SecurityBrief India - Technology news for CISOs & cybersecurity decision-makers

Infosec stories - Page 23

Cyderes

Cyderes names Lana Knop Chief Product Officer for AI push

Sat, 24th Jan 2026
#
saas
#
siem
#
digital transformation
Cyderes appoints Lana Knop as Chief Product Officer to steer post‑Lucidum product strategy and drive a new wave of AI‑powered security services.
Cinematic us soc ai brain highlighting critical network threats

Check Point unveils AI-ready continuous exposure management

Sat, 24th Jan 2026
#
firewalls
#
network security
#
cloud security
Check Point launches AI-ready Exposure Management to plug remediation gaps, unifying threat intelligence, prioritisation and automated fixes.
Image

SonicWall pushes unified automation for faster cyber defence

Fri, 23rd Jan 2026
#
malware
#
firewalls
#
ransomware
SonicWall launches unified automation tools to cut alert fatigue, speed cyber threat remediation and streamline overstretched security teams.
Moody office worker phishing remote access cursor corporate net

Phishing campaign exploits RMM tools for stealthy access

Fri, 23rd Jan 2026
#
firewalls
#
network security
#
phishing
Phishing campaign uses stolen logins and trusted RMM tools like GoTo Resolve and LogMeIn to quietly maintain access to corporate systems.
Secure hybrid cloud identity protection rapid enterprise recovery

Cohesity boosts identity resilience for hybrid AD, Entra

Fri, 23rd Jan 2026
#
data protection
#
dr
#
ransomware
Cohesity has expanded its Identity Resilience tools to detect, block and rapidly undo attacks on hybrid Active Directory and Entra ID.
Nighttime corporate office saas breach server alerts costs

AppOmni study pegs average SaaS breach at USD $1.365m

Fri, 23rd Jan 2026
#
saas
#
digital transformation
#
cloud security
AppOmni study finds average SaaS breach costs USD $1.365m, as customers report big time savings, fewer audit issues and faster detection.
Cinematic financial data center cloud security encryption control

Data Privacy Day spotlight on control, resilience, design

Fri, 23rd Jan 2026
#
data protection
#
dr
#
ransomware
Data Privacy Day shifts focus from policy to proof, as firms embed control, resilience and design into complex hybrid data estates.
Vincent hwang

AI surge exposes cloud security gaps, report warns

Fri, 23rd Jan 2026
#
saas
#
firewalls
#
data protection
New global survey warns a widening 'complexity gap' leaves AI-driven, multi-cloud environments outpacing organisations' security defences.
Cloud computing classroom open padlocks security risk training

Misconfigured cloud training labs open paths to attacks

Fri, 23rd Jan 2026
#
firewalls
#
hyperscale
#
cloud security
Misconfigured cloud training labs on AWS, Google Cloud and Azure expose major firms to live attacks via overly permissive access roles.
Andy thomas kynd lrg(2)

KYND: big firms leave critical cyber flaws unpatched

Thu, 22nd Jan 2026
#
malware
#
application security
#
cybersecurity
Major firms are leaving known, actively exploited cyber flaws unpatched for six months or more, sharply heightening breach risks.
Anxious worker crowded inbox suspicious job offers data risk

Bitdefender warns of surge in fake job recruitment scams

Thu, 22nd Jan 2026
#
malware
#
uc
#
data protection
Bitdefender warns of a global surge in fake job emails posing as Amazon, Carrefour and the NHS, stealing data, money and account logins.
Modern soc security ops centre wall displays endpoint monitoring

CrowdStrike study touts 273% ROI on modern endpoint security

Thu, 22nd Jan 2026
#
endpoint protection
#
digital transformation
#
cloud security
CrowdStrike cites a Forrester study claiming 273% ROI and USD $5m in three-year benefits from consolidating legacy endpoint security.
Modern soc security ops center mdr unified cloud monitoring hd

Rapid7 unveils MDR service built for Microsoft users

Thu, 22nd Jan 2026
#
siem
#
cloud security
#
socs
Rapid7 has launched a Microsoft-focused MDR service that fuses Defender telemetry with its SIEM and global SOC for unified threat response.
Yochai corem  2

Check Point unveils AI-ready Exposure Management suite

Thu, 22nd Jan 2026
#
firewalls
#
network security
#
cloud security
Check Point launches AI-ready Exposure Management suite to close remediation gaps as organisations leave half of known vulnerabilities unpatched.
Modern corporate soc room analysts monitoring future 2028 security

Gartner: half of firms adopt zero-trust data by 2028

Thu, 22nd Jan 2026
#
data analytics
#
ai security
#
risk & compliance
Gartner predicts half of organisations will adopt zero-trust data governance by 2028 as synthetic AI content undermines traditional data trust.
Stormy tangled server cloudscape it team data leaks high contrast

Cloud security skills gap widens as AI adoption surges

Thu, 22nd Jan 2026
#
saas
#
firewalls
#
data protection
AI-fuelled cloud adoption is outpacing security teams, with Fortinet warning a widening 'complexity gap' leaves hybrid estates exposed.
Isometric german data center secure network shield infrastructure

Deutsche Telekom boosts API security with Akamai deal

Thu, 22nd Jan 2026
#
cloud security
#
risk & compliance
#
zero trust security
Deutsche Telekom Security taps Akamai's certified service scheme to bolster API defences and microsegmentation for high‑risk sectors.
Office pc social network warning suspicious file download cursor

LinkedIn DMs abused to spread Python-based malware

Wed, 21st Jan 2026
#
firewalls
#
endpoint protection
#
devops
Attackers are abusing LinkedIn private messages to deliver Python-based malware via booby-trapped archives, ReliaQuest has warned.
Modern gpu data center with runtime protection shield layers

Check Point targets securing AI factories at runtime

Wed, 21st Jan 2026
#
firewalls
#
hyperscale
#
network security
Check Point sets out a runtime security blueprint for AI factories as enterprises scale GPU-heavy data centres and face mounting GenAI attacks.
Moody robot head hacked by hands glowing cables dark tech lab

Attackers target AI agents with prompt & tool hacks

Wed, 21st Jan 2026
#
application security
#
advanced persistent threat protection
#
rpa
Attackers are already exploiting AI agents, extracting hidden prompts, bypassing safety checks and abusing tools tied to data and systems.