ChannelLife New Zealand - Industry insider news for technology resellers

Business Email Compromise stories

Flux result 2dd4367e 3bc6 419f 8986 cd60be7f302d

Doppel wins ISO trifecta for AI, security & privacy

Today
#
firewalls
#
data protection
#
network security
Doppel secures three ISO certifications for AI governance, security and privacy, as enterprise buyers demand stronger assurance against AI-driven cyber threats.
Screenshot 2026 04 09 at 16.01.24

Trust Panda opens Auckland YubiKey hub for New Zealand

Last week
#
biometrics
#
pam
#
mfa
Trust Panda opens Auckland hub with local YubiKey stock for New Zealand buyers as phishing fears drive demand for stronger authentication.
Flux result 15f42594 4ff5 453e a52e 0198b3f21283

iProov report warns of soaring iOS injection attacks

Last week
#
uc
#
data protection
#
devops
iProov warns iOS injection attacks surged 1,151% in late 2025 as generative AI fuels deepfake impersonation and identity fraud.
Flux result 12f8aff4 dbb2 4670 b3c6 a89d32ca8e99

Microsoft 365 EvilToken campaign hits hundreds daily

Last week
#
mfa
#
cloud security
#
phishing
Microsoft warns that 10 to 15 EvilToken phishing runs are launched daily, compromising hundreds of organisations through OAuth token abuse.
Flux result abba1b50 2e28 4da7 948f 82ddc12126b8

Orange Business adds deepfake detection to services

This month
#
uc
#
cx
#
phishing
Orange Business to weave Reality Defender's deepfake checks into enterprise communications for 7,000 customers amid rising fraud fears.
Rohit ghai

Barracuda overhauls BarracudaONE & partner programme

Last month
#
firewalls
#
data protection
#
network security
Barracuda adds Google Workspace email protection, SecureEdge Access and AI security to BarracudaONE while unifying its global partner programme.
Enterprise soc monitoring unified security shield email cloud onprem ai

Proofpoint unifies email & AI data security platform

Last month
#
data protection
#
hybrid cloud
#
digital transformation
Proofpoint unveils unified platform to secure email and govern AI data access, extending visibility across cloud and on-premises environments.
Editorial illustration corporate criminal network ops map servers

HPE Threat Labs spot industrialised cybercrime surge

Last month
#
malware
#
firewalls
#
vpns
HPE Threat Labs warns cybercrime now runs like big business, as AI-fuelled, industrial-scale attacks hammer government and finance.
Global cities cyber attacks fragile chains cracked data shards

Kroll warns of widening gap in global cyber resilience

Last month
#
dr
#
devops
#
digital transformation
Kroll warns boards are overestimating cyber resilience as attacks cost firms an average USD $2.2 million a year and response plans lag reality.
Dns web shields cutting malicious red nodes early cybercrime stop

Netcraft tool targets malicious domains before attacks

Last month
#
phishing
#
advanced persistent threat protection
#
email security
Netcraft unveils Preemptive Domain Disruption to knock out attacker domains in their dormant phase before phishing and BEC scams launch.
Office worker ai email security green calm vs red phishing streams

Abnormal AI rolls out Attune 1.0 to fight AI cyberattacks

Last month
#
uc
#
phishing
#
advanced persistent threat protection
Abnormal AI launches Attune 1.0, a behavioural model that spots AI-crafted cyberattacks by learning normal workplace communication patterns.
Corporate soc email security analysts unified cloud phishing bec

VIPRE email security integrates with Microsoft Defender

Last month
#
cloud security
#
phishing
#
advanced persistent threat protection
VIPRE links its Integrated Email Security with Microsoft Defender, unifying phishing and BEC detections in a single Defender console view.
Ai cyberattack shadow figure robotscreens red alarm extortion

AI agents drive surge in cyber threats & extortion

Last month
#
malware
#
data protection
#
ransomware
AI agents are fuelling a new wave of cyber risk, as criminals weaponise automation to speed up ransomware and sharpen extortion tactics.
Moody cloud padlock human silhouettes identity theft pixels

Cloud identity compromise now drives most cyber attacks

Last month
#
malware
#
uc
#
firewalls
Cloud identity compromise now drives over 80% of cyber incidents, as attackers increasingly abuse trusted accounts and workplace tools.
Hooded hacker in dim middle east government office night scene

Conflict sparks surge in Middle East cyber espionage

Last month
#
phishing
#
email security
#
cybersecurity
New research links Iran conflict to a swift surge in tightly targeted cyber espionage across Middle Eastern governments and embassies.
Cinematic laptop deepfake face binary code broken locks quantum ai

IBM warns AI & quantum threats will reshape cybercrime

Last month
#
malware
#
data protection
#
ransomware
IBM warns shadow AI, deepfakes and quantum threats will reshape cyber risk by 2026, as autonomous agents speed breaches and ransomware.
Dark binary figure cuffed cloud breach phishing mfa takedown

Tycoon 2FA phishing service disrupted in major sting

Last month
#
ransomware
#
mfa
#
crypto
Police and tech firms have dismantled Tycoon 2FA, a phishing service used to bypass MFA and hijack cloud accounts at industrial scale.
Corporate worker inbox overwhelmed by similar suspicious emails

Dell email mixes payment-style header with promos

Last month
#
malware
#
network infrastructure
#
cx
Dell draws scrutiny after a promo email mimics a payment remittance notice, blurring lines between marketing, transactions and phishing risks.
Dark cyber fraud desk with shields and law enforcement servers

Microsoft & Europol disrupt global Tycoon 2FA scam

Last month
#
ransomware
#
mfa
#
crypto
Microsoft and Europol have seized over 300 domains to disrupt Tycoon 2FA, a vast phishing-for-hire service bypassing MFA worldwide.
Nighttime cybersecurity ops center email alerts ai shield scene

IRONSCALES adds AI agents to counter next‑gen phishing

Last month
#
uc
#
data protection
#
cloud security
IRONSCALES' Winter 2026 Release debuts three AI agents, outbound encryption and Teams deepfake defences to counter next‑gen phishing.