IT Brief India - Technology news for CIOs & IT decision-makers

Data breach stories

Dark moody android phone usb shadowy hand crypto security scene

Critical MediaTek flaw lets attackers steal phone crypto

Today
#
mdm
#
physical security
#
breach prevention
A critical MediaTek boot flaw lets attackers steal PINs and crypto wallets from powered-off Android phones with a 45-second USB attack.
Cinematic laptop deepfake face binary code broken locks quantum ai

IBM warns AI & quantum threats will reshape cybercrime

Today
#
malware
#
data protection
#
ransomware
IBM warns shadow AI, deepfakes and quantum threats will reshape cyber risk by 2026, as autonomous agents speed breaches and ransomware.
Moody corporate cloud data center breach glowing cubes leaking

Salesforce guest flaws fuel large-scale data harvesting

Today
#
saas
#
crm
#
firewalls
Misconfigured Salesforce Experience Cloud guest profiles are being exploited for mass data harvesting, with up to 400 firms possibly affected.
Cinematic fortified cloud shields over city ai data protection

Jazz raises USD $61m to reinvent data loss prevention

Today
#
data protection
#
digital transformation
#
cloud security
Jazz raises USD $61m to launch AI-led data loss prevention platform that slashes alert noise and targets higher-confidence risks.
Hybrid cloud network stolen digital identity glowing key figure

Google report warns identity is weak link in cloud

Yesterday
#
malware
#
ransomware
#
hybrid cloud
Attackers are ditching malware for stolen identities, misconfigurations and abused AI tools, Google warns in its latest cloud threat report.
Secure sovereign cloud data fortress ai resilient eu canada

Cohesity boosts AI data resilience with new cloud tools

Yesterday
#
data protection
#
dr
#
ransomware
Cohesity debuts sovereign cloud tie-ups, AI-driven threat tools and midsize bundle to harden data protection as enterprises scale AI.
Hooded hacker over asia pacific skyline ai ransomware cloud web

Ransomware surges across Asia-Pacific as AI fuels risk

Yesterday
#
data protection
#
ransomware
#
digital transformation
Ransomware attacks in Asia-Pacific surged 59% in 2025 as rapid digitalisation and AI adoption fuel faster, more targeted cyber extortion.
Doctor anxious at pc patient data leaking into ai clouds scene

GenAI drives patient data policy breaches in healthcare

Yesterday
#
malware
#
data protection
#
cloud security
GenAI use in healthcare is fuelling patient data policy breaches, with regulated records making up 89% of AI-linked violations, research shows.
Office worker laptop cloud apps ai icons secure access shield

LastPass unveils browser-based Secure Access Essentials

Yesterday
#
encryption
#
mfa
#
cloud security
LastPass launches Secure Access Essentials, a browser-focused suite to secure access to workplace apps, SaaS and unsanctioned AI tools.
Secure multi cloud data resilience australia new zealand map

Cohesity & Cyera integrate DSPM to boost data security

Yesterday
#
data protection
#
dr
#
ransomware
Cohesity deepens its Cyera tie-up, embedding DSPM into its data cloud to sharpen discovery, classification and cyber recovery at scale.
Global office night cyber attack hacker shadows cracked cloud

Cyber attacks stay near record high as GenAI risks grow

Yesterday
#
edutech
#
firewalls
#
data protection
Global cyber attacks hover near record highs as unchecked workplace GenAI use exposes sensitive data in one in 31 corporate prompts.
Meta smart glasses reflecting surveillance grid data leak risk

Sama credential leaks raise fears over Meta glasses data

Last week
#
wearables
#
data protection
#
surveillance
Leaked Sama staff logins tied to stealer malware spark fresh alarm over security of Meta Ray-Ban smart glasses video review pipeline.
Moody server room supply chain breach glowing red lock icon

ShinyHunters claims Woflow breach in supply chain hack

Last week
#
data protection
#
ransomware
#
mfa
ShinyHunters claims it hacked merchant data firm Woflow, raising supply chain fears for major brands despite no confirmed breach yet.
Worried office worker old phone shadow hacker corporate network

Coruna exploit kit exposes risks for outdated iOS users

Last week
#
endpoint protection
#
pam
#
mfa
New Coruna exploit kit shows outdated iOS devices face automated, scalable attacks that can turn compromised phones into corporate gateways.
Heather mahalik  1

Why women can be leaders when it comes to AI

Last week
#
data protection
#
ransomware
#
digital transformation
Women in cybersecurity, long trained to question and validate, are uniquely placed to lead the era of risky, fast‑moving AI tools.
Japan factory night ransomware attack shadow figure network

Ransomware attacks surge 50% as industrial firms hit hardest

Last week
#
malware
#
data protection
#
ransomware
Global ransomware attacks jump 50% to 7,874 in 2025, with industrial firms bearing the brunt as criminal groups reshuffle their tactics.
Overhead office ai tools data streams with glowing security shield

Teramind launches AI governance to tackle shadow AI

Last week
#
firewalls
#
digital transformation
#
network security
Teramind has unveiled an AI governance platform to monitor workplace AI tools and shadow agents, aiming to curb hidden data and security risks.
Hooded cyber figure identity attack breached accounts blue tones

Identity attacks dominate Expel's 2026 threat report

Last week
#
malware
#
endpoint protection
#
mfa
Identity-based attacks drove nearly 70% of incidents in Expel's 2026 threat report, exposing gaps between basic controls and real-world defence.
Features to outcomes blog 260302

Why real cyber protection is a continuous discipline

Last week
#
firewalls
#
endpoint protection
#
digital transformation
SonicWall urges MSPs and SMBs to stop chasing security features and instead demand managed, measurable protection and real outcomes.
Ai security lock glass office data breach neural network night

AI adoption drives security spend but breaches persist

Last week
#
data protection
#
hybrid cloud
#
digital transformation
Rising AI adoption is driving higher security spend, yet most enterprises still suffer repeated breaches as risk outpaces new defences.