CFOtech US - Technology news for CFOs & financial decision-makers

Data exfiltration stories - Page 4

Corporate cyberattack command center world map dashboards scene

HPE report warns cyberattacks now run like big business

Last month
#
malware
#
firewalls
#
vpns
HPE warns cybercriminals now run attacks like global enterprises, using repeatable workflows, automation and AI to outpace defences.
Soc monitoring unauthorized ai tools secure office environment

SailPoint launches Shadow AI tool to rein in staff use

Last month
#
data protection
#
cloud security
#
mdm
SailPoint debuts Shadow AI Remediation to monitor and block risky staff use of unsanctioned generative AI tools in real time.
Shiv ramji  president auth0 headshot

Rise of AI Agents introduces new infosec risk: Okta

Last month
#
data protection
#
digital transformation
#
mfa
Okta warns that surging numbers of uncontrolled AI agents pose a major identity and access risk as they become the new digital workforce.
Ai cyberattack shadow figure robotscreens red alarm extortion

AI agents drive surge in cyber threats & extortion

Last month
#
malware
#
data protection
#
ransomware
AI agents are fuelling a new wave of cyber risk, as criminals weaponise automation to speed up ransomware and sharpen extortion tactics.
Dark cyberattack control room western critical infra collapse

Iranian cyber shift raises risk to Western infrastructure

Last month
#
ddos
#
dr
#
ransomware
Iranian state-aligned hackers are shifting from spying to destructive cyber strikes, putting Western critical infrastructure on high alert.
David byrnes

Kiteworks & Kasm unite to secure sensitive data flows

Last month
#
virtualisation
#
data protection
#
endpoint protection
Kiteworks and Kasm link governed data exchange with isolated workspaces to tighten control of sensitive information across partners.
Smartphone red siren app shadowy cables israel data surveillance

Fake Red Alert app used in Android spyware smishing

Last month
#
endpoint protection
#
mdm
#
phishing
Attackers push fake Red Alert Android app via SMS, turning Israel rocket warning tool into spyware that steals messages, contacts and location.
Dev teams merge around glowing circuit shield ai security focus

OpenAI buys Promptfoo to bolster Frontier AI security

Last month
#
data protection
#
devops
#
application security
OpenAI agrees to buy Promptfoo, aiming to embed automated security testing and red-teaming tools directly into its Frontier AI coworker platform.
It security ops room ai agents locks shields cloud network

SurePath AI unveils real-time controls to secure MCP use

Last month
#
firewalls
#
endpoint protection
#
document management
SurePath AI launches real-time MCP policy controls to lock down AI tool access, aiming to secure fast-growing workplace agent workflows.
Email attachment20260312 2842926 viqsh8

Fake Claude AI ads spread malware to target developers

Last month
#
cloud security
#
phishing
#
application security
Fake Claude AI search ads are spreading info-stealing malware, hijacking developer credentials and cloud access via spoofed download sites.
Dark moody android phone usb shadowy hand crypto security scene

Critical MediaTek flaw lets attackers steal phone crypto

Last month
#
mdm
#
physical security
#
breach prevention
A critical MediaTek boot flaw lets attackers steal PINs and crypto wallets from powered-off Android phones with a 45-second USB attack.
Moody corporate cloud data center breach glowing cubes leaking

Salesforce guest flaws fuel large-scale data harvesting

Last month
#
saas
#
crm
#
firewalls
Misconfigured Salesforce Experience Cloud guest profiles are being exploited for mass data harvesting, with up to 400 firms possibly affected.
Untitled design   2026 03 10t211837.920

Wireless CVEs surge, exposing hidden risks for AI centres

Last month
#
uc
#
firewalls
#
surveillance
Wireless flaws have surged 230-fold since 2010, as Bastille warns AI data centres and critical infrastructure face escalating unseen risks.
Doctor anxious at pc patient data leaking into ai clouds scene

GenAI drives patient data policy breaches in healthcare

Last month
#
malware
#
data protection
#
cloud security
GenAI use in healthcare is fuelling patient data policy breaches, with regulated records making up 89% of AI-linked violations, research shows.
Prasad

Why the next endpoint and SASE disruption will not come from a security vendor

Last month
#
firewalls
#
digital transformation
#
network security
AI-native agents could quietly upend endpoint and SASE, eroding incumbents' telemetry moats as control shifts to the AI interaction layer.
Secure cloud shield dlp ai security risk managed genai workloads

Forcepoint adds ARIA AI assistant to Data Security Cloud

Last month
#
data protection
#
endpoint protection
#
hybrid cloud
Forcepoint adds ARIA AI assistant and a faster endpoint agent to Data Security Cloud to tighten policy control for generative AI workloads.
Overwhelmed security analyst shadowy cyber threats night office

AI cyber threats outpace staff readiness, report warns

Last month
#
firewalls
#
data protection
#
digital transformation
Attackers' AI use is surging faster than staff skills, Fortinet warns, leaving firms exposed despite rising security awareness spending.
Overhead office ai tools data streams with glowing security shield

Teramind launches AI governance to tackle shadow AI

Last month
#
firewalls
#
digital transformation
#
network security
Teramind has unveiled an AI governance platform to monitor workplace AI tools and shadow agents, aiming to curb hidden data and security risks.
Hooded cyber figure identity attack breached accounts blue tones

Identity attacks dominate Expel's 2026 threat report

Last month
#
malware
#
endpoint protection
#
mfa
Identity-based attacks drove nearly 70% of incidents in Expel's 2026 threat report, exposing gaps between basic controls and real-world defence.
Secure server room ai agents access rings locked and revoked scene

SentinelOne unveils identity tools for human & AI use

Last month
#
data protection
#
pam
#
cloud security
SentinelOne launches identity tools to monitor and revoke access for human users and fast-moving AI agents beyond initial authentication.