SecurityBrief Australia - Technology news for CISOs & cybersecurity decision-makers

Identity Theft stories

Flux result 15f42594 4ff5 453e a52e 0198b3f21283

iProov report warns of soaring iOS injection attacks

Last week
#
uc
#
data protection
#
devops
iProov warns iOS injection attacks surged 1,151% in late 2025 as generative AI fuels deepfake impersonation and identity fraud.
Flux result bcf6e25d 9ccc 4b2e a16a e3cd9c6f5d90

Australians fear identity theft as online fraud rises

Last week
#
surveillance
#
digital transformation
#
cx
Australians wary of AI fraud checks as Experian data shows 56% have faced online scams or identity theft, with millennials hit hardest.
Flux result a871969e c70a 4ca6 9ac1 f711abc22e3e

ASIC steps up takedown of AI investment scam sites

Last week
#
data protection
#
fintech
#
phishing
ASIC ramps up AI scam fight as it takes down 11,964 bogus investment websites and warns of slicker ads, fake endorsements and cloaking tactics.
Building digital trust data quality strategy

Building digital trust: Data quality provides a scalable path

Last week
#
data protection
#
fintech
#
cx
Data quality gives banks a scalable route to digital trust, cutting fraud and false positives while speeding onboarding, KYB and AI-driven checks.
Email attachment20260406 1015143 8xx90v

Avocado warns on code repository supply chain attacks

Last week
#
cloud security
#
phishing
#
application security
Avocado urges Australian firms to tighten repository security as the ACSC reissues a high alert on active supply chain attacks and secrets sprawl.
Flux result ce4cb7f0 cf50 4830 a4ec b982992c1a8f

Attackers turn trusted tools into cyber weapon

This month
#
malware
#
ransomware
#
advanced persistent threat protection
Attackers abuse trusted tools, remote support software and stolen SSO sessions to breach systems, ReliaQuest says.
Flux result d2cebe18 95d7 46b4 b7a5 7ed6eb834b59

SonicWall flags SMB cyber gaps as attacks rise 20.8%

This month
#
firewalls
#
vpns
#
ransomware
SonicWall says small firms are being hit hardest by basic security lapses as ransomware, bot traffic and identity theft keep climbing.
Flux result 4b7be8d2 61e2 4407 af1c 1088978c23b7

North Korean operatives target Australian jobs, DTEX warns

Last month
#
hcm
#
advanced persistent threat protection
#
physical security
DTEX warns North Korean operatives are using false identities to secure Australian tech jobs, with some applicants aided by AI and deepfakes.
Flux result 2a610a50 5fd2 4aae a89d e39db39b52b5

Banks issue warning over AI-powered identity fraud risks

Last month
#
data protection
#
surveillance
#
mfa
US banks and regulators are urged to adopt passkeys, mobile driving licences and tougher verification as generative AI fuels deepfake fraud.
Flux result 6f69d56c 3f1f 409b 9b45 bdab2e8773af

Resemble AI launches deepfake detector & threat report

Last month
#
data protection
#
physical security
#
risk & compliance
Resemble AI unveils free Chrome extension and X bot as chief executive officer Zohaib Ahmed warns synthetic media risks are widening across businesses.
Flux result 8486c864 303f 4237 934f f5965cc5a67e

APAC cybercrime rises 12% as synthetic fraud surges

Last month
#
gaming
#
biometrics
#
cx
APAC cybercrime climbs as synthetic identity fraud accelerates, with desktop-browser attacks, login pressure and bot activity fuelling losses.
Flux result 96036c05 7a24 435b 9716 8d7295db886e

DigiCert updates document signing tool to curb AI fraud

Last month
#
data protection
#
document management
#
digital transformation
DigiCert has revamped its Document Trust Manager to centralise signing controls, as firms battle AI-driven fraud and tougher compliance demands.
Editorial world map storm network lines ransomware hooded nodes

CrowdStrike flags faster AI-driven cyber attacks worldwide

Last month
#
ransomware
#
cloud security
#
phishing
AI-fuelled cyber attacks are spreading faster worldwide, CrowdStrike warns, as breakout times plummet and criminals weaponise mainstream tools.
Trusted ai french data center anti drone defense sovereign cloud

Orange launches trusted AI, anti-drone & cloud tools

Last month
#
uc
#
data protection
#
drones
Orange unveils anti-drone service, trusted AI agents and sovereign cloud collaboration tools to bolster secure, resilient enterprise tech.
Tired australian office worker surrounded by screens warnings locks

Survey finds Australians suffering cyber breach fatigue

Last month
#
data protection
#
ransomware
#
physical security
Survey finds many Australians shrug off data breach warnings, seeing cyber attacks as inevitable despite rising risks and tailored support calls.
Australian bank office night ai fraud detection red alerts desks

AI & hardship drive surge in Australian loan fraud

Last month
#
fintech
#
physical security
#
risk & compliance
AI tools and cost-of-living strain see Australian lenders block AUD $1.5 billion in loan fraud as money mule cases almost double.
Home office devices suspicious messages shields locks flat vector

Norton unveils Genie scam detection assistant in ChatGPT

Last month
#
cloud security
#
phishing
#
physical security
Norton launches Genie scam assistant in ChatGPT, letting users tag @Norton to analyse emails, texts, images and links for fraud risks.
Dark moody android phone usb shadowy hand crypto security scene

Critical MediaTek flaw lets attackers steal phone crypto

Last month
#
mdm
#
physical security
#
breach prevention
A critical MediaTek boot flaw lets attackers steal PINs and crypto wallets from powered-off Android phones with a 45-second USB attack.
Office worker laptop cloud apps ai icons secure access shield

LastPass unveils browser-based Secure Access Essentials

Last month
#
encryption
#
mfa
#
cloud security
LastPass launches Secure Access Essentials, a browser-focused suite to secure access to workplace apps, SaaS and unsanctioned AI tools.
Australian office worker unlocks multiple digital padlocks data leak

Australians overconfident as risky password habits persist

Last month
#
mfa
#
phishing
#
physical security
Australians feel confident spotting cyber threats, but most still reuse passwords, share logins and ignore breaches unless directly alerted.