IT Brief Australia - Technology news for CIOs & IT decision-makers

Data breach stories - Page 3

Secure multi cloud data resilience australia new zealand map

Cohesity & Cyera integrate DSPM to boost data security

Last month
#
data protection
#
dr
#
ransomware
Cohesity deepens its Cyera tie-up, embedding DSPM into its data cloud to sharpen discovery, classification and cyber recovery at scale.
Australian office worker unlocks multiple digital padlocks data leak

Australians overconfident as risky password habits persist

Last month
#
mfa
#
phishing
#
physical security
Australians feel confident spotting cyber threats, but most still reuse passwords, share logins and ignore breaches unless directly alerted.
Global office night cyber attack hacker shadows cracked cloud

Cyber attacks stay near record high as GenAI risks grow

Last month
#
edutech
#
firewalls
#
data protection
Global cyber attacks hover near record highs as unchecked workplace GenAI use exposes sensitive data in one in 31 corporate prompts.
Meta smart glasses reflecting surveillance grid data leak risk

Sama credential leaks raise fears over Meta glasses data

Last month
#
wearables
#
data protection
#
surveillance
Leaked Sama staff logins tied to stealer malware spark fresh alarm over security of Meta Ray-Ban smart glasses video review pipeline.
Moody server room supply chain breach glowing red lock icon

ShinyHunters claims Woflow breach in supply chain hack

Last month
#
data protection
#
ransomware
#
mfa
ShinyHunters claims it hacked merchant data firm Woflow, raising supply chain fears for major brands despite no confirmed breach yet.
Worried office worker old phone shadow hacker corporate network

Coruna exploit kit exposes risks for outdated iOS users

Last month
#
endpoint protection
#
pam
#
mfa
New Coruna exploit kit shows outdated iOS devices face automated, scalable attacks that can turn compromised phones into corporate gateways.
Japan factory night ransomware attack shadow figure network

Ransomware attacks surge 50% as industrial firms hit hardest

Last month
#
malware
#
data protection
#
ransomware
Global ransomware attacks jump 50% to 7,874 in 2025, with industrial firms bearing the brunt as criminal groups reshuffle their tactics.
Heather mahalik  1

Why women can be leaders when it comes to AI

Last month
#
data protection
#
ransomware
#
digital transformation
Women in cybersecurity, long trained to question and validate, are uniquely placed to lead the era of risky, fast‑moving AI tools.
Overhead office ai tools data streams with glowing security shield

Teramind launches AI governance to tackle shadow AI

Last month
#
firewalls
#
digital transformation
#
network security
Teramind has unveiled an AI governance platform to monitor workplace AI tools and shadow agents, aiming to curb hidden data and security risks.
Hooded cyber figure identity attack breached accounts blue tones

Identity attacks dominate Expel's 2026 threat report

Last month
#
malware
#
endpoint protection
#
mfa
Identity-based attacks drove nearly 70% of incidents in Expel's 2026 threat report, exposing gaps between basic controls and real-world defence.
Features to outcomes blog 260302

Why real cyber protection is a continuous discipline

Last month
#
firewalls
#
endpoint protection
#
digital transformation
SonicWall urges MSPs and SMBs to stop chasing security features and instead demand managed, measurable protection and real outcomes.
Ai security lock glass office data breach neural network night

AI adoption drives security spend but breaches persist

Last month
#
data protection
#
hybrid cloud
#
digital transformation
Rising AI adoption is driving higher security spend, yet most enterprises still suffer repeated breaches as risk outpaces new defences.
Cinematic australian office night insider stealing data usb drive

Malicious insider threats outpace negligence in Australia

Last month
#
cloud security
#
phishing
#
socs
Malicious insider threats now outpace negligence in Australia, as Mimecast warns rising AI-fuelled attacks are testing outdated security models.
Night corporate office cybersecurity team incident response scene

LevelBlue unveils flexible funds-based cyber IR retainer

Last month
#
ransomware
#
devops
#
socs
LevelBlue launches Resilience Retainer, a flexible funds-based cyber incident response service with rapid SLAs and rollover security spend.
Global upg

Upgrading firewalls into a high‑margin MSP revenue win

Last month
#
firewalls
#
network infrastructure
#
network security
New SonicWall firewall upgrades promise MSPs and MSSPs lower costs, higher margins and stronger security-driven recurring revenue.
Anz city skyline night ai ransomware cyber extortion hackers

Cyber extortion tops 2025 attacks as AI risks escalate

Last month
#
data protection
#
ransomware
#
mfa
Cyber extortion has overtaken email scams as the top 2025 attack, as AI-powered threats grow and financial firms become prime targets.
Steve

Slipstream Cyber joins Atmos incident response panel

Last month
#
dr
#
ransomware
#
devops
Slipstream Cyber joins Atmos' First Response and Remediation Panel to bolster early-stage digital forensics and incident response support.
Data sovereignty gaps europe canada middle east leaking cloud

Survey reveals data sovereignty gap despite high spend

Sat, 28th Feb 2026
#
data protection
#
hybrid cloud
#
encryption
Firms spend millions on data sovereignty and rate awareness high, yet Kiteworks survey finds persistent breaches and cross-border exposure.
Uk security operations center night monitors shield backup alert

N-able adds real-time alerts to protect backup policies

Fri, 27th Feb 2026
#
firewalls
#
data protection
#
dr
N-able adds real-time anomaly alerts to Cove Data Protection, flagging risky backup policy changes linked to identity-driven attacks.
Ransomware threat dark server room to critical infrastructure art

NCC warns ransomware risk persists despite January dip

Fri, 27th Feb 2026
#
ransomware
#
manufacturing
#
digital transformation
Ransomware cases dipped 17% in January, but NCC warns the threat remains high as Qilin targets critical sectors and tactics evolve.