eCommerceNews New Zealand - Technology news for digital commerce decision-makers

Data breach stories - Page 5

Dim cloud data center unlocked database locks ai brain risk scene

AI agents expose risks in insecure default databases

Wed, 4th Feb 2026
#
firewalls
#
data protection
#
network security
A security lapse at AI agent service Moltbook exposes risky default database settings, raising fresh alarms over agentic system safeguards.
Accountable ai vs data privacy balanced scale shields us uk eu

Data Privacy Day highlights shift to accountable AI data use

Wed, 4th Feb 2026
#
data protection
#
supply chain
#
breach prevention
Data Privacy Day spotlights a shift from privacy promises to provable controls, as AI, governance and regulation demand accountable data use.
Ronnie yubico

YubiKey study touts ROI, breach risk plunge for firms

Wed, 4th Feb 2026
#
mfa
#
cloud security
#
iam
YubiKey deployment delivers 265% ROI, USD $5.3 million NPV and 99.99% lower breach risk in Forrester model of a 5,000-staff enterprise.
Australian city night cctv hacker warning shadowy silhouette

Critical flaw found in IDIS Cloud Manager CCTV viewer

Tue, 3rd Feb 2026
#
ransomware
#
iot security
#
phishing
A critical ICM Viewer flaw lets a single malicious click hijack IDIS CCTV hosts, exposing Australian networks to deep lateral attacks.
Cinematic laptop warning faces hacker hands cloud data streams

Panera breach exposes 14m in wave of SaaS extortion attacks

Tue, 3rd Feb 2026
#
crm
#
data protection
#
ransomware
Panera data breach exposes details of 14 million customers, spotlighting a surge in SaaS-focused extortion and identity-driven cyber attacks.
Gina mccintltd.com  48

AI outpaces data privacy, exposing governance gaps

Mon, 2nd Feb 2026
#
storage
#
data protection
#
hybrid cloud
AI investment is surging faster than data privacy and board oversight, leaving storage gaps and weak access controls to fuel rising risk.
Anz boardroom storm cloud ai brain over weak data governance

Data Privacy Day warns AI, cloud outpacing governance

Sat, 31st Jan 2026
#
malware
#
data protection
#
dr
Data Privacy Day warns AI and cloud adoption is racing ahead of data governance, as boards and regulators demand proof of control.
Dimly lit office worker shakes hands with shadowy hacker monitor

Ransomware gangs step up insider recruitment, says NCC

Fri, 30th Jan 2026
#
data protection
#
ransomware
#
endpoint protection
Ransomware gangs are stepping up efforts to recruit insiders, warns NCC Group, as December 2025 attacks jump 13% to 784 globally.
Anz exhausted office team data privacy security stress illustration

Privacy teams in Oceania face stress & budget cuts

Fri, 30th Jan 2026
#
data protection
#
digital transformation
#
encryption
Oceania privacy teams face rising stress, shrinking budgets and smaller staff as rapid tech change outpaces compliance and risk controls.
Athletic shoe hq night storm cyber attack data breach scene

Nike probes suspected cyber attack after data leak claim

Thu, 29th Jan 2026
#
data protection
#
dr
#
ransomware
Nike is investigating a suspected cyber attack after hackers claimed access to terabytes of internal data, raising global security concerns.
Secure datacenter corridor shield zero trust ai identity cloud

Teleport unveils identity framework for agentic AI security

Thu, 29th Jan 2026
#
data protection
#
hybrid cloud
#
pam
Teleport launches an agentic AI identity framework to secure autonomous agents with zero trust credentials across cloud and on-prem systems.
Cinematic night city cyberattack red windows shattering locks

Fewer ransomware gangs, but more victims in late 2025

Thu, 29th Jan 2026
#
ransomware
#
digital transformation
#
advanced persistent threat protection
Ransomware gangs shrank in number but hit more victims in late 2025, with leak-site postings soaring despite fewer active groups.
Ai cyber attack zero trust server room glowing data shield

AI reshapes data privacy as trust & attacks escalate

Thu, 29th Jan 2026
#
data protection
#
ransomware
#
phishing
AI is transforming data privacy as mistrust soars and cyber attacks accelerate, pushing firms to verify every identity and machine action.
Peter waring

Why SOC 2 Type 2 certification matters for brokers

Thu, 29th Jan 2026
#
data protection
#
dr
#
document management
Insurance brokers must scrutinise software vendors' SOC 2 Type 2 security to safeguard client data, compliance and operational resilience.
Exec pic

Exclusive: SonicWall's Suroop Chandran on why security basics still fail

Thu, 29th Jan 2026
#
malware
#
firewalls
#
data protection
SonicWall warns over 95% of cyber breaches stem from misconfigured tools, as firms lean on MSPs and cyber warranties to plug skills gaps.
Moody human silhouette data fragments facing shadowy ai privacy loss

AI heightens data privacy risks & reshapes digital trust

Thu, 29th Jan 2026
#
data protection
#
digital transformation
#
application security
AI's rapid spread, weak data governance and rising scepticism are reshaping digital trust and sharply escalating privacy risks.
Kingston fips

Kingston gains FIPS 140-3 Level 3 for IronKey USBs

Wed, 28th Jan 2026
#
storage
#
data protection
#
iot security
Kingston wins FIPS 140-3 Level 3 for its IronKey Keypad 200 USBs, making it the first supplier with three drives at this stringent standard.
Moody night corporate tower swoosh architecture massive data breach

Nike probes suspected cyberattack & huge data leak

Wed, 28th Jan 2026
#
firewalls
#
data protection
#
ransomware
Nike is probing a suspected cyberattack after a hacker group claimed to leak 1.4TB of internal data, raising supply chain security fears.
Raymond schippers

Hybrid mesh security emerges to counter AI cyber risks

Tue, 27th Jan 2026
#
firewalls
#
ransomware
#
hybrid cloud
As hybrid IT sprawl fuels blind spots and AI-driven attacks, experts say only a zero trust, hybrid mesh rethink can secure modern networks.
Image

SonicWall pushes unified automation for faster cyber defence

Fri, 23rd Jan 2026
#
malware
#
firewalls
#
ransomware
SonicWall launches unified automation tools to cut alert fatigue, speed cyber threat remediation and streamline overstretched security teams.