eCommerceNews Australia - Technology news for digital commerce decision-makers

Infosec stories - Page 24

Moody corporate cloud analytics server room cracked shield leak

Tenable reveals 'LookOut' flaws that endanger Google Looker

Fri, 6th Feb 2026
#
firewalls
#
data analytics
#
network security
Tenable warns 'LookOut' flaws in Google Looker could hand attackers server control, expose secrets and enable cross-tenant cloud access.
Isometric hybrid multicloud datacenter with unified ai security shield

AI, hybrid cloud spur security shift to consolidation

Fri, 6th Feb 2026
#
firewalls
#
network infrastructure
#
hybrid cloud
AI, hybrid cloud and SASE are driving a shift from security sprawl to consolidation, with unified policy control now the top priority.
Ai ghost hand server room software supply chain breach night

Developers' AI agents pose rising software supply risks

Fri, 6th Feb 2026
#
data protection
#
cloud security
#
application security
Developers granting AI agents broad, unsupervised access to code and systems are creating new software supply chain and data exposure risks.
Mg 3 01

Searchlight Cyber appoints Michael Gianarakis as CEO

Thu, 5th Feb 2026
#
fintech
#
advanced persistent threat protection
#
socs
Searchlight Cyber has promoted former product chief Michael Gianarakis to CEO as founder Ben Jones moves to a strategic board role.
Moody corporate office night remote access malware attack scene

Screensaver phishing installs remote access tools covertly

Thu, 5th Feb 2026
#
storage
#
firewalls
#
ransomware
Attackers are abusing Windows screensaver files in a spearphishing campaign to stealthily install remote access tools on business systems.
Office worker anxious at laptop phishing emails shadowy hands clouds

Callback phishing surges as BEC email fraud dominates

Thu, 5th Feb 2026
#
hyperscale
#
phishing
#
hcm
Callback phishing jumps sixfold as BEC fraud stays dominant, with criminals weaponising CAPTCHAs, trusted brands and cloud platforms.
Dark server room red glowing rack critical data leak cinematic

Tenable finds critical flaws in Google Looker platform

Thu, 5th Feb 2026
#
private cloud
#
hybrid cloud
#
data analytics
Tenable warns critical Google Looker flaws could enable server takeover and data theft, leaving unpatched self-hosted deployments exposed.
Ai code security scan software engineer modern office monitor

DryRun unveils AI DeepScan Agent for faster code risk

Thu, 5th Feb 2026
#
application security
#
physical security
#
devsecops
DryRun launches DeepScan Agent, an AI tool that scans whole codebases in hours to rank real-world security risks and speed remediation.
Ai neural cloud over office cyber threats brand risk scene

Moltbook's AI agents spark growing security & brand fears

Thu, 5th Feb 2026
#
saas
#
uc
#
data protection
Moltbook's boom in user-built AI agents is fuelling mounting warnings over cyber threats and brand damage as governance lags adoption.
Sarah wilkinson

Solving the '3 AM Problem' with 24/7 cyber defence

Thu, 5th Feb 2026
#
malware
#
firewalls
#
ransomware
As most ransomware strikes after hours, small firms face a costly 3 AM security gap that only round-the-clock MDR can realistically close.
Moody server room data leak shadowy figures cross tenant breach

Tenable reveals Looker flaws risking cross-tenant attacks

Thu, 5th Feb 2026
#
data analytics
#
cloud security
#
application security
Tenable warns unpatched self-hosted Google Looker systems face remote takeover, data theft and cross-tenant cloud attack risks.
Soc 2026 analysts ai quantum chip encryption identity scales

AI, regulation & quantum top Gartner cyber trends for 2026

Thu, 5th Feb 2026
#
data protection
#
digital transformation
#
encryption
AI, quantum threats and tougher regulation will reshape cyber strategies by 2026, forcing new governance, identity models and SOC workflows.
Office worker hardware security key login it monitoring high roi

YubiKeys promise 265% ROI & 99.99% cut in breach risk

Thu, 5th Feb 2026
#
mfa
#
phishing
#
email security
YubiKey rollout boosts ROI by 265% and slashes breach exposure 99.99%, Forrester study finds, delivering multi-million USD $ gains.
Cinematic secure hybrid cloud identity shields on prem backup

Semperis buys MightyID to bolster cloud identity resilience

Thu, 5th Feb 2026
#
data protection
#
dr
#
ransomware
Semperis has bought MightyID to extend its identity resilience platform with Okta and Ping backup and recovery across hybrid environments.
Enterprise datacenter network microsegments zero trust firewall diagram

FireMon & Illumio unite policies for Zero Trust push

Wed, 4th Feb 2026
#
firewalls
#
hybrid cloud
#
network security
FireMon and Illumio link microsegmentation with firewall policies in one platform to cut conflicts and speed Zero Trust deployments.
Dim cloud data center unlocked database locks ai brain risk scene

AI agents expose risks in insecure default databases

Wed, 4th Feb 2026
#
firewalls
#
data protection
#
network security
A security lapse at AI agent service Moltbook exposes risky default database settings, raising fresh alarms over agentic system safeguards.
Julian

Nations race to sovereign encryption in quantum age

Wed, 4th Feb 2026
#
data protection
#
quantum computing
#
risk & compliance
As quantum computing looms, nations race to build sovereign cyber and post-quantum encryption to safeguard critical digital infrastructure.
Moody office worker on call mfa login screen red warning shield

Okta users warned as ShinyHunters expand vishing wave

Wed, 4th Feb 2026
#
ddos
#
ransomware
#
mfa
Okta users face rising vishing attacks as ShinyHunters expand real-time MFA phishing, prompting fresh SaaS and identity security warnings.
Australian retail store dusk counter with abstract digital security

Security tops 2026 tech spend for Australian retailers

Tue, 3rd Feb 2026
#
data protection
#
data analytics
#
digital transformation
Security, privacy and data protection will command the biggest tech spend for Australian retail SMBs in 2026, ahead of AI and global growth.
Australian city night cctv hacker warning shadowy silhouette

Critical flaw found in IDIS Cloud Manager CCTV viewer

Tue, 3rd Feb 2026
#
ransomware
#
iot security
#
phishing
A critical ICM Viewer flaw lets a single malicious click hijack IDIS CCTV hosts, exposing Australian networks to deep lateral attacks.