eCommerceNews Asia - Technology news for digital commerce decision-makers

Infosec stories - Page 18

Dark office night remote access shadowy hacker silent data theft

Data-only extortion surges as remote access abused

Wed, 18th Feb 2026
#
data protection
#
dr
#
vpns
Data-only extortion soars 11-fold as attackers 'log in instead of break in', abusing remote access tools for faster, stealthier raids.
Paul barbosa

Check Point named GigaOm cloud network security leader

Wed, 18th Feb 2026
#
firewalls
#
private cloud
#
hybrid cloud
Check Point tops GigaOm's 2025 Radar for cloud network security for a third year, named a Leader and Fast Mover for its unified platform.
Dim server room windows rack red warning remote access breach

Active exploitation seen in BeyondTrust access flaw

Mon, 16th Feb 2026
#
firewalls
#
network security
#
pam
Arctic Wolf says attackers are actively exploiting a critical BeyondTrust vulnerability in self-hosted remote access systems.
Lockdown mode seo card

OpenAI unveils Lockdown Mode to counter prompt attacks

Mon, 16th Feb 2026
#
firewalls
#
data protection
#
network security
OpenAI rolls out Lockdown Mode and new Elevated Risk labels in ChatGPT to curb prompt injection attacks and tighten data safeguards.
Untitled design  50

Singapore Budget 2026 backs secure, cost‑savvy AI push

Mon, 16th Feb 2026
#
data protection
#
digital transformation
#
hyperscale
Singapore's Budget 2026 fires up a national AI drive, tying innovation to cyber resilience, third‑party risk controls and strict cost discipline.
Roi karo

Check Point unveils four-pillar AI security strategy

Mon, 16th Feb 2026
#
firewalls
#
hybrid cloud
#
digital transformation
Check Point launches four-pillar AI security strategy and three targeted acquisitions to secure networks, workspaces and AI agents.
Ai governance zero trust secure data center corridor shield

Xiid & Cytex link AI governance with zero trust access

Sun, 15th Feb 2026
#
firewalls
#
data protection
#
ransomware
Xiid and Cytex join forces to fuse AI governance with zero trust access, targeting shrinking attack paths and stricter cyber regulation.
Enterprise cloud security shields above offices and data racks

Brinqa brings exposure management platform to Google Cloud

Sun, 15th Feb 2026
#
saas
#
storage
#
hybrid cloud
Brinqa lists unified exposure management on Google Cloud Marketplace, streamlining procurement and deployment for committed cloud customers.
Business insurance cyber shield red premium graph 2027 desk scene

Cyber premiums fall as Lockton flags 2027 volatility risk

Fri, 13th Feb 2026
#
ransomware
#
risk & compliance
#
cybersecurity
Cyber premiums keep sliding as incidents rise, but Lockton warns historic claims could spark renewed pricing volatility from 2027.
Nighttime small office cyberattack screens red warnings global scope

AI-driven ransomware attacks surge, most go unreported

Fri, 13th Feb 2026
#
firewalls
#
data protection
#
ransomware
AI-fuelled ransomware hit record levels in 2025, with BlackFog warning that around 86% of attacks worldwide are never publicly disclosed.
Dark moody captcha puzzle morphing into shadowy cyber thief scene

LummaStealer returns post-takedown with ClickFix ruse

Fri, 13th Feb 2026
#
mfa
#
phishing
#
advanced persistent threat protection
LummaStealer roars back after domain takedown, using fake CAPTCHA ClickFix tricks and CastleLoader to spread via routine user actions.
Modern it soc abstract ai brain dashboards secure cloud locks

Proofpoint buys Acuvity to secure AI agents at work

Fri, 13th Feb 2026
#
data protection
#
digital transformation
#
cloud security
Proofpoint snaps up AI security specialist Acuvity to police 'agentic workspaces' as enterprises rush to deploy copilots and agents.
Cinematic soc night ai alert dashboards hidden apps control

Okta unveils tools to detect & govern shadow AI risks

Fri, 13th Feb 2026
#
pam
#
cloud security
#
application security
Okta launches Agent Discovery to uncover and rein in shadow AI agents, mapping risky app access and tightening identity-based controls.
Managed soc arctic theme wolf motif endpoint threat dashboards

Arctic Wolf unveils Aurora managed endpoint tools for MSPs

Fri, 13th Feb 2026
#
ransomware
#
endpoint protection
#
socs
Arctic Wolf launches Aurora managed endpoint defence, rapid-response SLA and MSP admin portal to help partners scale security operations.
Moody remote night home office video call anonymized face north korea cyber map

Okta warns of North Korean fraud in remote tech hiring

Fri, 13th Feb 2026
#
data protection
#
ransomware
#
hcm
Okta warns North Korean operatives are landing remote tech jobs with stolen and synthetic identities to fund the regime and enable cyber attacks.
Compromised iis server dark code web to gambling crypto icons

BADIIS malware hijacks IIS servers for covert SEO fraud

Fri, 13th Feb 2026
#
malware
#
firewalls
#
network security
BADIIS malware is hijacking over 1,800 IIS servers worldwide, quietly boosting illicit gambling and crypto phishing sites via poisoned SEO.
Moody phone reflection identity theft caricature upload privacy risk

ChatGPT caricature trend raises fresh ID fraud fears

Fri, 13th Feb 2026
#
data protection
#
surveillance
#
biometrics
Daon warns viral ChatGPT caricature craze is handing fraudsters a richer dossier of personal data to fuel scams and social engineering.
Modern soc dark room analysts monitors world maps network threats

Simbian touts AI SOC growth as automation race intensifies

Fri, 13th Feb 2026
#
firewalls
#
digital transformation
#
cloud security
Simbian claims 15-fold customer surge as its AI-driven SOC agents vie to replace rules-based automation in the cyber defence arms race.
Ciso monitoring data flows shadowy ai deepfake cyberattack threat

CISOs confident in cyber skills but lag on AI threats

Thu, 12th Feb 2026
#
digital transformation
#
cloud security
#
socs
CISOs show strong faith in cyber defences yet less than two-thirds feel ready for fast-rising AI-driven attacks and deepfake threats.
Moody data center linux servers botnet ssh attacks asian city skyline

SSHStalker botnet preys on legacy Linux & cloud hosts

Thu, 12th Feb 2026
#
malware
#
firewalls
#
hyperscale
A newly uncovered SSHStalker botnet uses old-school IRC and legacy Linux exploits to hijack outdated corporate and cloud hosts at scale.