DataCenterNews US - Specialist news for cloud & data center decision-makers

Cyber espionage stories - Page 2

Office worker phishing qr code lock icon cloud account attack

Proofpoint warns of surge in Microsoft device code phishing

Thu, 8th Jan 2026
#
edutech
#
mfa
#
cloud security
Proofpoint flags a sharp rise in Microsoft 365 account takeovers via device code phishing, hitting firms from finance to government.
Covert cyber espionage software download bug warning china russia

Chinese hackers fake Teams downloads in false flag ploy

Thu, 18th Dec 2025
#
malware
#
uc
#
martech
Chinese state-backed hackers mimic Microsoft Teams downloads in a false flag campaign to infect Chinese speakers and blame Russian actors.
Ciso boardroom ai cyber threats glowing screens city night

CISOs face rising scrutiny as AI escalates cyber risk

Wed, 17th Dec 2025
#
malware
#
data protection
#
dr
CISOs are warned 2026 will bring harsher board scrutiny, AI-fuelled attacks, bigger budgets - and far less tolerance for cyber failure.
Night cyber ops room ai testing monitors threat alerts vigilance

AI-native attacks drive shift to continuous cyber tests

Fri, 12th Dec 2025
#
devops
#
biometrics
#
socs
AI-native cyber attacks and synthetic IDs are forcing firms to shift from periodic checks to continuous, AI-driven security testing by 2026.
Shield emblem cloud server network icons blocking malware symbols

CrowdStrike hits 100% in latest MITRE ATT&CK tests

Thu, 11th Dec 2025
#
firewalls
#
ransomware
#
endpoint protection
CrowdStrike's Falcon platform scores 100% detection and protection with zero false positives in MITRE ATT&CK's toughest cloud-era tests.
Secure enterprise network shield servers laptops cloud threat detection

CrowdStrike hits 100% in latest MITRE cross-domain tests

Thu, 11th Dec 2025
#
data protection
#
endpoint protection
#
devops
CrowdStrike's Falcon platform scores 100% detection and protection with no false positives in MITRE's toughest cross-domain ATT&CK tests yet.
Us corporate cyber control room incident response dashboard

Cyber leaders tip 2026 shift to resilience over prevention

Tue, 9th Dec 2025
#
firewalls
#
dr
#
ransomware
Cyber chiefs predict 2026 cyber budgets will pivot from prevention and box-ticking to rapid response, recovery and demonstrable resilience.
Magnifying glass examining network hidden ai systems discovered security

SandboxAQ tool boosts AI security by tracking hidden systems

Fri, 5th Dec 2025
#
ai security
#
risk & compliance
#
ai
SandboxAQ launches AQtive Guard AI-SPM to help firms track hidden AI use and tackle security risks from unmonitored 'shadow AI' deployments.
Digital padlock quantum waves circuit board urgent digital protection

Quantum threats to drive overhaul of cybersecurity by 2026

Sat, 22nd Nov 2025
#
malware
#
advanced persistent threat protection
#
quantum computing
Quantum cyber threats force organisations to urgently adopt post-quantum cryptography and strengthen critical infrastructure defences by 2026.
Dark server room network cables shadowy guards digital locks cybercrime security threats hosting

US, UK & Australia sanction Russian host over ransomware links

Fri, 21st Nov 2025
#
ransomware
#
physical security
#
e-commerce
The US, UK and Australia have sanctioned Russian web-host Media Land and its leaders for aiding ransomware attacks via bulletproof hosting services.
Shadowy figure computer digital network lines abstract data streams cyber espionage security threats

Anthropic identifies AI-driven cyber-espionage campaign

Sat, 15th Nov 2025
#
firewalls
#
network security
#
advanced persistent threat protection
A China-linked group launched a major AI-driven cyber-espionage campaign targeting global firms, performing 80-90% of hacking with minimal human input.
Photorealistic hooded figure at computer with floating digital locks warnings cybercrime

AI & ransomware reshape cyber threat landscape, report finds

Thu, 13th Nov 2025
#
malware
#
ransomware
#
phishing
Rapid7's report reveals cyber threats evolving with AI-powered phishing, rising ransomware alliances, and faster exploitation of vulnerabilities worldwide.
Shadowy figure computer digital symbols phishing hooks us iran cyber espionage

Iran-linked cyber spies blend tactics to target US policy experts

Mon, 10th Nov 2025
#
phishing
#
advanced persistent threat protection
#
email security
Iran-linked cyber spies have combined tactics from multiple hacking groups in a new phishing campaign targeting US experts on Iranian politics and the IRGC.
Illustration computer server virtual machines shadowy malware network wires secure data center

Curly COMrades abuse Hyper-V for covert malware operations in VMs

Wed, 5th Nov 2025
#
malware
#
virtualisation
#
firewalls
Curly COMrades exploit Microsoft Hyper-V to run hidden malware inside lightweight VMs, evading detection and maintaining stealthy control over targets.
Metallic padlock targeted by digital waves quantum patterns glowing data network

Rapid7 reveals global findings in latest cyber-threat report

Wed, 29th Oct 2025
#
ransomware
#
encryption
#
phishing
Rapid7 warns AI and quantum computing will escalate cyber threats, urging firms to adopt advanced defences and post-quantum cryptography amid rising hybrid attacks.
Hooded hacker dark room multiple screens blockchain code cyberattack

North Korean group uses blockchain to launch advanced malware

Fri, 17th Oct 2025
#
malware
#
crypto
#
blockchain
A North Korean group has used blockchain-based EtherHiding to secretly deploy malware, targeting developers in tech and cryptocurrency sectors worldwide.
Cyber espionage dark room shadowy figures computer screens us china flags

Chinese cyber group targets US policy bodies during trade talks

Thu, 18th Sep 2025
#
phishing
#
advanced persistent threat protection
#
email security
A Chinese cyber group has targeted US government and policy organisations with spearphishing attacks amid trade talks, using advanced tactics to gain persistent access.
Computer screen exposed folders files shadowy hands data breach unauthorized access

Salesloft data breach exposes 700 firms' details via OAuth attack

Wed, 10th Sep 2025
#
firewalls
#
data protection
#
phishing
Salesloft breach exposed sensitive data of 700+ firms, including Cloudflare and Palo Alto Networks, after hackers exploited OAuth tokens via a prolonged GitHub intrusion.
Cloud servers interconnected security breach red glowing server business office

Salesforce data theft campaign exposes SaaS integration risks

Thu, 28th Aug 2025
#
mfa
#
cloud security
#
martech
State-sponsored hackers have stolen OAuth2 tokens from Salesforce integrations, compromising hundreds of organisations and exposing risks in SaaS connectivity.
Digital illustration cyberattack dark storm clouds over cityscape infrastructure

Cyberattacks reshape modern conflict & highlight resilience needs

Tue, 29th Jul 2025
#
ransomware
#
software updates
#
cyber attacks
Recent cyberattacks on infrastructure and healthcare reveal a new digital battleground, prompting global efforts to strengthen cyber resilience and defence.