SecurityBrief New Zealand logo
New Zealand's leading source of cybersecurity and cyber-attack news

Cybersecurity news stories - Page 2

Story image
Ransomware
Akamai researches top three internet security threats
Akamai Technologies has released three new research reports focusing on ransomware, web applications and APIs, and DNS traffic.
Story image
Cybersecurity
Dragos launches cybersecurity resource for industrial assets
Dragos has launched Operational Technology - Cyber Emergency Readiness Team (OT-CERT), a cybersecurity resource made specifically for industrial asset owners and operators.
Story image
Ransomware
Organisations in Singapore paying multiple ransom demands
80% of organisations in Singapore suffered at least one ransomware attack in 2022, compared to the 60% reported in 2021.
Story image
Cybersecurity
Tonik chooses Noname Security to safeguard digital platform
Tonik has chosen Noname Security to help safeguard a critical component of its digital platform as it works on finding new retail lending opportunities in Southeast Asia.
Story image
Cybersecurity
CrowdStrike doubles down on visibility with new graph database
CrowdStrike Asset Graph is a new graph database powered by the CrowdStrike Security Cloud, providing IT leaders with a 360-degree view into all assets.
Story image
Cybersecurity
Visibility and control gaps undermining security - report
Organisations are struggling to define and secure an expanding cyber-attack surface, hampering risk management efforts.
Story image
Artificial Intelligence
Fortinet introduces self-learning AI capabilities
"With the introduction of FortiNDR, we're adding robust network detection and response to the Fortinet Security Fabric."
Story image
Cybersecurity
2021 the year cyber criminals got creative - Proofpoint
One constant that remains as organisations approach a sense of normalcy after a disruptive year is that cyber criminals continue to target and exploit people.
Story image
Communication
Q&A: Oculeus discusses the current state of telecoms fraud and beyond
The basic facts are that we are all exposed to telecoms fraud – from providers of communications services to enterprises and organisations to individual consumers.
Story image
Cybersecurity
Who is on Fortinet’s new Public Sector Advisory Council?
Fortinet says its new Public Sector Advisory Council will expand its commitment to secure public sector organisations worldwide.
Story image
Nutanix
Avoid the sugar high: Making the most of the government's SMB digital sweetener
With the federal election now behind us, small-to-medium businesses (SMB) in Australia still face the same challenges and opportunities they did just a few weeks ago.
Story image
Cybersecurity
Productivity wasted as employees sort out spam emails
Employees who receive 30-60 external emails per day could be wasting 11 hours every year looking through and identifying spam messages.
Story image
Training
Why security must be a priority in the software development process
Ask a typical software developer to name their top priority when writing code, and the answer is likely to be ‘creating new features’. Security is simply not on the radar screen for most developers.
Story image
Malware
What we can learn from the leaked Conti ransomware group chats
In February, Russia-based ransomware group Conti declared it would fully support the Russian Government during its invasion of Ukraine.
Story image
Collaboration
Thales and Palo Alto Networks roll out new zero trust integrations
A long-standing collaboration between the two global cybersecurity experts, Thales and Palo Alto Networks, is designed help support widespread cloud migration.
Story image
Cybersecurity
The importance of zero trust to secure the expanding edges of networks
The increasing number of digital environments adds complexity to modern networks. As the network expands, so too does the potential attack surface that cybercriminals can exploit.
Story image
Cybersecurity
Secureworks researches new threat to Elasticsearch databases
Researchers from Secureworks' Counter Threat Unit have identified indexes of multiple internet-facing Elasticsearch databases replaced with a ransom note.
Story image
Cybersecurity
82% of CIOs say software supply chains are vulnerable
A new study from Venafi has found 82% of CIOS say their organisations are vulnerable to cyberattacks targeting software supply chains. 
Story image
Cybersecurity
Australian CISOs concerned over multi-layered security
The speed and complexity created by using multicloud environments and open source software libraries are making vulnerability management more difficult.
Story image
Cloud
Ransomware attacks on healthcare increased 94% in 2021
New research has revealed a 94% increase in ransomware attacks on the organisations within the healthcare sector during 2021. 
Story image
Cybersecurity
Workforce shortage impacting cybersecurity posture
“Closing the cybersecurity talent gap is not only a business imperative, but important to national security and our daily lives."
Story image
Cybersecurity
ESET launches new range of solutions to partner with telcos and ISPs
The all-new ESET NetProtect will enable telcos and ISPs to offer consumers easy-to-use, installation-free protection against various online threats.
Story image
Cybersecurity
Retailers amongst most targeted by cybercriminals
While online shopping has opened up a new world of convenience, it has meant retailers have increasingly become targets of cyber attacks and scammers. 
Story image
Cloud
Microsoft Entra - the new branch for identity and access solutions
Microsoft launches its new Microsoft Entra product family and announces three new solutions: Permissions Management, Verified ID and Identity Governance.