TelcoNews UK - Telecommunications news for ICT decision-makers

Incident Response stories - Page 17

Split boardroom execs vs stressed engineers ai data leak scene

Manifest flags AI readiness gap between execs & AppSec

Last month
#
digital transformation
#
cloud security
#
application security
Manifest research reveals executives overestimate AI security readiness, as AppSec teams warn of unmanaged tools, blind spots and rising risk.
Automated assembly line fixing cyber risks into secure shields

UpGuard unveils Risk Automations to speed cyber fixes

Last month
#
uc
#
siem
#
cloud security
UpGuard debuts Risk Automations to link cyber risk findings with security workflows, promising faster fixes after USD $75 million raise.
Night corporate office cybersecurity team incident response scene

LevelBlue unveils flexible funds-based cyber IR retainer

Last month
#
ransomware
#
devops
#
socs
LevelBlue launches Resilience Retainer, a flexible funds-based cyber incident response service with rapid SLAs and rollover security spend.
Keven knight ceo talion 1.3

Talion names Keven Knight CEO & expands Agentic SOC

Last month
#
socs
#
risk & compliance
#
cybersecurity
Talion appoints Keven Knight as CEO and expands its governance-aligned Agentic SOC to tighten cyber defence oversight for boards.
Aisle jaya 1200x677

Why diversity in cybersecurity leadership is vital

Last month
#
devops
#
apm
#
risk & compliance
Homogeneous cybersecurity leadership is a critical, overlooked point of failure; true defence in depth demands diversity as a core control.
London tech trade show cybersecurity booths world map partners

Infosecurity Europe to expand Channel Zone for 2026

Last month
#
digital transformation
#
cloud security
#
advanced persistent threat protection
Infosecurity Europe will expand its Channel Zone in 2026, reflecting soaring reliance on managed security partners across Europe.
Bt sovereign voice

BT unveils Sovereign Voice for secure UK-only call routing

Sat, 28th Feb 2026
#
uc
#
data protection
#
dr
BT launches Sovereign Voice cloud calling, keeping UK business calls routed and managed solely onshore to meet strict sovereignty demands.
Intricate digital data pipeline with shield governance overlay

Ataccama adds AI data observability to ONE platform

Fri, 27th Feb 2026
#
uc
#
data analytics
#
risk & compliance
Ataccama adds AI-driven data observability to its ONE platform, unifying pipeline monitoring, alerting and governance for regulated users.
Moody globe of network cables with hidden red cyber threat nodes

Phishing gangs weaponise .arpa DNS to evade defences

Fri, 27th Feb 2026
#
firewalls
#
network infrastructure
#
network security
Phishing gangs abuse .arpa DNS and IPv6 tunnels to hide brand-impersonation scams in core internet plumbing that most defences ignore.
Ransomware threat dark server room to critical infrastructure art

NCC warns ransomware risk persists despite January dip

Fri, 27th Feb 2026
#
ransomware
#
manufacturing
#
digital transformation
Ransomware cases dipped 17% in January, but NCC warns the threat remains high as Qilin targets critical sectors and tactics evolve.
Uk security operations center night monitors shield backup alert

N-able adds real-time alerts to protect backup policies

Fri, 27th Feb 2026
#
firewalls
#
data protection
#
dr
N-able adds real-time anomaly alerts to Cove Data Protection, flagging risky backup policy changes linked to identity-driven attacks.
Story 299992

Codific maps five cyber paths threatening power grids

Fri, 27th Feb 2026
#
virtualisation
#
dr
#
ransomware
Codific warns power grids face repeat cyberattack patterns and urges utilities to bolster resilience to outages and cascading disruption.
Moody businessperson faces split deepfake screen ai security threats

AI tops data security worries as identity risks surge

Fri, 27th Feb 2026
#
data protection
#
digital transformation
#
encryption
AI has become firms' top data security fear as identity and deepfake threats surge, exposing gaps in visibility, encryption and governance.
Moody european office ai robot cyberattack broken network cables

AI-first firms face slower cyber recovery & higher costs

Fri, 27th Feb 2026
#
firewalls
#
ddos
#
data protection
AI-first firms take months longer to recover from cyber attacks and face sharply higher breach and scraping costs, Fastly research warns.
Dim office ransomware laptop chat bubbles qr codes masked figures

Ransomware attacks dip but NCC warns threat evolving

Fri, 27th Feb 2026
#
data protection
#
ransomware
#
iot security
Global ransomware attacks fell 17% in January, but NCC warns evolving tactics, AI and messaging apps mean risk is not receding.
Smartphone suspicious call laptop fake login deceptive subdomain scene

ShinyHunters pivots to subdomain phishing & vishing

Fri, 27th Feb 2026
#
saas
#
mfa
#
cloud security
ShinyHunters shifts to subdomain-brand phishing and vishing on mobiles, bypassing domain checks to hijack SSO logins and SaaS sessions.
Interlocking puzzle pieces over laptop global saas communication

Sinch & Lovable ally to embed comms in AI software

Fri, 27th Feb 2026
#
saas
#
devops
#
digital transformation
Sinch partners with Lovable to embed global messaging, email and voice into its AI build platform, starting with Mailgun-powered email.
Email attachment20260227 2568527 6qbah6

Saviynt adds Amazon Q AI tools to boost identity risk

Fri, 27th Feb 2026
#
hybrid cloud
#
digital transformation
#
hyperscale
Saviynt taps Amazon Q to add conversational AI and deeper cross-app risk context, helping identity teams automate investigations and fixes.
Dr. ren%c3%a9e burton infoblox 1

Phishing campaigns exploit .arpa DNS to evade filters

Fri, 27th Feb 2026
#
firewalls
#
network security
#
phishing
Phishing gangs exploit obscure .arpa DNS space and IPv6 tunnels to sneak past reputation-based web filters and lure users to fake sites.
Ai cyber attack hourglass binary lock cloud night office scene

AI-fuelled cyber attacks now steal data in 72 minutes

Fri, 27th Feb 2026
#
firewalls
#
pam
#
cloud security
AI-driven hackers can now steal data in just 72 minutes, as faster, multi-surface attacks overwhelm complex, over-trusting enterprises.