eCommerceNews Asia - Technology news for digital commerce decision-makers

Infosec stories - Page 20

Moody user at desk surrounded by phishing login screens monitors

Record rise in digital squatting fuels phishing wave

Mon, 9th Feb 2026
#
malware
#
phishing
#
martech
Record digital squatting surge sees 6,200 disputes in 2025, as lookalike domains drive costly phishing, malware and payment fraud.
Glowing neural network cloud servers ai agents boomi hub automation

Boomi hits 30,000 customers as AI integration surges

Mon, 9th Feb 2026
#
digital transformation
#
hyperscale
#
cloud security
Boomi tops 30,000 customers and runs 75,000 AI agents in production, as enterprises shift from AI experiments to large-scale automation.
Us military data center zero trust identity security cloud shield

Cayosoft, XMS to bolster US War Department identity

Sat, 7th Feb 2026
#
dr
#
pam
#
cloud security
Cayosoft and XMS Solutions will overhaul identity systems for a US war agency, bolstering Zero Trust security across hybrid Microsoft environments.
Guardspace

Guardsquare buys Verimatrix XTD to boost mobile security

Sat, 7th Feb 2026
#
endpoint protection
#
devops
#
cloud security
Guardsquare snaps up Verimatrix's XTD tech, adding real-time mobile threat detection and response to its end-to-end app security platform.
Uk datacenter night ultradns ddos botnet attack red alert

DigiCert sees record UltraDNS DDoS surge in December 2025

Fri, 6th Feb 2026
#
firewalls
#
network security
#
application security
DigiCert warns UltraDNS DDoS attacks spiked to record levels in December 2025, driven by massive Aisuru and Kimwolf botnets.
Yuvraj

Exclusive: Yuvraj Pradhan warns legacy VPNs are now a security risk

Fri, 6th Feb 2026
#
malware
#
firewalls
#
vpns
Legacy VPNs are emerging as a prime security liability as hybrid work, identity‑based attacks and cloud apps expose their design flaws.
Ai identity security cloud lock humans robots enterprise net

1Password expands global partner push for AI identity

Fri, 6th Feb 2026
#
saas
#
digital transformation
#
pam
1Password revamps its global partner programme to tap soaring demand for AI-era identity security and non-human access governance.
Multi cloud secure data center with shield ai circuits governance

AvePoint boosts AI agent governance & cloud backups

Fri, 6th Feb 2026
#
storage
#
data protection
#
dr
AvePoint extends its Confidence Platform to tighten agentic AI governance and broaden multi-cloud backup across major SaaS and IaaS tools.
Moody corporate cloud analytics server room cracked shield leak

Tenable reveals 'LookOut' flaws that endanger Google Looker

Fri, 6th Feb 2026
#
firewalls
#
data analytics
#
network security
Tenable warns 'LookOut' flaws in Google Looker could hand attackers server control, expose secrets and enable cross-tenant cloud access.
Isometric hybrid multicloud datacenter with unified ai security shield

AI, hybrid cloud spur security shift to consolidation

Fri, 6th Feb 2026
#
firewalls
#
network infrastructure
#
hybrid cloud
AI, hybrid cloud and SASE are driving a shift from security sprawl to consolidation, with unified policy control now the top priority.
Ai ghost hand server room software supply chain breach night

Developers' AI agents pose rising software supply risks

Fri, 6th Feb 2026
#
data protection
#
cloud security
#
application security
Developers granting AI agents broad, unsupervised access to code and systems are creating new software supply chain and data exposure risks.
Mg 3 01

Searchlight Cyber appoints Michael Gianarakis as CEO

Thu, 5th Feb 2026
#
fintech
#
advanced persistent threat protection
#
socs
Searchlight Cyber has promoted former product chief Michael Gianarakis to CEO as founder Ben Jones moves to a strategic board role.
Moody corporate office night remote access malware attack scene

Screensaver phishing installs remote access tools covertly

Thu, 5th Feb 2026
#
storage
#
firewalls
#
ransomware
Attackers are abusing Windows screensaver files in a spearphishing campaign to stealthily install remote access tools on business systems.
Office worker anxious at laptop phishing emails shadowy hands clouds

Callback phishing surges as BEC email fraud dominates

Thu, 5th Feb 2026
#
hyperscale
#
phishing
#
hcm
Callback phishing jumps sixfold as BEC fraud stays dominant, with criminals weaponising CAPTCHAs, trusted brands and cloud platforms.
Ai code security scan software engineer modern office monitor

DryRun unveils AI DeepScan Agent for faster code risk

Thu, 5th Feb 2026
#
application security
#
physical security
#
devsecops
DryRun launches DeepScan Agent, an AI tool that scans whole codebases in hours to rank real-world security risks and speed remediation.
Ai neural cloud over office cyber threats brand risk scene

Moltbook's AI agents spark growing security & brand fears

Thu, 5th Feb 2026
#
saas
#
uc
#
data protection
Moltbook's boom in user-built AI agents is fuelling mounting warnings over cyber threats and brand damage as governance lags adoption.
Dark server room red glowing rack critical data leak cinematic

Tenable finds critical flaws in Google Looker platform

Thu, 5th Feb 2026
#
private cloud
#
hybrid cloud
#
data analytics
Tenable warns critical Google Looker flaws could enable server takeover and data theft, leaving unpatched self-hosted deployments exposed.
Sarah wilkinson

Solving the '3 AM Problem' with 24/7 cyber defence

Thu, 5th Feb 2026
#
malware
#
firewalls
#
ransomware
As most ransomware strikes after hours, small firms face a costly 3 AM security gap that only round-the-clock MDR can realistically close.
Moody server room data leak shadowy figures cross tenant breach

Tenable reveals Looker flaws risking cross-tenant attacks

Thu, 5th Feb 2026
#
data analytics
#
cloud security
#
application security
Tenable warns unpatched self-hosted Google Looker systems face remote takeover, data theft and cross-tenant cloud attack risks.
Moody server room nginx rack shadowy hand forked traffic route

NGINX config tampering enables stealth web traffic hijack

Thu, 5th Feb 2026
#
firewalls
#
siem
#
network security
Attackers are hijacking live web sessions by stealthily tampering with NGINX configs, silently relaying traffic via rogue servers.