IT Brief New Zealand - Technology news for CIOs & IT decision-makers

Hacking stories

Smart home living room night family devices secure wifi router

Most homes never change router passwords, guide warns

Last month
#
malware
#
firewalls
#
data protection
Most households leave router admin passwords unchanged, prompting insurer Everywhen to issue a 10‑step guide to secure home Wi‑Fi.
Shadowy hacker dark office red warnings world map cyber attacks

AI-fuelled cyber attacks surge 70%, Check Point warns

Fri, 30th Jan 2026
#
saas
#
firewalls
#
data protection
AI-driven hacking has pushed weekly cyber attacks up 70% since 2023, with Check Point warning campaigns are faster, broader and harder to stop.
Untitled design  13

ManageMyHealth fixes code and bolsters security after hack

Thu, 8th Jan 2026
#
data protection
#
ransomware
#
mfa
ManageMyHealth says it has fixed code flaws and tightened logins after a hack that may have exposed health documents of up to 7% of users.
Nz suburban dusk street data breach shadowy hacker scene

Neighbourly data breach: Stuff files High Court injunction

Mon, 5th Jan 2026
#
data protection
#
phishing
#
email security
Neighbourly has been taken offline while Stuff and external experts probe claims of a data breach affecting the community website's users.
Worried patient computer broken medical lock nz suburb night scene

Government orders review into ManageMyHealth data breach

Mon, 5th Jan 2026
#
data protection
#
ransomware
#
advanced persistent threat protection
Government orders urgent review into ManageMyHealth cyber breach as hackers threaten to leak 400,000 patient files over NZD $60,000.
Moody corporate control room ai security alerts asian megacity

Agentic AI forces new rules as digital disobedience rises

Fri, 2nd Jan 2026
#
cx
#
martech
#
soc
Agentic AI and digital disobedience will strain policy, security and governance in 2026 as autonomous firms and users test new limits.
Moody whatsapp spy ghost hand reaching from linked laptop dark

'GhostPairing' scam turns WhatsApp linking into spy tool

Thu, 18th Dec 2025
#
data protection
#
surveillance
#
encryption
Researchers warn a new 'GhostPairing' WhatsApp scam turns device linking into a stealth spy tool, hijacking chats via trusted contacts.
Bitdefender battlefield 6 1

Battlefield 6 fans targeted by malware hidden in fake game files

Wed, 26th Nov 2025
#
malware
#
gaming
#
advanced persistent threat protection
Cybercriminals target Battlefield 6 fans with malware disguised as pirated copies and trainers, risking data theft and remote PC control, warns Bitdefender Labs.
The outer worlds 2 screenshot

Game review: The Outer Worlds 2 (Xbox Series X)

Wed, 29th Oct 2025
#
gaming
#
digital entertainment
#
bethesda
The Outer Worlds 2, available on PC and Xbox Game Pass, offers snappy combat and faction choices but suffers from frustrating missions and limited immersion.
Hooded hacker dark room multiple screens blockchain code cyberattack

North Korean group uses blockchain to launch advanced malware

Fri, 17th Oct 2025
#
malware
#
crypto
#
blockchain
A North Korean group has used blockchain-based EtherHiding to secretly deploy malware, targeting developers in tech and cryptocurrency sectors worldwide.
Worried new zealand customer with robot and friendly human agent in nz landscape

Kiwis lose trust in AI as preference for human service prevails

Wed, 8th Oct 2025
#
cx
#
martech
#
data privacy
Only 18% of New Zealanders trust companies' use of AI, with 62% fearing it limits human contact, impacting spending and loyalty in customer service.
Realistic masked hacker computer dark room digital locks encrypted files ai ransomware

AI gives cyber criminals new tools in evolving ransomware threat

Wed, 27th Aug 2025
#
malware
#
ransomware
#
encryption
Cyber criminals are increasingly using AI tools to enhance ransomware attacks, complicating defences for individuals and organisations alike.
Realistic masked hacker laptop dark room digital data flows ransomware ai

Agentic AI ransomware is on its way

Tue, 24th Jun 2025
#
malware
#
ransomware
#
phishing
Agentic AI ransomware, using cooperating AI modules for faster, smarter attacks, is expected to emerge by 2026, posing new cybersecurity threats.
Bugcrowd

AI seen boosting hacking value by 71%, says Bugcrowd

Thu, 17th Oct 2024
#
advanced persistent threat protection
#
genai
#
ai
A new Bugcrowd report reveals 71% of hackers believe AI has boosted hacking's value, with 77% now using generative AI tools.
Evotinction screenshot

Game review: Evotinction (PS5)

Tue, 24th Sep 2024
#
gaming
#
digital entertainment
#
ar, vr & metaverse
Evotinction, a new stealth game by Spikewave Games, lets you hack and sneak your way through a futuristic facility. Despite some flaws, it's a solid effort. 7/10.
Star wars outlaws screenshot

Game review: Star Wars Outlaws (PS5)

Mon, 2nd Sep 2024
#
gaming
#
digital entertainment
#
ubisoft
Ubisoft's Star Wars Outlaws offers stellar space exploration and stunning graphics, but clunky stealth and repetitive missions hamper its full potential. Verdict: 8.0/10.
Img ccqvgkowzxgx61txyw0kcz0x

Ticketmaster cyberattack - what lessons can be learnt?

Fri, 7th Jun 2024
#
firewalls
#
siem
#
network security
The Ticketmaster data breach affected 560 million people, with personal data being sold for USD $500 million. AI-powered SIEM systems emerge as key in preventing such cyberattacks.
System shock screenshot

Game review: System Shock (Xbox Series X)

Fri, 7th Jun 2024
#
gaming
#
digital entertainment
#
kickstarter
The System Shock remake for Xbox Series X brings better graphics and an intriguing storyline but is held back by outdated mechanics and lack of waypoints. 7.5/10.
Img 5sukjbu0m0l3q1fd22a6oiof

Why strong passwords are still the first line of defence against cyber threats

Mon, 27th May 2024
#
mfa
#
phishing
#
advanced persistent threat protection
Despite advancements in cybersecurity, many breaches still involve stolen credentials due to weak passwords. Businesses must enforce robust password policies to mitigate risks.
Roger grimes high resolution 78

The problem with biometrics and the key things to consider

Tue, 21st May 2024
#
devops
#
surveillance
#
biometrics
Biometrics promise secure authentication, but they aren't foolproof. Issues with accuracy, hacking, theft, privacy, and bias complicate their efficacy.