eCommerceNews New Zealand - Technology news for digital commerce decision-makers

Cyber espionage stories - Page 2

Office worker phishing qr code lock icon cloud account attack

Proofpoint warns of surge in Microsoft device code phishing

Thu, 8th Jan 2026
#
edutech
#
mfa
#
cloud security
Proofpoint flags a sharp rise in Microsoft 365 account takeovers via device code phishing, hitting firms from finance to government.
Covert cyber espionage software download bug warning china russia

Chinese hackers fake Teams downloads in false flag ploy

Thu, 18th Dec 2025
#
malware
#
uc
#
martech
Chinese state-backed hackers mimic Microsoft Teams downloads in a false flag campaign to infect Chinese speakers and blame Russian actors.
Ciso boardroom ai cyber threats glowing screens city night

CISOs face rising scrutiny as AI escalates cyber risk

Wed, 17th Dec 2025
#
malware
#
data protection
#
dr
CISOs are warned 2026 will bring harsher board scrutiny, AI-fuelled attacks, bigger budgets - and far less tolerance for cyber failure.
Night cyber ops room ai testing monitors threat alerts vigilance

AI-native attacks drive shift to continuous cyber tests

Fri, 12th Dec 2025
#
devops
#
biometrics
#
socs
AI-native cyber attacks and synthetic IDs are forcing firms to shift from periodic checks to continuous, AI-driven security testing by 2026.
Shield emblem cloud server network icons blocking malware symbols

CrowdStrike hits 100% in latest MITRE ATT&CK tests

Thu, 11th Dec 2025
#
firewalls
#
ransomware
#
endpoint protection
CrowdStrike's Falcon platform scores 100% detection and protection with zero false positives in MITRE ATT&CK's toughest cloud-era tests.
Secure enterprise network shield servers laptops cloud threat detection

CrowdStrike hits 100% in latest MITRE cross-domain tests

Thu, 11th Dec 2025
#
data protection
#
endpoint protection
#
devops
CrowdStrike's Falcon platform scores 100% detection and protection with no false positives in MITRE's toughest cross-domain ATT&CK tests yet.
Fortified digital shield binary codes new zealand map cyber defence national protection

New Zealand cyber defence firm wins top award amid daily attacks

Thu, 20th Nov 2025
#
advanced persistent threat protection
#
supply chain
#
risk & compliance
New Zealand's cybersecurity firm DEFEND clinched Microsoft's Global Security Partner of the Year amid rising state-backed cyber attacks targeting local businesses daily.
Cybersecurity professionals office digital network new zealand map defenses

DEFEND wins global Microsoft award as cyber threats surge in NZ

Wed, 19th Nov 2025
#
ransomware
#
cloud security
#
phishing
New Zealand cybersecurity firm DEFEND wins Microsoft's Global Security Partner of the Year amid rising cyber threats to public and private sectors.
Shadowy figure computer digital network lines abstract data streams cyber espionage security threats

Anthropic identifies AI-driven cyber-espionage campaign

Sat, 15th Nov 2025
#
firewalls
#
network security
#
advanced persistent threat protection
A China-linked group launched a major AI-driven cyber-espionage campaign targeting global firms, performing 80-90% of hacking with minimal human input.
Photorealistic hooded figure at computer with floating digital locks warnings cybercrime

AI & ransomware reshape cyber threat landscape, report finds

Thu, 13th Nov 2025
#
malware
#
ransomware
#
phishing
Rapid7's report reveals cyber threats evolving with AI-powered phishing, rising ransomware alliances, and faster exploitation of vulnerabilities worldwide.
Realistic illustration cyber intrusion digital locks shadowy figures masks east asian facial features

Google warns of AI misuse in new GTIG threat report

Thu, 6th Nov 2025
#
malware
#
phishing
#
email security
Google's threat team warns that hackers are now using AI to create self-modifying malware and evade defences.
Illustration computer server virtual machines shadowy malware network wires secure data center

Curly COMrades abuse Hyper-V for covert malware operations in VMs

Wed, 5th Nov 2025
#
malware
#
virtualisation
#
firewalls
Curly COMrades exploit Microsoft Hyper-V to run hidden malware inside lightweight VMs, evading detection and maintaining stealthy control over targets.
Hooded figures computers dark room cyber espionage asia pacific summits threats

Google warns of espionage and scams in JAPAC in 2026

Wed, 5th Nov 2025
#
phishing
#
email security
#
supply chain
Google warns of a surge in cyber espionage targeting Asia-Pacific summits in 2026, alongside rising scams using false base stations and tighter supply chain cybersecurity rules.
Metallic padlock targeted by digital waves quantum patterns glowing data network

Rapid7 reveals global findings in latest cyber-threat report

Wed, 29th Oct 2025
#
ransomware
#
encryption
#
phishing
Rapid7 warns AI and quantum computing will escalate cyber threats, urging firms to adopt advanced defences and post-quantum cryptography amid rising hybrid attacks.
Image001  2

Extortion and ransomware drive over half of cyberattacks

Wed, 22nd Oct 2025
#
malware
#
ransomware
#
digital transformation
Over half of cyberattacks last year were driven by extortion or ransomware, with criminals focusing on financial gain rather than espionage, Microsoft reveals.
New zealand city skyline with digital padlocks shields cybersecurity protection business data

New Zealand businesses urged to boost security against rising cyber threats

Mon, 20th Oct 2025
#
data protection
#
data analytics
#
advanced persistent threat protection
New Zealand's intelligence chief warns rising foreign cyber espionage demands businesses strengthen security to protect innovation and national interests.
Hooded hacker dark room multiple screens blockchain code cyberattack

North Korean group uses blockchain to launch advanced malware

Fri, 17th Oct 2025
#
malware
#
crypto
#
blockchain
A North Korean group has used blockchain-based EtherHiding to secretly deploy malware, targeting developers in tech and cryptocurrency sectors worldwide.
Computer screen exposed folders files shadowy hands data breach unauthorized access

Salesloft data breach exposes 700 firms' details via OAuth attack

Wed, 10th Sep 2025
#
firewalls
#
data protection
#
phishing
Salesloft breach exposed sensitive data of 700+ firms, including Cloudflare and Palo Alto Networks, after hackers exploited OAuth tokens via a prolonged GitHub intrusion.
Cloud servers interconnected security breach red glowing server business office

Salesforce data theft campaign exposes SaaS integration risks

Thu, 28th Aug 2025
#
mfa
#
cloud security
#
martech
State-sponsored hackers have stolen OAuth2 tokens from Salesforce integrations, compromising hundreds of organisations and exposing risks in SaaS connectivity.
Digital illustration cyberattack dark storm clouds over cityscape infrastructure

Cyberattacks reshape modern conflict & highlight resilience needs

Tue, 29th Jul 2025
#
ransomware
#
software updates
#
cyber attacks
Recent cyberattacks on infrastructure and healthcare reveal a new digital battleground, prompting global efforts to strengthen cyber resilience and defence.