eCommerceNews Australia - Technology news for digital commerce decision-makers

Threat actors stories - Page 2

Flux result 89c892f4 bb6f 446d ab90 b15476e99e4f

Phishing surge targets Gulf after Iran-Israel tensions

Last month
#
malware
#
firewalls
#
network security
Bitdefender reports a 130% jump in phishing and malware activity across Gulf markets, with fake invoices and banking lures driving attacks.
Flux result 8910bca1 99ae 4239 a7bb 1c491f2f1d85

Ransomware attacks fall as CL0P & The Gentlemen surge

Last month
#
malware
#
firewalls
#
ddos
Qilin keeps top spot as ransomware incidents drop 8% in February, while CL0P and The Gentlemen post sharp gains and new AI risks emerge.
Editorial world map storm network lines ransomware hooded nodes

CrowdStrike flags faster AI-driven cyber attacks worldwide

Last month
#
ransomware
#
cloud security
#
phishing
AI-fuelled cyber attacks are spreading faster worldwide, CrowdStrike warns, as breakout times plummet and criminals weaponise mainstream tools.
Editorial illustration corporate criminal network ops map servers

HPE Threat Labs spot industrialised cybercrime surge

Last month
#
malware
#
firewalls
#
vpns
HPE Threat Labs warns cybercrime now runs like big business, as AI-fuelled, industrial-scale attacks hammer government and finance.
Shadowy criminal hand manipulating malware ad tracker web illustration

Cybercrooks abuse Keitaro tracker for AI scam campaigns

Last month
#
malware
#
phishing
#
martech
Cybercriminals exploit Keitaro ad tracker to cloak AI trading scams and malware, tying some 15,500 malicious domains into a hidden network.
Ad tracking abuse fake investment phishing malware web illustration

Keitaro ad tracker tied to more than 15,000 scam domains

Last month
#
malware
#
phishing
#
martech
Keitaro ad tracker abused in 15,500 scam and malware domains, as fraudsters cloak AI-themed investment lures from security watchdogs.
Hybrid it security control room cloud mac okta github network

BloodHound expands identity attack path mapping reach

Last month
#
data protection
#
encryption
#
pam
SpecterOps broadens BloodHound Enterprise to map identity attack paths across Okta, GitHub and Jamf-managed Macs in hybrid environments.
Simon

The agentic evolution: Why high-fidelity data is the lifeblood of the modern SOC

Last month
#
iot security
#
phishing
#
iot
As AI-powered attacks shatter old perimeters, SOCs race to agentic operations where high-fidelity data becomes security's vital lifeblood.
Moody dev workstation malicious browser hook solana payloads

Fake Windsurf extension uses Solana to steal dev data

Last month
#
blockchain
#
supply chain
#
edr
Malicious fake Windsurf IDE extension hid JavaScript, abused Solana to fetch payloads, and stole developers' browser credentials and tokens.
Digital login screen shadows identity theft binary chains art

Barracuda warns of surge in credential-focused attacks

Last month
#
malware
#
firewalls
#
ransomware
Barracuda reports a global surge in identity-based cyber attacks, with stolen credentials, supply-chain abuse and weaponised PDFs on the rise.
Moody server room red alert cracked shield cyber vulnerabilities

Rapid7 warns exploited software flaws more than double

Last month
#
firewalls
#
ransomware
#
network security
Rapid7 warns exploited high and critical software flaws more than doubled in 2025, as attackers compress disclosure-to-attack windows.
Secure ai software engineer workstation multi screens cinematic night

Harness unveils AI Security & coding tools for DevSecOps

Last month
#
devops
#
application security
#
advanced persistent threat protection
Harness has launched AI Security and Secure AI Coding tools to spot and block vulnerabilities in AI-powered apps and AI-generated code.
Moody corporate night office fileless ransomware cloud lock reflection

LeakNet adopts ClickFix lures & Deno fileless loader

Last month
#
storage
#
uc
#
firewalls
Ransomware group LeakNet adopts ClickFix lures and a Deno-based fileless loader to scale attacks and evade traditional endpoint defences.
Browser extension thief mask crypto coin shield wallet protection

Okta helps disrupt ShieldGuard crypto-stealing extension

Last month
#
mfa
#
crypto
#
phishing
Okta and partners pull rogue ShieldGuard Chrome extension that stole crypto wallet data and bypassed browser defences via custom code.
Sarah

Saving the weekend: How SonicWall's SonicSentry SOC stopped a Saturday night cyberattack

Last month
#
firewalls
#
data protection
#
network security
SonicWall's SonicSentry SOC cut short a Saturday night cyberattack, spotting rogue ScreenConnect activity and isolating a compromised PC.
Email attachment20260318 3378197 f4nol6

Australia warned over AI-fuelled surge in cyberwarfare

Last month
#
ransomware
#
digital transformation
#
advanced persistent threat protection
Australia faces AI-driven cyberwarfare “boiling point” as attacks surge, ransomware payouts soar and security remains dangerously reactive.
Corporate cyberattack command center world map dashboards scene

HPE report warns cyberattacks now run like big business

Last month
#
malware
#
firewalls
#
vpns
HPE warns cybercriminals now run attacks like global enterprises, using repeatable workflows, automation and AI to outpace defences.
Jason

SentinelOne names Jason Duerden ANZ area vice president

Last month
#
firewalls
#
endpoint protection
#
data analytics
SentinelOne appoints Jason Duerden ANZ area vice president to drive cyber growth in government, critical infrastructure and AI security.
Ai cyberattack shadow figure robotscreens red alarm extortion

AI agents drive surge in cyber threats & extortion

Last month
#
malware
#
data protection
#
ransomware
AI agents are fuelling a new wave of cyber risk, as criminals weaponise automation to speed up ransomware and sharpen extortion tactics.
Ai ddos storm dark data streams overwhelming global internet map

AI-fuelled DDoS attacks surge past eight million globally

Last month
#
firewalls
#
ddos
#
network security
AI-driven botnets fuel eight million DDoS attacks in late 2025, as multi-vector assaults hit 30 Tbps and strain global critical services.