SecurityBrief Australia - Technology news for CISOs & cybersecurity decision-makers

Cybercriminals stories

Flux result 980a0ac9 dd3e 46f1 abde 6cd7e60cc575

Appdome adds backend Risk Intelligence APIs for IDAnchor

Yesterday
#
cloud security
#
mdm
#
application security
Appdome expands IDAnchor with Risk Intelligence APIs to feed backend fraud systems mobile threat history, identity data and AI risk scoring.
Shadowy criminal hand manipulating malware ad tracker web illustration

Cybercrooks abuse Keitaro tracker for AI scam campaigns

Last month
#
malware
#
phishing
#
martech
Cybercriminals exploit Keitaro ad tracker to cloak AI trading scams and malware, tying some 15,500 malicious domains into a hidden network.
Ad tracking abuse fake investment phishing malware web illustration

Keitaro ad tracker tied to more than 15,000 scam domains

Last month
#
malware
#
phishing
#
martech
Keitaro ad tracker abused in 15,500 scam and malware domains, as fraudsters cloak AI-themed investment lures from security watchdogs.
Corporate cyberattack command center world map dashboards scene

HPE report warns cyberattacks now run like big business

Last month
#
malware
#
firewalls
#
vpns
HPE warns cybercriminals now run attacks like global enterprises, using repeatable workflows, automation and AI to outpace defences.
Ai cyberattack shadow figure robotscreens red alarm extortion

AI agents drive surge in cyber threats & extortion

Last month
#
malware
#
data protection
#
ransomware
AI agents are fuelling a new wave of cyber risk, as criminals weaponise automation to speed up ransomware and sharpen extortion tactics.
Ai ddos storm dark data streams overwhelming global internet map

AI-fuelled DDoS attacks surge past eight million globally

Last month
#
firewalls
#
ddos
#
network security
AI-driven botnets fuel eight million DDoS attacks in late 2025, as multi-vector assaults hit 30 Tbps and strain global critical services.
Hybrid cloud network stolen digital identity glowing key figure

Google report warns identity is weak link in cloud

Last month
#
malware
#
ransomware
#
hybrid cloud
Attackers are ditching malware for stolen identities, misconfigurations and abused AI tools, Google warns in its latest cloud threat report.
Hooded hacker over asia pacific skyline ai ransomware cloud web

Ransomware surges across Asia-Pacific as AI fuels risk

Last month
#
data protection
#
ransomware
#
digital transformation
Ransomware attacks in Asia-Pacific surged 59% in 2025 as rapid digitalisation and AI adoption fuel faster, more targeted cyber extortion.
Doctor anxious at pc patient data leaking into ai clouds scene

GenAI drives patient data policy breaches in healthcare

Last month
#
malware
#
data protection
#
cloud security
GenAI use in healthcare is fuelling patient data policy breaches, with regulated records making up 89% of AI-linked violations, research shows.
Logos

Tycoon 2FA phishing service disrupted in EU crackdown

Last month
#
ransomware
#
manufacturing
#
mfa
European authorities and tech firms have disrupted Tycoon 2FA, a major phishing service used to bypass MFA and hijack cloud accounts.
Connected tractor combine wheat field cyber threat clouds

NCC warns of rising cyber risks to connected farming

Last month
#
agricultural technology
#
ransomware
#
cloud security
NCC warns that insecure connected farm machinery could let cyber attacks disrupt harvests, cut yields and threaten food supply chains.
Ransomware threat dark server room to critical infrastructure art

NCC warns ransomware risk persists despite January dip

Fri, 27th Feb 2026
#
ransomware
#
manufacturing
#
digital transformation
Ransomware cases dipped 17% in January, but NCC warns the threat remains high as Qilin targets critical sectors and tactics evolve.
Dark server room ai cyber attack red network path spreading

AI-driven cyber attacks now breach networks in minutes

Thu, 26th Feb 2026
#
malware
#
firewalls
#
ransomware
AI-fuelled hackers can now spread across corporate networks in as little as four minutes, outpacing human defenders by hours.
Mac laptop fake installer shadowy hands data theft crypto malware

Hijacked Google Ads push MacSync malware to Mac users

Wed, 25th Feb 2026
#
storage
#
phishing
#
email security
Hijacked Google Ads accounts are serving bogus installers that trick Mac users into running MacSync stealer via fake Evernote guides.
Compromised iis server dark code web to gambling crypto icons

BADIIS malware hijacks IIS servers for covert SEO fraud

Fri, 13th Feb 2026
#
malware
#
firewalls
#
network security
BADIIS malware is hijacking over 1,800 IIS servers worldwide, quietly boosting illicit gambling and crypto phishing sites via poisoned SEO.
Gerry sillars

Australians urged to tighten online habits on & off duty

Tue, 10th Feb 2026
#
ransomware
#
mfa
#
phishing
Australians are being warned to sharpen digital habits as AI‑driven phishing and social engineering outpace traditional cyber defences.
Moody corporate office night remote access malware attack scene

Screensaver phishing installs remote access tools covertly

Thu, 5th Feb 2026
#
storage
#
firewalls
#
ransomware
Attackers are abusing Windows screensaver files in a spearphishing campaign to stealthily install remote access tools on business systems.
Cinematic laptop warning faces hacker hands cloud data streams

Panera breach exposes 14m in wave of SaaS extortion attacks

Tue, 3rd Feb 2026
#
crm
#
data protection
#
ransomware
Panera data breach exposes details of 14 million customers, spotlighting a surge in SaaS-focused extortion and identity-driven cyber attacks.
Moody night corporate tower swoosh architecture massive data breach

Nike probes suspected cyberattack & huge data leak

Wed, 28th Jan 2026
#
firewalls
#
data protection
#
ransomware
Nike is probing a suspected cyberattack after a hacker group claimed to leak 1.4TB of internal data, raising supply chain security fears.
Unnamed  3 (2)

UK bill accelerates shift to offensive cyber security

Sat, 24th Jan 2026
#
firewalls
#
endpoint protection
#
devops
New UK cyber bill pushes critical sectors towards continuous offensive security testing as state-backed and criminal threats intensify.