IT Brief New Zealand - Technology news for CIOs & IT decision-makers

Threat actors stories - Page 4

Moody anz ciso dark office ai threat dashboards blue red light

AI drives rising risk & burnout for ANZ security chiefs

Thu, 26th Feb 2026
#
siem
#
digital transformation
#
advanced persistent threat protection
AI is piling pressure on ANZ CISOs, fuelling burnout, personal liability fears and complex new demands in governance and threat response.
Glowing red world map ransomware ai cyber attack broken padlock

GenAI misuse & ransomware drive surge in cyber attacks

Thu, 26th Feb 2026
#
malware
#
edutech
#
uc
Global cyber attacks hit 2,090 a week in January as ransomware surges and risky GenAI use exposes fresh data-leak and intrusion paths.
Mac laptop fake installer shadowy hands data theft crypto malware

Hijacked Google Ads push MacSync malware to Mac users

Wed, 25th Feb 2026
#
storage
#
phishing
#
email security
Hijacked Google Ads accounts are serving bogus installers that trick Mac users into running MacSync stealer via fake Evernote guides.
Ciso hesitates at glowing deploy button in ai cyber soc

CISOs cautious as agentic AI adoption in security lags

Wed, 25th Feb 2026
#
firewalls
#
data protection
#
manufacturing
CISOs slow-roll agentic AI in defence, even as they brace for more advanced, AI-boosted attacks and rising personal liability risks.
Story 299483

Android PromptSpy malware harnesses Gemini for stealth

Fri, 20th Feb 2026
#
endpoint protection
#
mdm
#
phishing
PromptSpy Android malware taps Google's Gemini AI to navigate screens, lock itself in recent apps and thwart users' attempts to remove it.
Singapore skyline dusk cloud datacenters ai security network

EY maps hyper-velocity AI priorities for tech during 2026

Fri, 20th Feb 2026
#
devops
#
digital transformation
#
phishing
EY urges tech leaders to pursue AI-fuelled deals, agentic systems and sovereignty-by-design as 2026 competition and security pressures grow.
Oil refinery renewables control room power loss venting steam dusk tension

OT cyber threats shift from spying to disruption in 2025

Wed, 18th Feb 2026
#
ransomware
#
iot security
#
advanced persistent threat protection
Cyber attacks on industrial systems in 2025 shifted from quiet spying to coordinated operations aiming to disrupt critical infrastructure.
Dark office night remote access shadowy hacker silent data theft

Data-only extortion surges as remote access abused

Wed, 18th Feb 2026
#
data protection
#
dr
#
vpns
Data-only extortion soars 11-fold as attackers 'log in instead of break in', abusing remote access tools for faster, stealthier raids.
Dim server room windows rack red warning remote access breach

Active exploitation seen in BeyondTrust access flaw

Mon, 16th Feb 2026
#
firewalls
#
network security
#
pam
Arctic Wolf says attackers are actively exploiting a critical BeyondTrust vulnerability in self-hosted remote access systems.
Nighttime small office cyberattack screens red warnings global scope

AI-driven ransomware attacks surge, most go unreported

Fri, 13th Feb 2026
#
firewalls
#
data protection
#
ransomware
AI-fuelled ransomware hit record levels in 2025, with BlackFog warning that around 86% of attacks worldwide are never publicly disclosed.
Moody remote night home office video call anonymized face north korea cyber map

Okta warns of North Korean fraud in remote tech hiring

Fri, 13th Feb 2026
#
data protection
#
ransomware
#
hcm
Okta warns North Korean operatives are landing remote tech jobs with stolen and synthetic identities to fund the regime and enable cyber attacks.
Compromised iis server dark code web to gambling crypto icons

BADIIS malware hijacks IIS servers for covert SEO fraud

Fri, 13th Feb 2026
#
malware
#
firewalls
#
network security
BADIIS malware is hijacking over 1,800 IIS servers worldwide, quietly boosting illicit gambling and crypto phishing sites via poisoned SEO.
Moody data center linux servers botnet ssh attacks asian city skyline

SSHStalker botnet preys on legacy Linux & cloud hosts

Thu, 12th Feb 2026
#
malware
#
firewalls
#
hyperscale
A newly uncovered SSHStalker botnet uses old-school IRC and legacy Linux exploits to hijack outdated corporate and cloud hosts at scale.
Moody datacenter night glowing shield cyber espionage ai theft

Google warns of AI model theft & state-backed misuse

Thu, 12th Feb 2026
#
malware
#
surveillance
#
cloud security
Google flags surging attempts to steal AI models as state-backed hackers weaponise Gemini for phishing, intel gathering and malware support.
Visions of cb header

Visions of cyber attacks: The SonicSentry SOC in action on Christmas morning

Thu, 12th Feb 2026
#
firewalls
#
data protection
#
network security
While most slept through Christmas dawn, SonicSentry analysts foiled a 3am brute-force cyber attack on a French client's firewall.
Modern windows desktop security patch shield zero day fix

Microsoft patches zero-day flaws in latest Windows update

Thu, 12th Feb 2026
#
iam
#
cybersecurity
#
microsoft
Microsoft rolls out fixes for 55 Windows flaws, including six exploited zero-days hitting Shell, MSHTML, Word and key desktop services.
Stealthy cloud server room data theft ghostly silhouette cable

Hackers ditch noisy ransomware for stealthy data theft

Thu, 12th Feb 2026
#
firewalls
#
data protection
#
dr
Hackers are abandoning noisy ransomware to quietly steal data, as a report finds 80% of top attack techniques now focus on evasion.
Rockwell automation senior executives

Rockwell opens Singapore SOC to secure Asia Pacific OT

Tue, 10th Feb 2026
#
firewalls
#
ransomware
#
digital transformation
Rockwell opens a 24/7 Singapore security operations centre to monitor and defend industrial OT networks across the Asia Pacific region.
Untitled design  9

A look ahead: workplace and tech converge in 2026

Tue, 10th Feb 2026
#
saas
#
data protection
#
digital transformation
Australian workplaces brace for 2026 as AI, hybrid models and security demands converge to reshape how, where and why people work.
Moody corporate office night remote access malware attack scene

Screensaver phishing installs remote access tools covertly

Thu, 5th Feb 2026
#
storage
#
firewalls
#
ransomware
Attackers are abusing Windows screensaver files in a spearphishing campaign to stealthily install remote access tools on business systems.