CFOtech Australia - Technology news for CFOs & financial decision-makers

Threat actors stories - Page 7

Red digital skull vs blue cyber shield ai warfare defense

AI-driven cyber wars to reshape security in 2026

Wed, 10th Dec 2025
#
firewalls
#
data protection
#
dr
AI-powered attackers and defenders will clash in 2026, driving autonomous breaches, VPN failures and stricter rules that reshape cyber security.
Windows laptop shield blocking email malware cloud security

Microsoft patches Windows zero-day & risky Office flaws

Wed, 10th Dec 2025
#
storage
#
dr
#
encryption
Microsoft fixes a Windows zero-day used in attacks and Office flaws that can execute code when emails are merely received or previewed.
James headshot

Exclusive: Cohesity's James Blake warns on rising ransomware risks

Thu, 4th Dec 2025
#
ransomware
#
advanced persistent threat protection
#
cybersecurity
Ransomware attacks cost Australian organisations AUD $42 billion annually, urging a shift from prevention to pragmatic cyber resilience amid rising threats.
Shield protecting cloud storage icons cyber attackers digital security

SonicWall acts after backup breach as state actors target cloud files

Fri, 21st Nov 2025
#
firewalls
#
dr
#
ransomware
SonicWall confirmed state actors accessed backup cloud files via an API, prompting swift investigation and enhanced security for partners and customers.
Digital network web glowing red breaches hackers vs blue security shields

AI-driven cyber attacks surge, outpacing security defences

Wed, 19th Nov 2025
#
firewalls
#
network security
#
advanced persistent threat protection
AI-driven cyber attacks are escalating rapidly, outpacing traditional defences and forcing security teams to adopt advanced AI tools to keep pace.
Ritchen

Three hidden risks in your AI stack and what to do about them

Tue, 18th Nov 2025
#
data protection
#
hybrid cloud
#
cloud security
Rapid AI adoption in APJ exposes firms to hidden risks like shadow AI, API vulnerabilities, and leaked credentials, demanding better governance and security.
Illustration computer server virtual machines shadowy malware network wires secure data center

Curly COMrades abuse Hyper-V for covert malware operations in VMs

Wed, 5th Nov 2025
#
malware
#
virtualisation
#
firewalls
Curly COMrades exploit Microsoft Hyper-V to run hidden malware inside lightweight VMs, evading detection and maintaining stealthy control over targets.
Stressed businessperson office desk locked computer digital padlocks masked figures

Ransom payment rates drop to historic low as attackers adapt

Thu, 30th Oct 2025
#
ransomware
#
crypto
#
phishing
Ransom payments fell to a historic low of 23% in Q3 2025 as cyber extortion tactics shift towards targeted, costlier attacks on larger firms.
Interconnected supply chains digital locks vulnerabilities and overconfidence cybersecurity

Overconfidence threatens supply chain cyber security resilience

Fri, 24th Oct 2025
#
ransomware
#
supply chain
#
risk & compliance
Despite 94% public sector confidence in handling supply chain cyberattacks, nearly half faced breaches last year, revealing a troubling gap in resilience.
Hooded figure computer dark room multiple screens abstract encrypted code cyber attack

Ransomware groups surge as automation cuts attack time to 18 mins

Thu, 23rd Oct 2025
#
ransomware
#
encryption
#
advanced persistent threat protection
Automation and AI slash ransomware attack times to 18 minutes, challenging defenders to match speed with automated defences, says ReliaQuest report.
Masked hacker at computer dark room lock icons crypto symbols cybercrime

Ransomware's business model reshapes costs as cybercrime hits USD $10.5 trillion

Tue, 21st Oct 2025
#
ransomware
#
mfa
#
crypto
Ransomware has evolved into a profit-centric business, driving cybercrime costs to USD $10.5 trillion and reshaping global cybersecurity risks and responses.
Computer screen map network connections warning markers cyber threat detection security operations center

Expel Intel launches to deliver actionable threat intelligence insights

Thu, 9th Oct 2025
#
advanced persistent threat protection
#
socs
#
cybersecurity
Expel has launched Expel Intel, a new team providing actionable cyber threat insights based on real-world incidents to help security teams improve defences.
Realistic server room red warning lights lock icon shadowy intrusion

Oracle issues urgent patch as Cl0p exploits suite flaw for attacks

Wed, 8th Oct 2025
#
ransomware
#
mfa
#
advanced persistent threat protection
Oracle has issued an urgent patch for a critical flaw in its E-Business Suite, exploited by the Cl0p ransomware group using advanced social engineering tactics.
Realistic server room security breach highlight cybersecurity patching cloud

Broadcom patches VMware zero-day exploited for nearly a year

Thu, 2nd Oct 2025
#
cloud security
#
advanced persistent threat protection
#
it automation
Broadcom patches a VMware zero-day flaw exploited for nearly a year, allowing attackers root access to virtual machines in certain configurations.
Cyber espionage dark room shadowy figures computer screens us china flags

Chinese cyber group targets US policy bodies during trade talks

Thu, 18th Sep 2025
#
phishing
#
advanced persistent threat protection
#
email security
A Chinese cyber group has targeted US government and policy organisations with spearphishing attacks amid trade talks, using advanced tactics to gain persistent access.
Realistic illustration shadowy hooded figure computer dark room multiple monitors code dollar bills online fraud

Vane Viper linked to over 1 trillion DNS queries & ad fraud scams

Wed, 17th Sep 2025
#
martech
#
advanced persistent threat protection
#
cybersecurity
Vane Viper, a threat actor posing as an adtech firm, generated over 1 trillion DNS queries last year linked to malware and ad fraud, warns Infoblox.
Cyberattack on healthcare it systems hooded figure computer dark hospital

Oyster Backdoor mimics IT management tools to target IT professionals

Wed, 27th Aug 2025
#
malware
#
firewalls
#
ransomware
Oyster Backdoor malware, disguised as WinSCP and PuTTY, targets healthcare IT professionals to enable ransomware operations like Rhysida, warns BlueVoyant.
Digital shield protecting computer network from cyber attackers business defense

Proactive threat intelligence boosts security & resilience

Mon, 25th Aug 2025
#
firewalls
#
network security
#
advanced persistent threat protection
Proactive threat intelligence enables organisations to anticipate cyber threats, enhancing security resilience and shifting focus from reactive to preventive defence strategies.
Realistic hospital building digital padlocks hackers iot medical devices warning

Global ransomware attacks rise as healthcare faces surge in cyber threats

Fri, 22nd Aug 2025
#
firewalls
#
ransomware
#
encryption
Ransomware attacks surge to 20 daily incidents in 2025H1, with healthcare facing increased cyber threats and hackers targeting overlooked IoT devices worldwide.
Digital illustration hacker computer bypassing microsoft app security shield

Phishing campaign uses fake Microsoft apps to bypass MFA

Tue, 19th Aug 2025
#
hyperscale
#
mfa
#
cloud security
Proofpoint exposes phishing attacks using fake Microsoft apps to bypass MFA and hijack Microsoft 365 accounts, affecting thousands globally in 2025.