CFOtech Asia logo
Technology news for Asia's CFOs and financial decision-makers

Data breach news stories

Story image
Ransomware
Rapid7 report examines use of double extortion ransomware attacks
New insight into how attackers think when carrying out cyber attacks, along with further analysis of the disclosure layer of double extortion ransomware attacks, has come to light.
Story image
Cybersecurity
What every CISO must answer to enable a best-in-class security operations program
It has been widely reported recently that South Australian government employees have been the victims of a cyberattack.
Story image
Cloud
Sift shares crucial advice for preventing serious ATO breaches
Are you or your business struggling with Account Takeover Fraud (ATO)? One of the latest ebooks from Sift can provide readers with the tools and expertise to help launch them into the new era of account security.
Story image
Cybersecurity
ThoughtLab reveals 10 best practices for cybersecurity in 2022
The benchmarking study reveals best practices that can reduce the probability of a material breach and the time it takes to find and respond to those that happen.
Story image
DDoS
WAF Multi-Vector and DDoS attacks are spiking in Australia
According to a new observation by Akamai, Australia has experienced a massive spike in WAF Multi-Vector and DDoS attacks.
Story image
Cloud
Salesforce resets user passwords as GitHub breach investigation continues
Salesforce is increasing its security measures after a recent GitHub breach incident investigation reported in Heroku.
Story image
Cybersecurity
APAC unprepared to weather storm of cybersecurity breaches
Sixty eight percent of enterprises in Asia Pacific suffered from at least on security breach in 2021, according o a new report from Forrester. 
Story image
Cyber attacks
Four critical cyber attack prevention strategies in 2022
The growing threat of cyber adversaries loomed over organisations throughout 2021, and it shows no signs of slowing down as we enter March 2022.
Story image
Inventory
The patch management challenge
We all know that patching is important, so why is the physical process for updating systems across the enterprise still so difficult?
Story image
Barracuda
Spear-phishing attacks on the rise, with risk to small businesses
According to a new report by Barracuda, Spear-phishing attacks are evolving and becoming significantly more common.
Story image
Cybersecurity
New report shows increase of ICS vulnerabilities in critical infrastructure
The amount of Industrial Control System (ICS) vulnerabilities in critical infrastructure sectors have been found to have increased by 110% over the last four years, according to a new report by Claroty.
Story image
Office of the Australian Information Commissioner
Australian data breach statistics revealed in OAIC report
The Office of the Australian Information Commissioner (OAIC) has released its Notifiable Data Breaches Report for July to December 2021, revealing some surprising results around breach disclosure in Australia.
Story image
Cybersecurity
NCSC warns risk of cyber attack amid Russia/Ukraine tensions
The National Cyber Security Centre (NCSC) has encouraged NZ's crucial organisations to examine their cyber security preparedness in light of the increased tensions between Russia and Ukraine.
Story image
Cybersecurity
NCSC joins data breach service in government programme
The National Cyber Security Centre (NCSC) has become part of the data breach service Have I Been Pwned’s (HIBP) government programme.
Story image
Ransomware
Advanced scams, data breaches, crypto and NFT attacks to shape cyberthreat landscape in 2022
The times of pandemic coincided with the rise of targeted ransomware attacks worldwide focusing on the most valuable targets as well as interruption-sensitive businesses.
Story image
Cybersecurity
Biggest data breach will hit in 2022 - Micro Focus
In the aftermath of digitalisation on a scale that we haven’t seen before, 2021 has left many organisations still scrambling to secure their IT networks.
Story image
Firewall
Log4j actively exploited, serious complications can occur according to CERT NZ
The widely-used java logging library, log4j, has been actively exploited, according to an update from CERT NZ and Catalyst.
Story image
Cybersecurity
To disclose or not to disclose?: The significance of data breach disclosure in Aotearoa
A data breach can be any company's worst nightmare. Not only can it cause catastrophic damage to systems and workflows, but it can also often be extraordinarily damaging and costly. 
Story image
Ransomware
Rubrik enhances cyber resilience solutions to protect against ransomware
With this latest release, organisations can improve ransomware preparedness, respond with more intelligent and integrated tools, and recover from attacks faster, the company states.
Story image
Cybersecurity
Australians have mixed feelings on cybersecurity priorities according to new PWC research
Australians have been found to have seemingly mixed priorities when it comes to cybersecurity, a new study by PWC has revealed. 
Story image
Privacy
OPC finds leading cause of privacy breaches is human error
Privacy Commissioner John Edwards says, “We are seeing clear patterns emerging since mandatory reporting of serious privacy breaches came into effect with the Privacy Act 2020 on 1 December last year.”
Story image
Privileged Access Management / PAM
New study shows IT decision-makers think organisations compromise cybersecurity in favour of other goals
A new study by security firm Trend Micro has revealed that 90% of IT decision-makers believe organisations compromise on cybersecurity in favour of other goals within their business.
Story image
Artificial Intelligence
Millions of police records are accidentally deleted — what are the lessons?
Data breaches are not always avoidable, but they can be mitigated if the right technology tools are applied. 
Story image
Dark web
Stolen data spreading even faster on the dark web - report
Increased volume of data breaches and more avenues for cybercriminals to monetise data has led to increased activity surrounding stolen data on the dark web.