Threats
-
Blog
Microsoft launches AI agents to automate cybersecurity amid rising threats
“In fact, according to IDC’s Asia/Pacific Security Study, when enterprises were asked about their top three drivers for adopting an integrated security platform, over 30% cited the need for better data management, simplified administration, and policy consistency, and a growing fatigue with point-product sprawl — highlighting the increasing pressure to consolidate fragmented tools,” Grover said. However, relying entirely on a…
Read More » -
Blog
Security experts warn of ‘contradictory confidence’ over critical infrastructure threats
Almost all critical national infrastructure (CNI) organizations in the UK (95%) experienced a data breach in the last year, according to new research. Analysis from Bridewell found that more than half had incurred financial losses of over £100,000 per breach, mostly thanks to cybersecurity upgrades, systems recovery, and increased operational costs. Cloud services have become the most targeted attack vector…
Read More » -
Blog
Strategies for guarding against emerging cyber risks and invisible threats
Businesses are facing an ever-expanding landscape of cyber threats. Generative AI, for example, has rapidly transformed industries, introducing breakthroughs in productivity and efficiency. From generating content to uncovering insights and automating workflows, AI-powered tools are reshaping the modern business landscape. However, as AI systems grow more integral to business operations, the cyber threats targeting them are becoming increasingly sophisticated. The…
Read More » -
Blog
DHS says CISA will not stop monitoring Russian cyber threats
The US Cybersecurity and Infrastructure Security Agency says that media reports about it being directed to no longer follow or report on Russian cyber activity are untrue, and its mission remains unchanged. “CISA’s mission is to defend against all cyber threats to U.S. Critical Infrastructure, including from Russia,” the US cyber agency posted to X. “There has been no change in…
Read More » -
Blog
Wireless networks are a prime target for hackers – here’s how to combat rising threats
Security experts have issued a warning over surging threats faced by wireless networks, with many left woefully unprotected . Analysis of more than 500,000 ‘honeypot’ wireless networks by Nozomi Networks Labs found only 6% are adequately protected against wireless deauthentication attacks. The rest are vulnerable to unauthorized access to data or interference with critical systems, the study noted. For example,…
Read More » -
Blog
Manufacturing firms are struggling to handle rising OT security threats
Cyber attacks on manufacturing firms are skyrocketing, according to new research, but fewer than half are prepared for a rising tide of threats. A global survey carried out for telecoms firm Telstra found that eight-in-ten manufacturing firms experienced a significant increase in overall security incidents or breaches last year. Behind the rise is a move towards technologies such as cloud,…
Read More » -
Blog
Public sector workers are sweating over AI security threats
Nearly a third of public sector IT professionals are seriously concerned about the security dangers of AI, especially the risks around data privacy and compliance. While AI adoption is gaining momentum, with predictive analytics and issue detection seen as the top benefits, there are lingering concerns, according to a SolarWinds survey. Nearly a quarter of respondents said they were leveraging…
Read More » -
Blog
The new era of cyber threats
The cybersecurity landscape gets more complicated every year, with emerging technologies such as AI and geopolitical tension bringing extra chaos to any CISO’s desk. Though automated defense systems are a welcome feather in cap for any company, it’s not just the good guys who have access to the latest tools. Off-the-shelf frameworks to launch attacks are becoming more common and…
Read More » -
Blog
5 Emerging AI Threats Australian Cyber Pros Must Watch in 2025
Australian cybersecurity professionals can expect threat actors to exploit artificial intelligence to diversify tactics and scale the volume of cyberattacks targeting organisations in 2025, according to security tech firm Infoblox. Last year, cyber teams in APAC witnessed the first signs of AI being used to execute crimes like financial fraud, while some have linked AI to a DDoS attack in…
Read More » -
Blog
Will Your Network Traffic Analysis Spot Today’s Threats?
Network traffic analysis (NTA) is the practice of monitoring and interpreting the data flowing across your network to ensure performance, reliability, and security. Companies rely on a mix of tools — ranging from packet sniffers and flow analysis software to advanced NDR systems — to gain visibility into their network’s behavior. This guide explores the types of NTA solutions available,…
Read More »