TelcoNews US - Telecommunications news for ICT decision-makers

Data exfiltration stories

Prasad

Why the next endpoint and SASE disruption will not come from a security vendor

Yesterday
#
firewalls
#
digital transformation
#
network security
AI-native agents could quietly upend endpoint and SASE, eroding incumbents' telemetry moats as control shifts to the AI interaction layer.
Secure cloud shield dlp ai security risk managed genai workloads

Forcepoint adds ARIA AI assistant to Data Security Cloud

Last week
#
data protection
#
endpoint protection
#
hybrid cloud
Forcepoint adds ARIA AI assistant and a faster endpoint agent to Data Security Cloud to tighten policy control for generative AI workloads.
Overwhelmed security analyst shadowy cyber threats night office

AI cyber threats outpace staff readiness, report warns

Last week
#
firewalls
#
data protection
#
digital transformation
Attackers' AI use is surging faster than staff skills, Fortinet warns, leaving firms exposed despite rising security awareness spending.
Overhead office ai tools data streams with glowing security shield

Teramind launches AI governance to tackle shadow AI

Last week
#
firewalls
#
digital transformation
#
network security
Teramind has unveiled an AI governance platform to monitor workplace AI tools and shadow agents, aiming to curb hidden data and security risks.
Hooded cyber figure identity attack breached accounts blue tones

Identity attacks dominate Expel's 2026 threat report

Last week
#
malware
#
endpoint protection
#
mfa
Identity-based attacks drove nearly 70% of incidents in Expel's 2026 threat report, exposing gaps between basic controls and real-world defence.
Secure server room ai agents access rings locked and revoked scene

SentinelOne unveils identity tools for human & AI use

Last week
#
data protection
#
pam
#
cloud security
SentinelOne launches identity tools to monitor and revoke access for human users and fast-moving AI agents beyond initial authentication.
Ransomware threat dark server room to critical infrastructure art

NCC warns ransomware risk persists despite January dip

Last month
#
ransomware
#
manufacturing
#
digital transformation
Ransomware cases dipped 17% in January, but NCC warns the threat remains high as Qilin targets critical sectors and tactics evolve.
Story 300075

OpenClaw AI assistant surge sparks major security fears

Last month
#
malware
#
phishing
#
application security
A rapid surge in OpenClaw AI assistant use has left tens of thousands of exposed systems and a trail of hijacked tools and malicious add-ons.
Ai cyber attack hourglass binary lock cloud night office scene

AI-fuelled cyber attacks now steal data in 72 minutes

Last month
#
firewalls
#
pam
#
cloud security
AI-driven hackers can now steal data in just 72 minutes, as faster, multi-surface attacks overwhelm complex, over-trusting enterprises.
Dark server room ai cyber attack red network path spreading

AI-driven cyber attacks now breach networks in minutes

Last month
#
malware
#
firewalls
#
ransomware
AI-fuelled hackers can now spread across corporate networks in as little as four minutes, outpacing human defenders by hours.
Cinematic us china server rack ai data exfiltration illustration

Anthropic accuses Chinese AI labs of illicit Claude copying

Last month
#
data analytics
#
cloud security
#
physical security
Anthropic alleges Chinese labs DeepSeek, Moonshot and MiniMax ran vast illicit campaigns to copy Claude and bypass US export curbs.
Mac laptop fake installer shadowy hands data theft crypto malware

Hijacked Google Ads push MacSync malware to Mac users

Last month
#
storage
#
phishing
#
email security
Hijacked Google Ads accounts are serving bogus installers that trick Mac users into running MacSync stealer via fake Evernote guides.
Moody nighttime office insider copying files digital security shield

Insider risk costs soar as AI reshapes workplace data

Last month
#
data protection
#
endpoint protection
#
pam
Insider risk now costs organisations an average USD $19.5 million a year as AI reshapes data access and employee negligence drives losses.
Ai cyber attack glowing digital skull binary storm cloud network

AI-fuelled cyber attacks hit in minutes, warns CrowdStrike

Last month
#
saas
#
ransomware
#
cloud security
AI is fuelling a surge in cyber attacks, with CrowdStrike warning criminals now move from breach to lateral movement in under 30 minutes.
Global ransomware lock ai phishing spreading across nations

AI-driven phishing surge as Acronis warns MSPs at risk

Last month
#
malware
#
ransomware
#
cloud security
Acronis warns AI is turbocharging phishing, email attacks and ransomware in 2025, with MSPs and collaboration tools under rising fire.
Office worker ai phishing notifications shadowy hands illustration

AI-driven phishing surge dominates 2025 cyberattacks

Last month
#
malware
#
ransomware
#
digital transformation
AI-powered phishing drives a sharp 2025 surge in email and chat attacks, as Acronis warns of a new era of automated cybercrime at scale.
Lockdown mode seo card

OpenAI unveils Lockdown Mode to counter prompt attacks

Last month
#
firewalls
#
data protection
#
network security
OpenAI rolls out Lockdown Mode and new Elevated Risk labels in ChatGPT to curb prompt injection attacks and tighten data safeguards.
Ai governance zero trust secure data center corridor shield

Xiid & Cytex link AI governance with zero trust access

Last month
#
firewalls
#
data protection
#
ransomware
Xiid and Cytex join forces to fuse AI governance with zero trust access, targeting shrinking attack paths and stricter cyber regulation.
Nighttime small office cyberattack screens red warnings global scope

AI-driven ransomware attacks surge, most go unreported

Last month
#
firewalls
#
data protection
#
ransomware
AI-fuelled ransomware hit record levels in 2025, with BlackFog warning that around 86% of attacks worldwide are never publicly disclosed.
Moody remote night home office video call anonymized face north korea cyber map

Okta warns of North Korean fraud in remote tech hiring

Last month
#
data protection
#
ransomware
#
hcm
Okta warns North Korean operatives are landing remote tech jobs with stolen and synthetic identities to fund the regime and enable cyber attacks.