Incident Response stories
Phishing gangs abuse .arpa DNS and IPv6 tunnels to hide brand-impersonation scams in core internet plumbing that most defences ignore.
N-able adds real-time anomaly alerts to Cove Data Protection, flagging risky backup policy changes linked to identity-driven attacks.
Codific warns power grids face repeat cyberattack patterns and urges utilities to bolster resilience to outages and cascading disruption.
Ransomware cases dipped 17% in January, but NCC warns the threat remains high as Qilin targets critical sectors and tactics evolve.
AI has become firms' top data security fear as identity and deepfake threats surge, exposing gaps in visibility, encryption and governance.
AI-first firms take months longer to recover from cyber attacks and face sharply higher breach and scraping costs, Fastly research warns.
Global ransomware attacks fell 17% in January, but NCC warns evolving tactics, AI and messaging apps mean risk is not receding.
ShinyHunters shifts to subdomain-brand phishing and vishing on mobiles, bypassing domain checks to hijack SSO logins and SaaS sessions.
Sinch partners with Lovable to embed global messaging, email and voice into its AI build platform, starting with Mailgun-powered email.
Saviynt taps Amazon Q to add conversational AI and deeper cross-app risk context, helping identity teams automate investigations and fixes.
Phishing gangs exploit obscure .arpa DNS space and IPv6 tunnels to sneak past reputation-based web filters and lure users to fake sites.
AI-driven hackers can now steal data in just 72 minutes, as faster, multi-surface attacks overwhelm complex, over-trusting enterprises.
Anthropic upgrades Claude Cowork with private plugin marketplaces, richer admin controls and Office-linked workflows for enterprise teams.
Splashtop has integrated its Autonomous Endpoint Management with CrowdStrike Falcon, unifying Windows endpoint status for IT and security teams.
Russian-run Diesel Vortex phishing service raided freight and logistics portals in the US and Europe, stealing over 1,600 login credentials.
IT leaders are racing to redesign AI operations so sovereignty, data residency and reliability can coexist under tightening global rules.
AI-fuelled hackers can now spread across corporate networks in as little as four minutes, outpacing human defenders by hours.
AI-first firms in Southeast Asia suffer longer, costlier cyber incidents as rising AI use widens attack surfaces and fuels scraping costs.
MetaCompliance adds Exposure Monitoring to tie confirmed breach data to automated staff training and human risk scoring for security teams.
AI-powered cyberattacks are rising sharply, leaving Canadian businesses exposed as legacy systems meet rapid AI adoption and automated threats.