TelcoNews Asia - Telecommunications news for ICT decision-makers

Social Engineering stories - Page 2

Flux result abba1b50 2e28 4da7 948f 82ddc12126b8

Orange Business adds deepfake detection to services

This month
#
uc
#
cx
#
phishing
Orange Business to weave Reality Defender's deepfake checks into enterprise communications for 7,000 customers amid rising fraud fears.
Flux result 6459960a 8b91 4ad1 9ab4 cab1e0e740d2

DeepLoad malware steals credentials via ClickFix campaign

This month
#
malware
#
firewalls
#
network infrastructure
ReliaQuest flags DeepLoad malware stealing live credentials in enterprise networks, with AI-style obfuscation, USB spread and hidden WMI persistence.
Flux result 4b7be8d2 61e2 4407 af1c 1088978c23b7

North Korean operatives target Australian jobs, DTEX warns

Last month
#
hcm
#
advanced persistent threat protection
#
physical security
DTEX warns North Korean operatives are using false identities to secure Australian tech jobs, with some applicants aided by AI and deepfakes.
Opentext   proofpoint

OpenText & Proofpoint urge backup tests on World Backup Day

Last month
#
data protection
#
dr
#
ransomware
OpenText and Proofpoint say organisations must test backups and tighten human-focused cyber defences as World Backup Day spotlights resilience gaps.
Marc van zadelhoff

'Human Risk' takes centre stage - Mimecast CEO

Last month
#
data protection
#
endpoint protection
#
phishing
Mimecast chief warns human risk is now cybersecurity's 'eighth layer' as malicious insiders overtake negligence in Australian attacks.
Corporate soc phishing simulation risk dashboard shield email icons

KnowBe4 launches AI defence agents for risk training

Last month
#
phishing
#
socs
#
email security
KnowBe4 expands its AIDA suite with AI defence agents to automate security training, phishing simulations and human risk measurement.
Editorial world map storm network lines ransomware hooded nodes

CrowdStrike flags faster AI-driven cyber attacks worldwide

Last month
#
ransomware
#
cloud security
#
phishing
AI-fuelled cyber attacks are spreading faster worldwide, CrowdStrike warns, as breakout times plummet and criminals weaponise mainstream tools.
Editorial cloud datacenter security control room ai ops 37f8d2

Upwind finds prompt detection can run under millisecond

Last month
#
firewalls
#
network security
#
cloud security
Upwind unveils sub-millisecond prompt threat detection for LLMs, claiming 95% precision using Nvidia models to secure live AI workloads.
Editorial illustration corporate criminal network ops map servers

HPE Threat Labs spot industrialised cybercrime surge

Last month
#
malware
#
firewalls
#
vpns
HPE Threat Labs warns cybercrime now runs like big business, as AI-fuelled, industrial-scale attacks hammer government and finance.
Kawin

KnowBe4 appoints Kawin Boonyapredee as APJ CISO advisor

Last month
#
digital transformation
#
cx
#
phishing
KnowBe4 names Dr Kawin Boonyapredee APJ CISO advisor to steer human risk and AI cyber threat strategy from a new base in Singapore.
Cinematic soc night world map threat graphs cyber analyst monitoring

Cyware unveils Agentic AI Fabric for threat defence

Last month
#
advanced persistent threat protection
#
socs
#
genai
Cyware launches Agentic AI Fabric, adding goal-driven analyst agents to automate threat intel, detection engineering and incident response.
Hexnode

Hexnode CEO on how fintech breaches multiply where device visibility ends

Last month
#
firewalls
#
data protection
#
encryption
Fintechs face rising breaches where device visibility fails, as Hexnode warns static inventories can't secure modern endpoints or audits.
Moody server room red alert cracked shield cyber vulnerabilities

Rapid7 warns exploited software flaws more than double

Last month
#
firewalls
#
ransomware
#
network security
Rapid7 warns exploited high and critical software flaws more than doubled in 2025, as attackers compress disclosure-to-attack windows.
Office worker ai email security green calm vs red phishing streams

Abnormal AI rolls out Attune 1.0 to fight AI cyberattacks

Last month
#
uc
#
phishing
#
advanced persistent threat protection
Abnormal AI launches Attune 1.0, a behavioural model that spots AI-crafted cyberattacks by learning normal workplace communication patterns.
Moody corporate night office fileless ransomware cloud lock reflection

LeakNet adopts ClickFix lures & Deno fileless loader

Last month
#
storage
#
uc
#
firewalls
Ransomware group LeakNet adopts ClickFix lures and a Deno-based fileless loader to scale attacks and evade traditional endpoint defences.
Browser extension thief mask crypto coin shield wallet protection

Okta helps disrupt ShieldGuard crypto-stealing extension

Last month
#
mfa
#
crypto
#
phishing
Okta and partners pull rogue ShieldGuard Chrome extension that stole crypto wallet data and bypassed browser defences via custom code.
Corporate cyberattack command center world map dashboards scene

HPE report warns cyberattacks now run like big business

Last month
#
malware
#
firewalls
#
vpns
HPE warns cybercriminals now run attacks like global enterprises, using repeatable workflows, automation and AI to outpace defences.
Corporate soc email security analysts unified cloud phishing bec

VIPRE email security integrates with Microsoft Defender

Last month
#
cloud security
#
phishing
#
advanced persistent threat protection
VIPRE links its Integrated Email Security with Microsoft Defender, unifying phishing and BEC detections in a single Defender console view.
Shadowy hacker cyber attack on hospital mobile device management

Stryker probes global cyber attack via MDM systems

Last month
#
dr
#
ransomware
#
iot security
Stryker says a cyber attack disrupted internal systems, with investigators examining mobile device tools as experts warn of rising state-linked threats.
Ai cyberattack shadow figure robotscreens red alarm extortion

AI agents drive surge in cyber threats & extortion

Last month
#
malware
#
data protection
#
ransomware
AI agents are fuelling a new wave of cyber risk, as criminals weaponise automation to speed up ransomware and sharpen extortion tactics.