentesting models

Fri, 30th Jan 2026
#
devops
#
digital transformation
#
cloud security
AI security fears and rapid release cycles are pushing firms to demand faster, deeper pentesting - and many are ready to ditch existing vendors.
Athletic shoe hq night storm cyber attack data breach scene

Nike probes suspected cyber attack after data leak claim

Thu, 29th Jan 2026
#
data protection
#
dr
#
ransomware
Nike is investigating a suspected cyber attack after hackers claimed access to terabytes of internal data, raising global security concerns.
Shadowy hacker at multiple monitors faces fingerprints binary

AI crime matures as jailbreak, malware & deepfakes grow

Thu, 29th Jan 2026
#
malware
#
physical security
#
email security
AI crime is shifting from experiments to a stable industry, with jailbreak services, adaptive malware and deepfake fraud becoming routine.
Ai cyber attack zero trust server room glowing data shield

AI reshapes data privacy as trust & attacks escalate

Thu, 29th Jan 2026
#
data protection
#
ransomware
#
phishing
AI is transforming data privacy as mistrust soars and cyber attacks accelerate, pushing firms to verify every identity and machine action.
John and peter

Dell warns of rising cyber 'resilience debt' in Australia

Thu, 29th Jan 2026
#
data protection
#
dr
#
network infrastructure
Dell warns Australian firms face mounting “resilience debt” as prevention outspends recovery, leaving backups exposed to cyberattacks.