IT Brief Australia - Technology news for CIOs & IT decision-makers

Data breach stories - Page 4

Moody european office ai robot cyberattack broken network cables

AI-first firms face slower cyber recovery & higher costs

Fri, 27th Feb 2026
#
firewalls
#
ddos
#
data protection
AI-first firms take months longer to recover from cyber attacks and face sharply higher breach and scraping costs, Fastly research warns.
Dim office ransomware laptop chat bubbles qr codes masked figures

Ransomware attacks dip but NCC warns threat evolving

Fri, 27th Feb 2026
#
data protection
#
ransomware
#
iot security
Global ransomware attacks fell 17% in January, but NCC warns evolving tactics, AI and messaging apps mean risk is not receding.
Ai cyber attack hourglass binary lock cloud night office scene

AI-fuelled cyber attacks now steal data in 72 minutes

Fri, 27th Feb 2026
#
firewalls
#
pam
#
cloud security
AI-driven hackers can now steal data in just 72 minutes, as faster, multi-surface attacks overwhelm complex, over-trusting enterprises.
Dark server room ai cyber attack red network path spreading

AI-driven cyber attacks now breach networks in minutes

Thu, 26th Feb 2026
#
malware
#
firewalls
#
ransomware
AI-fuelled hackers can now spread across corporate networks in as little as four minutes, outpacing human defenders by hours.
Glowing red world map ransomware ai cyber attack broken padlock

GenAI misuse & ransomware drive surge in cyber attacks

Thu, 26th Feb 2026
#
malware
#
edutech
#
uc
Global cyber attacks hit 2,090 a week in January as ransomware surges and risky GenAI use exposes fresh data-leak and intrusion paths.
It security pro inserting hardware key laptop phishing protection

Yubico unveils YubiNation Partners identity channel push

Wed, 25th Feb 2026
#
mfa
#
phishing
#
partner programmes
Yubico launches YubiNation partner tiers and expanded training to boost phishing-resistant identity security amid rising breach costs.
Moody nighttime office insider copying files digital security shield

Insider risk costs soar as AI reshapes workplace data

Wed, 25th Feb 2026
#
data protection
#
endpoint protection
#
pam
Insider risk now costs organisations an average USD $19.5 million a year as AI reshapes data access and employee negligence drives losses.
Global upg. phase 2 partner blog header 1 1200x500px

Upgrade advantage: Why security enhancements matter for MSPs and MSSPs

Mon, 23rd Feb 2026
#
firewalls
#
vpns
#
digital transformation
For MSPs and MSSPs, next-gen firewall upgrades are now critical to stay secure, competitive and ready for relentless cyber threats.
Img 2840

Proofpoint & Concentrix deepen Asia Pacific cyber push

Mon, 23rd Feb 2026
#
data protection
#
digital transformation
#
cloud security
Proofpoint and Concentrix form Asia Pacific partnership to embed people-centric cyber and data protection tools into regional SOC services.
Untitled design  76

From breach to recovery - 5 ways to prepare your IT team for the unexpected

Sat, 21st Feb 2026
#
firewalls
#
data protection
#
dr
When cyber attacks slip through defences, recovery readiness - not just prevention - decides whether your organisation bends or breaks.
Adfinis

Adfinis unveils flat-fee OpenBao-based secrets service

Fri, 20th Feb 2026
#
devops
#
encryption
#
cloud security
Adfinis launches Secretz Enterprise, a flat-fee OpenBao-based secrets service promising up to 50% savings and 24/7 support.
Geoff schomburgk

Why Australian superannuation funds need to prioritise security for their customers with strong MFA

Thu, 19th Feb 2026
#
data protection
#
digital transformation
#
mfa
Australian super funds sit on AUD $3.7 trillion, yet weak, outdated MFA leaves members' retirement savings exposed to rising cyber threats.
Dim corporate server room mixed os racks chained ransomware lock

LockBit 5.0 ransomware targets Windows, Linux, ESXi

Wed, 18th Feb 2026
#
malware
#
virtualisation
#
data protection
New LockBit 5.0 ransomware hits Windows, Linux and ESXi in single campaigns, widening blast radius across mixed and virtualised environments.
Brett chase

Australia's cyberattack surge demands a new approach to data resilience

Wed, 18th Feb 2026
#
malware
#
data protection
#
dr
Australia faces world's highest rate of serious cyberattacks, exposing millions and forcing a rethink of data resilience strategies.
Adelaide secure data center cloud shield against cyber storms

Centacare halves Azure storage costs in DR overhaul

Wed, 18th Feb 2026
#
storage
#
data protection
#
dr
Centacare slashes Azure storage costs by 50% in disaster recovery revamp with 11:11 Systems, boosting resilience against cyber threats.
Secure australian smart living room at dusk with iot devices

Australia to enforce tougher rules on smart devices

Tue, 17th Feb 2026
#
iot
#
smart home
#
socs
Australia will impose mandatory cybersecurity standards on smart devices from March 2026, forcing stronger passwords and update guarantees.
Dim server room windows rack red warning remote access breach

Active exploitation seen in BeyondTrust access flaw

Mon, 16th Feb 2026
#
firewalls
#
network security
#
pam
Arctic Wolf says attackers are actively exploiting a critical BeyondTrust vulnerability in self-hosted remote access systems.
Nighttime small office cyberattack screens red warnings global scope

AI-driven ransomware attacks surge, most go unreported

Fri, 13th Feb 2026
#
firewalls
#
data protection
#
ransomware
AI-fuelled ransomware hit record levels in 2025, with BlackFog warning that around 86% of attacks worldwide are never publicly disclosed.
Hpe final

Exclusive: HPE Networking advances 'self-driving' networks

Fri, 13th Feb 2026
#
firewalls
#
network infrastructure
#
digital transformation
HPE unites Aruba and Juniper under the HPE Networking banner to push AI‑driven, secure, self‑managing networks for enterprise customers.
Moody phone reflection identity theft caricature upload privacy risk

ChatGPT caricature trend raises fresh ID fraud fears

Fri, 13th Feb 2026
#
data protection
#
surveillance
#
biometrics
Daon warns viral ChatGPT caricature craze is handing fraudsters a richer dossier of personal data to fuel scams and social engineering.