DataCenterNews US - Specialist news for cloud & data center decision-makers

PowerShell stories

Dev night windows11 office ai assistant python coding scene

OpenAI launches Codex desktop app for Windows devs

Yesterday
#
devops
#
digital transformation
#
apm
OpenAI brings its Codex desktop app to Windows, targeting the nearly half of professional developers who use the platform daily.
Server room night encrypted code swirls malware cracked shield

WatchGuard warns of surge in evasive, encrypted malware

Last month
#
malware
#
firewalls
#
ransomware
WatchGuard reports a 1,548% surge in new evasive malware and a 2,000% jump in encrypted threats, straining signature-based defences.
Overwhelmed it control room microsoft automation governance chaos

Governance gaps stall Microsoft automation at scale

Last month
#
digital transformation
#
pam
#
cartech
Governance gaps and tool sprawl are stalling Microsoft automation at scale, with most large IT teams lacking control, visibility and integration.
Cinematic night city cyberattack red windows shattering locks

Fewer ransomware gangs, but more victims in late 2025

Thu, 29th Jan 2026
#
ransomware
#
digital transformation
#
advanced persistent threat protection
Ransomware gangs shrank in number but hit more victims in late 2025, with leak-site postings soaring despite fewer active groups.
Dark server room ransomware attack shadowy hacker hands locks

Storm-0249 hijacks security tools to fuel ransomware

Wed, 7th Jan 2026
#
malware
#
firewalls
#
ransomware
Storm-0249 hijacks trusted security and Windows tools to stealthily broker high-value network access for ransomware operators.
Hybrid cloud windows linux datacenters high availability dr

SIOS unveils LifeKeeper v10 with unified web console

Wed, 7th Jan 2026
#
dr
#
devops
#
hybrid cloud
SIOS launches LifeKeeper v10, adding a unified browser console to simplify high availability and disaster recovery across Linux and Windows.
Covert cyber espionage software download bug warning china russia

Chinese hackers fake Teams downloads in false flag ploy

Thu, 18th Dec 2025
#
malware
#
uc
#
martech
Chinese state-backed hackers mimic Microsoft Teams downloads in a false flag campaign to infect Chinese speakers and blame Russian actors.
Windows laptop shield blocking email malware cloud security

Microsoft patches Windows zero-day & risky Office flaws

Wed, 10th Dec 2025
#
storage
#
dr
#
encryption
Microsoft fixes a Windows zero-day used in attacks and Office flaws that can execute code when emails are merely received or previewed.
Masked hacker breaking into digital network data cloud security breach

Attackers exploit ScreenConnect & Microsoft 365 for breaches

Fri, 5th Dec 2025
#
firewalls
#
ransomware
#
network security
Attackers exploit unpatched ScreenConnect and Microsoft 365 credentials for unauthorised network access, raising breach risks for organisations worldwide.
Modern office workspace people laptops desktops cloud collaboration remote

Parallels RAS 21.0 enhances hybrid cloud & user experience

Sat, 22nd Nov 2025
#
hybrid cloud
#
mfa
#
multi-cloud
Parallels has launched RAS 21.0, enhancing hybrid cloud management, security, and user experience for distributed workforces with multi-cloud support.
Realistic email inbox with magnifying glass revealing hidden malicious code in image attachment phishing

Phishing kits & steganography drive new wave of email threats

Fri, 14th Nov 2025
#
malware
#
data protection
#
phishing
Cybersecurity experts warn of rising email threats as phishing kits Tycoon 2FA and Cephas evolve, using steganography and code obfuscation to evade detection.
Illustration computer server virtual machines shadowy malware network wires secure data center

Curly COMrades abuse Hyper-V for covert malware operations in VMs

Wed, 5th Nov 2025
#
malware
#
virtualisation
#
firewalls
Curly COMrades exploit Microsoft Hyper-V to run hidden malware inside lightweight VMs, evading detection and maintaining stealthy control over targets.
Computer screen hidden malicious code image file digital malware shadowy user

Cyber attackers use images & built-in tools to bypass defences

Mon, 15th Sep 2025
#
malware
#
phishing
#
advanced persistent threat protection
HP Wolf Security reveals cyber attackers increasingly use images and legitimate system tools to hide malware, making threats harder to detect and block.
Shadowy hacker using laptop with ghostly code flowing data escape

Stealerium malware surge prompts concern over new attack tactics

Sat, 6th Sep 2025
#
malware
#
advanced persistent threat protection
#
open source
Cybercriminals are increasingly exploiting open-source Stealerium malware to steal sensitive data, prompting warnings from Proofpoint researchers of new attack methods.
Secure cloud network interconnected data centers cybersecurity compliance

Broadcom strengthens VMware Cloud with advanced compliance & security

Thu, 28th Aug 2025
#
firewalls
#
dr
#
private cloud
Broadcom enhances VMware Cloud Foundation with advanced compliance and security features to aid regulated organisations in tackling AI and cross-border cyber risks.
Hooded figure computer puzzle pieces lock icons cyber threats dark shadows

LevelBlue warns cyber incidents jump as social engineering rises

Thu, 31st Jul 2025
#
firewalls
#
network security
#
mfa
LevelBlue reports cyber incidents tripled to 17% in early 2025, driven by a 1,450% rise in social engineering attacks like fake CAPTCHA schemes.
Digital illustration computer warning signals network cables cloud cyberattack shadowy figure modern office

Critical mcp-remote flaw lets attackers hijack AI client systems

Mon, 14th Jul 2025
#
firewalls
#
network security
#
supply chain
A critical flaw in mcp-remote lets attackers hijack AI client systems by executing arbitrary OS commands, urging users to update to version 0.1.16 immediately.
Human hand reaching for computer mouse shadowy figure manipulating wires cyber threats social engineering

ReliaQuest report exposes rise of social engineering cyber threats

Thu, 19th Jun 2025
#
ransomware
#
phishing
#
advanced persistent threat protection
ReliaQuest reveals surge in social engineering cyber threats, with ClickFix tactics and ransomware group shifts raising new security challenges in 2025.
Hotel receptionist concerned at computer suspicious login fake captcha

ClickFix phishing surge spoofs Booking.com to target hotels

Tue, 10th Jun 2025
#
malware
#
phishing
#
email security
Phishing campaigns spoofing Booking.com have surged, targeting hotels with fake CAPTCHA sites that trick staff into installing malware, research reveals.
Abstract digital shield fragmented data streams warning symbols cybersecurity

Rapid7 Q1 2025 incident response findings

Thu, 5th Jun 2025
#
malware
#
firewalls
#
ransomware
Rapid7's Q1 2025 report reveals stolen credentials without MFA cause 56% of breaches, while manufacturing faces the highest threat from ransomware attacks.