TechDay Australia - Australia's technology news network

Threat Landscape stories - Page 6

Img 2840

Proofpoint & Concentrix deepen Asia Pacific cyber push

Mon, 23rd Feb 2026
#
data protection
#
digital transformation
#
cloud security
Proofpoint and Concentrix form Asia Pacific partnership to embed people-centric cyber and data protection tools into regional SOC services.
Story 299483

Android PromptSpy malware harnesses Gemini for stealth

Fri, 20th Feb 2026
#
endpoint protection
#
mdm
#
phishing
PromptSpy Android malware taps Google's Gemini AI to navigate screens, lock itself in recent apps and thwart users' attempts to remove it.
Global cyber attack map red lines to glowing datacenter racks

Radware warns of surging DDoS & app attacks in 2025

Fri, 20th Feb 2026
#
ddos
#
fintech
#
application security
Radware warns 2025 cyberattacks are exploding, with network DDoS up 168% and web DDoS up 101% as bots, apps and APIs face heavier fire.
Jon connet

Aeris & Palo Alto link SASE to secure global IoT fleets

Fri, 20th Feb 2026
#
uc
#
firewalls
#
digital transformation
Aeris links its IoT Watchtower with Palo Alto Networks' Prisma SASE 5G to unify zero-trust security and connectivity for global IoT fleets.
Server room night encrypted code swirls malware cracked shield

WatchGuard warns of surge in evasive, encrypted malware

Fri, 20th Feb 2026
#
malware
#
firewalls
#
ransomware
WatchGuard reports a 1,548% surge in new evasive malware and a 2,000% jump in encrypted threats, straining signature-based defences.
Australian hospital night cyber attack iot warning icons scene

Healthcare tops cyber attacks on Australian OT & IoT

Fri, 20th Feb 2026
#
ransomware
#
manufacturing
#
iot security
Healthcare is now the prime target for OT and IoT cyber attacks in Australia, as security alerts per organisation surge to third globally.
Office worker ai phishing notifications shadowy hands illustration

AI-driven phishing surge dominates 2025 cyberattacks

Thu, 19th Feb 2026
#
malware
#
ransomware
#
digital transformation
AI-powered phishing drives a sharp 2025 surge in email and chat attacks, as Acronis warns of a new era of automated cybercrime at scale.
Oil refinery renewables control room power loss venting steam dusk tension

OT cyber threats shift from spying to disruption in 2025

Wed, 18th Feb 2026
#
ransomware
#
iot security
#
advanced persistent threat protection
Cyber attacks on industrial systems in 2025 shifted from quiet spying to coordinated operations aiming to disrupt critical infrastructure.
Dark office night remote access shadowy hacker silent data theft

Data-only extortion surges as remote access abused

Wed, 18th Feb 2026
#
data protection
#
dr
#
vpns
Data-only extortion soars 11-fold as attackers 'log in instead of break in', abusing remote access tools for faster, stealthier raids.
Secure australian smart living room at dusk with iot devices

Australia to enforce tougher rules on smart devices

Tue, 17th Feb 2026
#
iot
#
smart home
#
socs
Australia will impose mandatory cybersecurity standards on smart devices from March 2026, forcing stronger passwords and update guarantees.
Roi karo

Check Point unveils four-pillar AI security strategy

Mon, 16th Feb 2026
#
firewalls
#
hybrid cloud
#
digital transformation
Check Point launches four-pillar AI security strategy and three targeted acquisitions to secure networks, workspaces and AI agents.
Asia pacific night map cyber breaches shipping supply chain

AI-fuelled supply chain cyber attacks surge in Asia-Pacific

Mon, 16th Feb 2026
#
firewalls
#
ransomware
#
network security
AI is supercharging supply chain cyber attacks across Asia-Pacific, with Group-IB warning single hacks now threaten thousands of victims.
Modern it soc abstract ai brain dashboards secure cloud locks

Proofpoint buys Acuvity to secure AI agents at work

Fri, 13th Feb 2026
#
data protection
#
digital transformation
#
cloud security
Proofpoint snaps up AI security specialist Acuvity to police 'agentic workspaces' as enterprises rush to deploy copilots and agents.
Soc cisos overwhelmed by red alerts few highlighted in focus

Cyber firms face 'verification crisis' on real risk

Wed, 11th Feb 2026
#
firewalls
#
devops
#
digital transformation
Cyber firms warned over 'verification crisis' as tools flag floods of flaws but only 0.47% prove exploitable, leaving real risk unresolved.
Australian cybersecurity control room ai threats safe internet

AI reshapes cyber threats as Safer Internet Day nears

Wed, 11th Feb 2026
#
firewalls
#
ddos
#
network security
AI-driven agents and rising network attacks are reshaping cyber risks, experts warn, as Safer Internet Day 2026 urges 'verified trust' online.
Jonathan dixon

CrowdStrike names Jonathon Dixon to lead JAPAC growth

Wed, 11th Feb 2026
#
ransomware
#
endpoint protection
#
digital transformation
CrowdStrike appoints veteran executive Jonathon Dixon to lead JAPAC, driving Falcon platform adoption and regional cyber security growth.
Rockwell automation senior executives

Rockwell opens Singapore SOC to secure Asia Pacific OT

Tue, 10th Feb 2026
#
firewalls
#
ransomware
#
digital transformation
Rockwell opens a 24/7 Singapore security operations centre to monitor and defend industrial OT networks across the Asia Pacific region.
John milionis 1200px x 800px

Aussie Broadband named Fortinet Australia Partner 2025

Tue, 10th Feb 2026
#
uc
#
firewalls
#
network infrastructure
Fortinet crowns Aussie Broadband its Australia Partner of the Year 2025, also naming it Telco Partner of the Year amid wider channel honours.
Glowing neural network shield ai cybersecurity cloud servers

Palo Alto revamps NextWave to reward AI security platforms

Fri, 6th Feb 2026
#
firewalls
#
digital transformation
#
network security
Palo Alto overhauls NextWave to reward partners building AI-driven security platforms and services over traditional product sales volume.
Moody corporate office night remote access malware attack scene

Screensaver phishing installs remote access tools covertly

Thu, 5th Feb 2026
#
storage
#
firewalls
#
ransomware
Attackers are abusing Windows screensaver files in a spearphishing campaign to stealthily install remote access tools on business systems.