SecurityBrief New Zealand - Technology news for CISOs & cybersecurity decision-makers

Patching stories - Page 4

Looming wave digital vulnerabilities cracked software cubes

Cybersecurity teams brace for surge in global CVEs in 2026

Thu, 12th Feb 2026
#
siem
#
cloud security
#
socs
Cyber group FIRST warns CVE disclosures could smash records in 2026, topping 50,000 and potentially surging towards six figures.
Moody windows server room red rack cracked email lock binary

SmarterMail flaw exploited in China-linked ransomware push

Thu, 12th Feb 2026
#
firewalls
#
vpns
#
ransomware
China-linked Warlock ransomware group exploits SmarterMail flaw for admin takeovers, chaining features to gain full Windows control.
Nz digital agency control room wellington skyline security

Wellington startup launches Metaport for agency risk

Wed, 11th Feb 2026
#
devops
#
cx
#
martech
Wellington startup Dcentrica has unveiled Metaport, a platform giving digital agencies real-time visibility of security and maintenance risk.
Code vein 2 screenshot

Game review: Code Vein II (PS5)

Mon, 9th Feb 2026
#
gaming
#
digital entertainment
#
console gaming
Anime souls-like Code Vein II delivers stylish combat and loyal AI partners, but clumsy dodging and no online co-op hold it back.
Yuvraj

Exclusive: Yuvraj Pradhan warns legacy VPNs are now a security risk

Fri, 6th Feb 2026
#
malware
#
firewalls
#
vpns
Legacy VPNs are emerging as a prime security liability as hybrid work, identity‑based attacks and cloud apps expose their design flaws.
Moody corporate cloud analytics server room cracked shield leak

Tenable reveals 'LookOut' flaws that endanger Google Looker

Fri, 6th Feb 2026
#
firewalls
#
data analytics
#
network security
Tenable warns 'LookOut' flaws in Google Looker could hand attackers server control, expose secrets and enable cross-tenant cloud access.
Dark server room red glowing rack critical data leak cinematic

Tenable finds critical flaws in Google Looker platform

Thu, 5th Feb 2026
#
private cloud
#
hybrid cloud
#
data analytics
Tenable warns critical Google Looker flaws could enable server takeover and data theft, leaving unpatched self-hosted deployments exposed.
Moody server room data leak shadowy figures cross tenant breach

Tenable reveals Looker flaws risking cross-tenant attacks

Thu, 5th Feb 2026
#
data analytics
#
cloud security
#
application security
Tenable warns unpatched self-hosted Google Looker systems face remote takeover, data theft and cross-tenant cloud attack risks.
Cloud shield of secure containers with locks gears investment

RapidFort raises USD $42m for automated vuln fixes

Thu, 5th Feb 2026
#
cloud security
#
application security
#
devsecops
RapidFort secures USD $42m Series A to scale automated software supply chain security and continuous vulnerability remediation.
Moody smart home night wifi router dark web online fraud net

Global router hijack uses rogue DNS to monetise web

Wed, 4th Feb 2026
#
firewalls
#
network security
#
iot security
Hackers are hijacking ageing home routers worldwide, covertly rewiring DNS to quietly cash in on everyday web browsing traffic.
Australian city night cctv hacker warning shadowy silhouette

Critical flaw found in IDIS Cloud Manager CCTV viewer

Tue, 3rd Feb 2026
#
ransomware
#
iot security
#
phishing
A critical ICM Viewer flaw lets a single malicious click hijack IDIS CCTV hosts, exposing Australian networks to deep lateral attacks.
Global upg. phase 2 partner blog header 7 1200x500px

Apex champions proactive firewall upgrades for MSPs

Mon, 2nd Feb 2026
#
firewalls
#
encryption
#
network security
Apex Computing turns firewall upgrades into planned security strategy, helping clients avoid breaches, downtime and costly distressed buys.
Ally bricked 00

Windows security breaks ROG Xbox Ally handheld game consoles

Sat, 31st Jan 2026
#
gaming
#
digital entertainment
#
cybersecurity
Windows 11 security is blocking key software on Asus ROG Xbox Ally consoles, leaving pricey handhelds struggling to launch games properly.
Cinematic night city cyberattack red windows shattering locks

Fewer ransomware gangs, but more victims in late 2025

Thu, 29th Jan 2026
#
ransomware
#
digital transformation
#
advanced persistent threat protection
Ransomware gangs shrank in number but hit more victims in late 2025, with leak-site postings soaring despite fewer active groups.
Mathieu chevalier(2)

Genetec sets privacy rules for physical security data

Tue, 27th Jan 2026
#
data protection
#
smart cities
#
surveillance
Genetec issues privacy rules for physical security data, urging clear limits, encryption and ongoing cyber defence for surveillance systems.
Msp operations center dashboards it manager hybrid endpoints

ControlUp unveils multi-tenant DEX platform for MSPs

Fri, 23rd Jan 2026
#
mdm
#
cx
#
martech
ControlUp has launched a multi-tenant digital experience platform and partner programme to help MSPs automate IT, boost CX and grow revenue.
Image

SonicWall pushes unified automation for faster cyber defence

Fri, 23rd Jan 2026
#
malware
#
firewalls
#
ransomware
SonicWall launches unified automation tools to cut alert fatigue, speed cyber threat remediation and streamline overstretched security teams.
Hooded binary figure ai cyber threats glowing locked data shield

Experts warn AI era demands tougher data protection

Fri, 23rd Jan 2026
#
data protection
#
digital transformation
#
pam
Experts say AI-driven attacks and rampant data leaks mean organisations must verify outputs, curb collection and harden identity controls.
Warehouse retail storefront exposed credentials cyber risk network

Retail & wholesale hit by exposed shared credentials

Fri, 23rd Jan 2026
#
ransomware
#
supply chain
#
risk & compliance
Over 70% of major retailers and nearly 60% of wholesalers have exposed credentials, leaving shared supply chains ripe for attack.
Modern european factory ai robots zero trust cybersecurity

Industrial AI drives new approach to OT cyber security

Thu, 22nd Jan 2026
#
firewalls
#
cloud security
#
iot security
Industrial AI and IT/OT convergence are forcing factories to abandon closed networks and adopt hybrid, zero trust cyber security architectures.