SecurityBrief India - Technology news for CISOs & cybersecurity decision-makers

Social Engineering stories - Page 2

Dark server room ai cyber attack red network path spreading

AI-driven cyber attacks now breach networks in minutes

Last week
#
malware
#
firewalls
#
ransomware
AI-fuelled hackers can now spread across corporate networks in as little as four minutes, outpacing human defenders by hours.
Cyber resilience office night glowing threat waves locked shield

AI reshapes cyber risk, N-able urges resilience shift

Last week
#
data protection
#
dr
#
digital transformation
AI-fuelled cyber threats are outpacing reactive defences, N-able warns, urging smaller firms to prioritise resilience over traditional security.
Knowbe4  1

KnowBe4 strengthens APJ sales team for human risk push

Last week
#
data protection
#
digital transformation
#
cloud security
KnowBe4 boosts APJ cyber sales leadership with four senior hires to drive human and AI risk management growth across the region.
Dark control room ai ransomware cloud cyberattack red lock scene

AI-driven cyber threats grow as breakouts accelerate

Last week
#
virtualisation
#
ransomware
#
cloud security
AI-fuelled ransomware, rapid cloud intrusions and identity abuse are transforming cyber risk, slashing response times for defenders.
Cio nighttime office ai cyber attack warning screens digital storm

CIOs brace for AI-led cyber attacks but feel unready

Last week
#
digital transformation
#
cloud security
#
phishing
Most CIOs expect AI-driven cyber attacks within a year, but only a third feel prepared, exposing a widening gap in cyber resilience.
Uk online shop secure checkout cybersecurity shield circuit lock

Ecommpay issues free guide to combat rising eCommerce fraud

Last week
#
mfa
#
fintech
#
cx
Ecommpay launches a free fraud guide for online retailers as UK payment fraud hits GBP £1.17 billion and AI-driven scams rapidly escalate.
Office security analyst monitoring automated phishing training scene

KnowBe4 unveils AI tool for autonomous phishing training

Last week
#
digital transformation
#
phishing
#
email security
KnowBe4 launches AIDA Orchestration, an autonomous AI system that tailors always-on phishing tests and training to each employee's risk profile.
It security pro inserting hardware key laptop phishing protection

Yubico unveils YubiNation Partners identity channel push

Last week
#
mfa
#
phishing
#
partner programmes
Yubico launches YubiNation partner tiers and expanded training to boost phishing-resistant identity security amid rising breach costs.
Mac laptop fake installer shadowy hands data theft crypto malware

Hijacked Google Ads push MacSync malware to Mac users

Last week
#
storage
#
phishing
#
email security
Hijacked Google Ads accounts are serving bogus installers that trick Mac users into running MacSync stealer via fake Evernote guides.
Ciso hesitates at glowing deploy button in ai cyber soc

CISOs cautious as agentic AI adoption in security lags

Last week
#
firewalls
#
data protection
#
manufacturing
CISOs slow-roll agentic AI in defence, even as they brace for more advanced, AI-boosted attacks and rising personal liability risks.
Ai cyber attack glowing digital skull binary storm cloud network

AI-fuelled cyber attacks hit in minutes, warns CrowdStrike

Last week
#
saas
#
ransomware
#
cloud security
AI is fuelling a surge in cyber attacks, with CrowdStrike warning criminals now move from breach to lateral movement in under 30 minutes.
Story 299483

Android PromptSpy malware harnesses Gemini for stealth

Last month
#
endpoint protection
#
mdm
#
phishing
PromptSpy Android malware taps Google's Gemini AI to navigate screens, lock itself in recent apps and thwart users' attempts to remove it.
Global ransomware lock ai phishing spreading across nations

AI-driven phishing surge as Acronis warns MSPs at risk

Last month
#
malware
#
ransomware
#
cloud security
Acronis warns AI is turbocharging phishing, email attacks and ransomware in 2025, with MSPs and collaboration tools under rising fire.
African cybercrime taskforce in dim ops room with seized devices

INTERPOL cybercrime sweep in Africa recovers USD $4.3m

Last month
#
firewalls
#
network security
#
phishing
INTERPOL's Africa cybercrime blitz nets 651 arrests, seizes 2,341 devices and recovers USD $4.3m after scams linked to USD $45m losses.
Singapore skyline dusk cloud datacenters ai security network

EY maps hyper-velocity AI priorities for tech during 2026

Last month
#
devops
#
digital transformation
#
phishing
EY urges tech leaders to pursue AI-fuelled deals, agentic systems and sovereignty-by-design as 2026 competition and security pressures grow.
Morgan headshots 56

KnowBe4 appoints Kelly Morgan as Chief Customer Officer

Last month
#
cloud security
#
cx
#
phishing
KnowBe4 appoints former DocuSign executive Kelly Morgan as chief customer officer to steer global client strategy amid rising AI security risks.
Smartphone face scan with concentric shields anti deepfake security

3DiVi sets four-layer defence for face authentication

Last month
#
data protection
#
devops
#
surveillance
3DiVi unveils four-layer defence model to harden face authentication against deepfakes and spoofing as remote ID checks surge globally.
Internal auditors anxious over ai driven fraud in dark office

Internal auditors fear AI fraud but lack readiness

Last month
#
data analytics
#
digital transformation
#
fintech
Internal auditors warn AI-driven fraud is surging, but most concede they lack the tools, skills and time needed to spot it effectively.
Office worker ai phishing notifications shadowy hands illustration

AI-driven phishing surge dominates 2025 cyberattacks

Last month
#
malware
#
ransomware
#
digital transformation
AI-powered phishing drives a sharp 2025 surge in email and chat attacks, as Acronis warns of a new era of automated cybercrime at scale.
Oil refinery renewables control room power loss venting steam dusk tension

OT cyber threats shift from spying to disruption in 2025

Last month
#
ransomware
#
iot security
#
advanced persistent threat protection
Cyber attacks on industrial systems in 2025 shifted from quiet spying to coordinated operations aiming to disrupt critical infrastructure.