ChannelLife New Zealand - Industry insider news for technology resellers

Incident Response stories - Page 12

Aerial modern data center wellington nz green hills coast

LogicMonitor boosts New Zealand push with local data hub

Last month
#
devops
#
hybrid cloud
#
digital transformation
LogicMonitor will open its first New Zealand data centre and expand local partners to support rising cloud, AI and hybrid IT demand.
Email attachment20260310 3627626 ueyz2f

'Shadow AI' misuse emerges as key cyber threat in NZ

Last month
#
data protection
#
ransomware
#
digital transformation
'Shadow AI' misuse by staff has surged as a top cyber threat for New Zealand firms, fuelling rising losses and extortion pressures.
Enterprise it control room secure data portal to ai brain streams

Datadog unveils MCP Server for governed AI observability

Last month
#
devops
#
siem
#
digital transformation
Datadog launches an MCP Server to give AI agents governed, real-time access to observability data across live development and operations.
Sydney waterfront tech conference ai observability evening view

Grafana brings ObservabilityCON to Sydney amid AI boom

Last month
#
virtualisation
#
devops
#
hybrid cloud
Grafana brings ObservabilityCON to Sydney as APAC engineers tackle soaring AI complexity, tool sprawl and rising telemetry costs.
Dim corporate server room flashing red lights cracked shield vulnerability

Google warns of surge in enterprise zero-day attacks

Last month
#
virtualisation
#
firewalls
#
vpns
Google warns attackers are shifting from browsers to corporate systems, as tracked zero-day exploits climb and enterprise edge devices surge.
Dark binary figure cuffed cloud breach phishing mfa takedown

Tycoon 2FA phishing service disrupted in major sting

Last month
#
ransomware
#
mfa
#
crypto
Police and tech firms have dismantled Tycoon 2FA, a phishing service used to bypass MFA and hijack cloud accounts at industrial scale.
Modern corporate soc room screens network diagrams digital shield

Tufin unveils AI assistants & executive security hub

Last month
#
firewalls
#
hybrid cloud
#
data analytics
Tufin rolls out four AI assistants and a customisable executive hub to speed network security rule searches, access changes and risk insight.
Moody server room supply chain breach glowing red lock icon

ShinyHunters claims Woflow breach in supply chain hack

Last month
#
data protection
#
ransomware
#
mfa
ShinyHunters claims it hacked merchant data firm Woflow, raising supply chain fears for major brands despite no confirmed breach yet.
Andy fielder cto at metacompliance

A resilient security culture is built in the flow of work, not the classroom

Last month
#
data protection
#
digital transformation
#
phishing
Rising UK cyber attacks show training alone is failing; firms must embed behavioural security cues into daily work to cut human risk.
Secure cloud shield dlp ai security risk managed genai workloads

Forcepoint adds ARIA AI assistant to Data Security Cloud

Last month
#
data protection
#
endpoint protection
#
hybrid cloud
Forcepoint adds ARIA AI assistant and a faster endpoint agent to Data Security Cloud to tighten policy control for generative AI workloads.
Overworked sysadmin hybrid it sprawl tangled cables dark monitors

Structural stress rises for sysadmins in hybrid IT era

Last month
#
devops
#
digital transformation
#
it automation
Hybrid IT sprawl is driving “structural stress” for sysadmins as security risks rise, responsibilities grow and control over tools shrinks.
Massive cloud shield over office and datacenter network security

Cato unveils Dynamic Prevention engine for SASE security

Last month
#
firewalls
#
digital transformation
#
hyperscale
Cato launches Dynamic Prevention, a SASE-native engine that auto-detects multi-stage attacks by correlating months of security telemetry.
Worried office worker old phone shadow hacker corporate network

Coruna exploit kit exposes risks for outdated iOS users

Last month
#
endpoint protection
#
pam
#
mfa
New Coruna exploit kit shows outdated iOS devices face automated, scalable attacks that can turn compromised phones into corporate gateways.
Dev team monitoring code pipelines with app security scanning

Archipelo, Checkmarx tie dev context to app security

Last month
#
devops
#
application security
#
devsecops
Archipelo and Checkmarx partner to fuse dev workflow signals with app security scans, giving teams origin evidence to prioritise fixes.
Heather mahalik  1

Why women can be leaders when it comes to AI

Last month
#
data protection
#
ransomware
#
digital transformation
Women in cybersecurity, long trained to question and validate, are uniquely placed to lead the era of risky, fast‑moving AI tools.
Pro vs newbie socs side by side network diagrams cinematic lighting

Agentic AI boosts elite cyber teams but hinders rookies

Last month
#
devops
#
socs
#
apm
Agentic AI massively accelerates elite cyber teams but can slow inexperienced hackers, Hack The Box's large-scale benchmark reveals.
Japan factory night ransomware attack shadow figure network

Ransomware attacks surge 50% as industrial firms hit hardest

Last month
#
malware
#
data protection
#
ransomware
Global ransomware attacks jump 50% to 7,874 in 2025, with industrial firms bearing the brunt as criminal groups reshuffle their tactics.
Conifers doron bachar and elad hoffer larger(2)

Conifers hires AI leaders to scale CognitiveSOC growth

Last month
#
advanced persistent threat protection
#
socs
#
llms
Conifers adds senior AI leaders Doron Bachar and Elad Hoffer to accelerate CognitiveSOC development and scale its agentic AI SOC platform.
Msp office night glowing server chains masked hackers apac eu

MSPs warned as cyber criminals weaponise trusted access

Last month
#
firewalls
#
dr
#
ransomware
Cyber criminals are hijacking MSP trust relationships, abusing valid credentials and VPNs as AI turbocharges phishing and ransomware.
It sec ops room analysts lock network and jira style board view

Keeper connects Jira workflows with privileged access

Last month
#
siem
#
digital transformation
#
pam
Keeper launches native Jira integrations to tie security incident workflows directly to privileged access approvals while retaining zero-knowledge controls.