Enterprise security stories
Security teams may cut backlogs as validated HackerOne flaws are mapped into Wiz, linking exploit evidence to cloud assets for faster prioritisation.
The scams can hand attackers Microsoft 365 access, as new kits and services make device code phishing easier to run at scale.
With biometric terminals increasingly treated as networked endpoints, the device aims to cut tampering risk and ease large-site access control.
Approval-based access controls now give security teams tighter oversight of privileged accounts as AI agents expand the attack surface.
The purchase adds browser-based AI controls to Akamai's security portfolio as firms scramble to monitor staff use of generative tools.
Nearly half of organisations are leaving risky ports and services open, with midmarket firms taking up to 56 days to fix exposures.
Security teams can now rank cloud flaws by exploitability and impact, as validated HackerOne reports feed directly into Wiz's risk graph.
More than nine in ten security incidents now involve anonymising services, leaving many organisations unable to spot malicious traffic in real time.
Verified access to Anthropic's restricted AI tools could help IRONSCALES test email defences against more realistic phishing and impersonation attacks.
Verified customer reviews have lifted the security vendor's MetaDefender Managed File Transfer into G2's Spring 2026 Leader tier.
The findings show many firms still leave internet-facing databases and admin tools open, giving attackers easy routes before flaws are even published.
The attack kept retrying for hours after network blocks, as a scheduled task and Python proxy preserved access on the host.
Faster cyber attacks are forcing IT and security teams to act more quickly across large endpoint estates as Tanium expands its AI platform in APAC.
The scanner found four critical remote code execution bugs among 16 Windows flaws, including issues in the kernel TCP/IP stack and IKEv2 service.
Security teams may cut manual reporting effort by up to 70 per cent as new tools help validate threats against internal logs and history.
AI is now being used to write exploits and malware, with Google saying it has traced the first zero-day linked to machine assistance.
The award underlines growing demand for mission-critical security integration across New Zealand's infrastructure sector.
It aims to cut alert fatigue by using runtime data to validate threats, prioritise real risks and guide fixes across cloud and AI systems.
The hire signals a sharper focus on resilience and customer trust as buyers demand stronger governance from identity security suppliers.
Analysts could gain time as AI systems shoulder evidence gathering, alert grouping and data translation, though humans still make final calls.