DataCenterNews Asia Pacific - Specialist news for cloud & data center decision-makers

Threat actors stories - Page 6

Ai cyber espionage ransomware small business office night scene

AI & state-backed cyber spies to drive 2026 threats

Tue, 23rd Dec 2025
#
ransomware
#
drones
#
iot security
AI-fuelled hacks and state cyber spies are tipped to dominate 2026, targeting drones, defence firms and vulnerable smaller businesses.
2026 control room ai cyber security analyst quantum network night

AI, quantum & non-human IDs to reshape 2026 cyber security

Fri, 19th Dec 2025
#
data protection
#
digital transformation
#
encryption
AI, quantum threats and non‑human identities will dominate 2026 cyber budgets as basics, manufacturing risk and resilience move centre‑stage.
Korean apartment night data breach red cameras binary thief cloud

Coupang breach & camera hacks expose Asia cyber gaps

Wed, 17th Dec 2025
#
firewalls
#
data protection
#
network security
A vast Coupang data breach and mass camera hacks in South Korea expose Asia's widening cyber security gaps and weak identity defences.
European night skyline ai network cyber traffic attacks defense cloud

Radware warns 2026 will mark rise of 'Internet of Agents'

Mon, 15th Dec 2025
#
firewalls
#
network security
#
mfa
Radware predicts 2026 will usher in an 'Internet of Agents', as AI-driven machines overtake humans in traffic, attacks and cyber defence.
Ai cyber attack scada control room red alert shadowy hacker

AI reshapes cyber threats as experts warn on automation

Fri, 12th Dec 2025
#
malware
#
ransomware
#
iot security
AI will transform cyber threats by 2026, experts say, but warn over-automation and legacy systems could imperil critical infrastructure.
Night cyber ops room ai testing monitors threat alerts vigilance

AI-native attacks drive shift to continuous cyber tests

Fri, 12th Dec 2025
#
devops
#
biometrics
#
socs
AI-native cyber attacks and synthetic IDs are forcing firms to shift from periodic checks to continuous, AI-driven security testing by 2026.
Bitdefender one battle after another report 1

Fake Leonardo DiCaprio torrent spreads Agent Tesla trojan

Thu, 11th Dec 2025
#
endpoint protection
#
encryption
#
breach prevention
Fake torrents of Leonardo DiCaprio film One Battle After Another are spreading Agent Tesla malware that hijacks Windows PCs, experts warn.
Secure enterprise network shield servers laptops cloud threat detection

CrowdStrike hits 100% in latest MITRE cross-domain tests

Thu, 11th Dec 2025
#
data protection
#
endpoint protection
#
devops
CrowdStrike's Falcon platform scores 100% detection and protection with no false positives in MITRE's toughest cross-domain ATT&CK tests yet.
Shadowy hidden browser window warning symbols masked figures

GhostFrame iframe phishing kit powers 1m attacks

Wed, 10th Dec 2025
#
firewalls
#
email security
#
breach prevention
GhostFrame phishing kit has fuelled over 1m iframe-powered attacks since September, using hidden pages and anti-inspection tricks to evade defences.
Modern uk office ai call centre retail checkout security ops room

AI agents to transform enterprise, retail & security by 2026

Wed, 10th Dec 2025
#
uc
#
devops
#
digital transformation
AI agents are tipped to sweep through enterprises, shops and security by 2026, automating work, reshaping retail and redefining digital trust.
Red digital skull vs blue cyber shield ai warfare defense

AI-driven cyber wars to reshape security in 2026

Wed, 10th Dec 2025
#
firewalls
#
data protection
#
dr
AI-powered attackers and defenders will clash in 2026, driving autonomous breaches, VPN failures and stricter rules that reshape cyber security.
Windows laptop shield blocking email malware cloud security

Microsoft patches Windows zero-day & risky Office flaws

Wed, 10th Dec 2025
#
storage
#
dr
#
encryption
Microsoft fixes a Windows zero-day used in attacks and Office flaws that can execute code when emails are merely received or previewed.
Shield protecting cloud storage icons cyber attackers digital security

SonicWall acts after backup breach as state actors target cloud files

Fri, 21st Nov 2025
#
firewalls
#
dr
#
ransomware
SonicWall confirmed state actors accessed backup cloud files via an API, prompting swift investigation and enhanced security for partners and customers.
Digital network web glowing red breaches hackers vs blue security shields

AI-driven cyber attacks surge, outpacing security defences

Wed, 19th Nov 2025
#
firewalls
#
network security
#
advanced persistent threat protection
AI-driven cyber attacks are escalating rapidly, outpacing traditional defences and forcing security teams to adopt advanced AI tools to keep pace.
Ritchen

Three hidden risks in your AI stack and what to do about them

Tue, 18th Nov 2025
#
data protection
#
hybrid cloud
#
cloud security
Rapid AI adoption in APJ exposes firms to hidden risks like shadow AI, API vulnerabilities, and leaked credentials, demanding better governance and security.
Illustration computer server virtual machines shadowy malware network wires secure data center

Curly COMrades abuse Hyper-V for covert malware operations in VMs

Wed, 5th Nov 2025
#
malware
#
virtualisation
#
firewalls
Curly COMrades exploit Microsoft Hyper-V to run hidden malware inside lightweight VMs, evading detection and maintaining stealthy control over targets.
Stressed businessperson office desk locked computer digital padlocks masked figures

Ransom payment rates drop to historic low as attackers adapt

Thu, 30th Oct 2025
#
ransomware
#
crypto
#
phishing
Ransom payments fell to a historic low of 23% in Q3 2025 as cyber extortion tactics shift towards targeted, costlier attacks on larger firms.
Interconnected supply chains digital locks vulnerabilities and overconfidence cybersecurity

Overconfidence threatens supply chain cyber security resilience

Fri, 24th Oct 2025
#
ransomware
#
supply chain
#
risk & compliance
Despite 94% public sector confidence in handling supply chain cyberattacks, nearly half faced breaches last year, revealing a troubling gap in resilience.
Hooded figure computer dark room multiple screens abstract encrypted code cyber attack

Ransomware groups surge as automation cuts attack time to 18 mins

Thu, 23rd Oct 2025
#
ransomware
#
encryption
#
advanced persistent threat protection
Automation and AI slash ransomware attack times to 18 minutes, challenging defenders to match speed with automated defences, says ReliaQuest report.
Computer screen map network connections warning markers cyber threat detection security operations center

Expel Intel launches to deliver actionable threat intelligence insights

Thu, 9th Oct 2025
#
advanced persistent threat protection
#
socs
#
cybersecurity
Expel has launched Expel Intel, a new team providing actionable cyber threat insights based on real-world incidents to help security teams improve defences.