eCommerceNews New Zealand - Technology news for digital commerce decision-makers

Social Engineering stories - Page 2

Opentext   proofpoint

OpenText & Proofpoint urge backup tests on World Backup Day

Last month
#
data protection
#
dr
#
ransomware
OpenText and Proofpoint say organisations must test backups and tighten human-focused cyber defences as World Backup Day spotlights resilience gaps.
Marc van zadelhoff

'Human Risk' takes centre stage - Mimecast CEO

Last month
#
data protection
#
endpoint protection
#
phishing
Mimecast chief warns human risk is now cybersecurity's 'eighth layer' as malicious insiders overtake negligence in Australian attacks.
Corporate soc phishing simulation risk dashboard shield email icons

KnowBe4 launches AI defence agents for risk training

Last month
#
phishing
#
socs
#
email security
KnowBe4 expands its AIDA suite with AI defence agents to automate security training, phishing simulations and human risk measurement.
Editorial world map storm network lines ransomware hooded nodes

CrowdStrike flags faster AI-driven cyber attacks worldwide

Last month
#
ransomware
#
cloud security
#
phishing
AI-fuelled cyber attacks are spreading faster worldwide, CrowdStrike warns, as breakout times plummet and criminals weaponise mainstream tools.
Editorial cloud datacenter security control room ai ops 37f8d2

Upwind finds prompt detection can run under millisecond

Last month
#
firewalls
#
network security
#
cloud security
Upwind unveils sub-millisecond prompt threat detection for LLMs, claiming 95% precision using Nvidia models to secure live AI workloads.
Editorial illustration corporate criminal network ops map servers

HPE Threat Labs spot industrialised cybercrime surge

Last month
#
malware
#
firewalls
#
vpns
HPE Threat Labs warns cybercrime now runs like big business, as AI-fuelled, industrial-scale attacks hammer government and finance.
Kawin

KnowBe4 appoints Kawin Boonyapredee as APJ CISO advisor

Last month
#
digital transformation
#
cx
#
phishing
KnowBe4 names Dr Kawin Boonyapredee APJ CISO advisor to steer human risk and AI cyber threat strategy from a new base in Singapore.
Simon

The agentic evolution: Why high-fidelity data is the lifeblood of the modern SOC

Last month
#
iot security
#
phishing
#
iot
As AI-powered attacks shatter old perimeters, SOCs race to agentic operations where high-fidelity data becomes security's vital lifeblood.
Cinematic soc night world map threat graphs cyber analyst monitoring

Cyware unveils Agentic AI Fabric for threat defence

Last month
#
advanced persistent threat protection
#
socs
#
genai
Cyware launches Agentic AI Fabric, adding goal-driven analyst agents to automate threat intel, detection engineering and incident response.
Digital login screen shadows identity theft binary chains art

Barracuda warns of surge in credential-focused attacks

Last month
#
malware
#
firewalls
#
ransomware
Barracuda reports a global surge in identity-based cyber attacks, with stolen credentials, supply-chain abuse and weaponised PDFs on the rise.
Moody server room red alert cracked shield cyber vulnerabilities

Rapid7 warns exploited software flaws more than double

Last month
#
firewalls
#
ransomware
#
network security
Rapid7 warns exploited high and critical software flaws more than doubled in 2025, as attackers compress disclosure-to-attack windows.
Office worker ai email security green calm vs red phishing streams

Abnormal AI rolls out Attune 1.0 to fight AI cyberattacks

Last month
#
uc
#
phishing
#
advanced persistent threat protection
Abnormal AI launches Attune 1.0, a behavioural model that spots AI-crafted cyberattacks by learning normal workplace communication patterns.
Moody corporate night office fileless ransomware cloud lock reflection

LeakNet adopts ClickFix lures & Deno fileless loader

Last month
#
storage
#
uc
#
firewalls
Ransomware group LeakNet adopts ClickFix lures and a Deno-based fileless loader to scale attacks and evade traditional endpoint defences.
Browser extension thief mask crypto coin shield wallet protection

Okta helps disrupt ShieldGuard crypto-stealing extension

Last month
#
mfa
#
crypto
#
phishing
Okta and partners pull rogue ShieldGuard Chrome extension that stole crypto wallet data and bypassed browser defences via custom code.
Corporate cyberattack command center world map dashboards scene

HPE report warns cyberattacks now run like big business

Last month
#
malware
#
firewalls
#
vpns
HPE warns cybercriminals now run attacks like global enterprises, using repeatable workflows, automation and AI to outpace defences.
Corporate soc email security analysts unified cloud phishing bec

VIPRE email security integrates with Microsoft Defender

Last month
#
cloud security
#
phishing
#
advanced persistent threat protection
VIPRE links its Integrated Email Security with Microsoft Defender, unifying phishing and BEC detections in a single Defender console view.
Shadowy hacker cyber attack on hospital mobile device management

Stryker probes global cyber attack via MDM systems

Last month
#
dr
#
ransomware
#
iot security
Stryker says a cyber attack disrupted internal systems, with investigators examining mobile device tools as experts warn of rising state-linked threats.
Ai cyberattack shadow figure robotscreens red alarm extortion

AI agents drive surge in cyber threats & extortion

Last month
#
malware
#
data protection
#
ransomware
AI agents are fuelling a new wave of cyber risk, as criminals weaponise automation to speed up ransomware and sharpen extortion tactics.
Smartphone red siren app shadowy cables israel data surveillance

Fake Red Alert app used in Android spyware smishing

Last month
#
endpoint protection
#
mdm
#
phishing
Attackers push fake Red Alert Android app via SMS, turning Israel rocket warning tool into spyware that steals messages, contacts and location.
Home office devices suspicious messages shields locks flat vector

Norton unveils Genie scam detection assistant in ChatGPT

Last month
#
cloud security
#
phishing
#
physical security
Norton launches Genie scam assistant in ChatGPT, letting users tag @Norton to analyse emails, texts, images and links for fraud risks.