Threat intelligence stories
Enterprises can now assess suspicious files in under 100 milliseconds, as OPSWAT adds a machine-learning layer to MetaDefender.
A Monday-morning Microsoft 365 login from Germany was flagged, letting a partner reset a compromised account before attackers could act.
Proxy networks built from compromised home devices are helping attackers hide in plain sight across Asia Pacific, Lumen says.
A 1,151% jump in iOS injection attacks in late 2025 has put mobile identity checks under fresh pressure, iProov says.
Hundreds of Microsoft 365 users are being compromised daily as attackers bypass passwords with device code phishing and OAuth tokens.
Security teams are falling behind as attackers now exploit some flaws before disclosure, leaving critical systems exposed for longer.
New research shows two-thirds of Australian business and IT leaders feel pressured to approve AI projects while overlooking security risks.
Victims in healthcare, education and finance have faced Medusa ransomware within 24 hours of flaws emerging, Microsoft says.
Attackers are now exploiting flaws before patches exist, leaving 85% of vulnerable assets unpatched at disclosure across 10,000 organisations.
Malicious downloads can now be caught at runtime, as the new tool records hidden network calls and file writes before deployment.
Diplomatic missions in Europe and the Middle East face renewed PlugX-backed espionage as TA416 shifts tactics and targets amid regional tensions.
Trusted software and identity sessions are now prime attack paths, with ClickFix linked to more than 44% of defence evasion incidents.
Breaches in large cloud environments are increasingly tied to weak identity controls, misconfigurations and poor data sovereignty governance.
Rising automation and data growth are exposing cloud users to identity drift, hidden telemetry gaps and fragmented defences.
ThreatLabz says the latest Xloader strain uses layered encryption and decoy servers to frustrate analysts while stealing browser credentials.
Broad exposure across thousands of applications is feared after Google tied the axios npm supply chain attack to suspected North Korean hackers.
Singapore’s digital economy faces rising pressure as attacks climbed 22% in March, far outpacing a 5% global decline.
Critical infrastructure and cloud operators face harder-to-detect attacks as criminals turn routers, VPN gateways and IoT kit into proxies.
Managed AI tools are gaining ground in finance, yet regulated data still drives most policy breaches as staff mix personal and corporate accounts.
Australian developers can now access free vulnerability tools as Vulnetix takes a formal role in global software flaw tracking.