eCommerceNews UK - Technology news for digital commerce decision-makers

Incident Response stories - Page 5

Moody european office ai robot cyberattack broken network cables

AI-first firms face slower cyber recovery & higher costs

Last month
#
firewalls
#
ddos
#
data protection
AI-first firms take months longer to recover from cyber attacks and face sharply higher breach and scraping costs, Fastly research warns.
Moody businessperson faces split deepfake screen ai security threats

AI tops data security worries as identity risks surge

Last month
#
data protection
#
digital transformation
#
encryption
AI has become firms' top data security fear as identity and deepfake threats surge, exposing gaps in visibility, encryption and governance.
Dim office ransomware laptop chat bubbles qr codes masked figures

Ransomware attacks dip but NCC warns threat evolving

Last month
#
data protection
#
ransomware
#
iot security
Global ransomware attacks fell 17% in January, but NCC warns evolving tactics, AI and messaging apps mean risk is not receding.
Smartphone suspicious call laptop fake login deceptive subdomain scene

ShinyHunters pivots to subdomain phishing & vishing

Last month
#
saas
#
mfa
#
cloud security
ShinyHunters shifts to subdomain-brand phishing and vishing on mobiles, bypassing domain checks to hijack SSO logins and SaaS sessions.
Interlocking puzzle pieces over laptop global saas communication

Sinch & Lovable ally to embed comms in AI software

Last month
#
saas
#
devops
#
digital transformation
Sinch partners with Lovable to embed global messaging, email and voice into its AI build platform, starting with Mailgun-powered email.
Email attachment20260227 2568527 6qbah6

Saviynt adds Amazon Q AI tools to boost identity risk

Last month
#
hybrid cloud
#
digital transformation
#
hyperscale
Saviynt taps Amazon Q to add conversational AI and deeper cross-app risk context, helping identity teams automate investigations and fixes.
Dr. ren%c3%a9e burton infoblox 1

Phishing campaigns exploit .arpa DNS to evade filters

Last month
#
firewalls
#
network security
#
phishing
Phishing gangs exploit obscure .arpa DNS space and IPv6 tunnels to sneak past reputation-based web filters and lure users to fake sites.
Ai cyber attack hourglass binary lock cloud night office scene

AI-fuelled cyber attacks now steal data in 72 minutes

Last month
#
firewalls
#
pam
#
cloud security
AI-driven hackers can now steal data in just 72 minutes, as faster, multi-surface attacks overwhelm complex, over-trusting enterprises.
Modern office it admin managing app integrations workflow automation

Anthropic boosts Claude Cowork with new plugins, admin tools

Last month
#
saas
#
devops
#
digital transformation
Anthropic upgrades Claude Cowork with private plugin marketplaces, richer admin controls and Office-linked workflows for enterprise teams.
Mark

Splashtop links endpoint management with CrowdStrike

Last month
#
ai security
#
edr
#
security operations
Splashtop has integrated its Autonomous Endpoint Management with CrowdStrike Falcon, unifying Windows endpoint status for IT and security teams.
Modern cybersecurity ops center team monitoring breach risks

MetaCompliance links breach data to staff risk training

Last month
#
digital transformation
#
phishing
#
soc
MetaCompliance adds Exposure Monitoring to tie confirmed breach data to automated staff training and human risk scoring for security teams.
Global logistics cyber attack shadowy hacker network map art

Russian phishing service targets freight & logistics

Last month
#
mfa
#
crypto
#
advanced persistent threat protection
Russian-run Diesel Vortex phishing service raided freight and logistics portals in the US and Europe, stealing over 1,600 login credentials.
Ai sovereignty secure datacenter on bedrock shield circuitry

No compromise: Designing AI operations for sovereignty and reliability

Last month
#
data protection
#
private cloud
#
hybrid cloud
IT leaders are racing to redesign AI operations so sovereignty, data residency and reliability can coexist under tightening global rules.
Dark server room ai cyber attack red network path spreading

AI-driven cyber attacks now breach networks in minutes

Last month
#
malware
#
firewalls
#
ransomware
AI-fuelled hackers can now spread across corporate networks in as little as four minutes, outpacing human defenders by hours.
Uk map cybersecurity partners secure network office icons

Zero Networks adopts channel-first model to grow UK partners

Last month
#
firewalls
#
network security
#
mfa
Zero Networks shifts to a 100% channel-first model and revamps its Zero to Sixty programme to accelerate UK partner growth in cybersecurity.
It ops control room root cause analysis cloud alert dashboard

ManageEngine adds causal AI to boost Site24x7 AIOps

Last month
#
devops
#
hybrid cloud
#
rpa
ManageEngine injects causal and autonomous AI into Site24x7 to cut alert noise, speed root-cause analysis and automate incident remediation.
Cyber resilience office night glowing threat waves locked shield

AI reshapes cyber risk, N-able urges resilience shift

Last month
#
data protection
#
dr
#
digital transformation
AI-fuelled cyber threats are outpacing reactive defences, N-able warns, urging smaller firms to prioritise resilience over traditional security.
Telecom server room dragon shadow sliced by cyber shield

Google disrupts China-linked cyber espionage on telecoms

Last month
#
malware
#
firewalls
#
data protection
Google says it has crippled a China-linked cyber espionage group accused of hacking telecoms and governments in at least 42 countries.
Enterprise datacenter cybersecurity cloud backup ransomware recovery

Commvault, CrowdStrike link backups to Falcon SIEM

Last month
#
malware
#
data protection
#
dr
Commvault deepens CrowdStrike tie-up with two-way link between backup telemetry and Falcon Next-Gen SIEM to speed trusted cyber recoveries.
Dark control room ai ransomware cloud cyberattack red lock scene

AI-driven cyber threats grow as breakouts accelerate

Last month
#
virtualisation
#
ransomware
#
cloud security
AI-fuelled ransomware, rapid cloud intrusions and identity abuse are transforming cyber risk, slashing response times for defenders.