TelcoNews UK - Telecommunications news for ICT decision-makers

Incident Response stories - Page 20

Global cyber attack map red lines to glowing datacenter racks

Radware warns of surging DDoS & app attacks in 2025

Fri, 20th Feb 2026
#
ddos
#
fintech
#
application security
Radware warns 2025 cyberattacks are exploding, with network DDoS up 168% and web DDoS up 101% as bots, apps and APIs face heavier fire.
Global ransomware lock ai phishing spreading across nations

AI-driven phishing surge as Acronis warns MSPs at risk

Fri, 20th Feb 2026
#
malware
#
ransomware
#
cloud security
Acronis warns AI is turbocharging phishing, email attacks and ransomware in 2025, with MSPs and collaboration tools under rising fire.
African cybercrime taskforce in dim ops room with seized devices

INTERPOL cybercrime sweep in Africa recovers USD $4.3m

Fri, 20th Feb 2026
#
firewalls
#
network security
#
phishing
INTERPOL's Africa cybercrime blitz nets 651 arrests, seizes 2,341 devices and recovers USD $4.3m after scams linked to USD $45m losses.
Cloud identity recovery security glowing shield canada us growth

Cayosoft posts 76% ARR surge on identity recovery boom

Fri, 20th Feb 2026
#
saas
#
dr
#
hybrid cloud
Cayosoft posts 76% ARR jump for 2025 as identity recovery demand soars and it wins major public sector and enterprise customers.
Cinematic data center night firewall crack ransomware attack icon

Barracuda links 2025 ransomware wave to firewall flaws

Fri, 20th Feb 2026
#
firewalls
#
data protection
#
ransomware
Barracuda warns that unpatched firewalls and weak accounts drove 90% of 2025 ransomware attacks, as threats spread in mere hours.
Silicon valley war room dashboard engineers cloud monitoring

Selector raises USD $32m to boost AI observability push

Fri, 20th Feb 2026
#
devops
#
digital transformation
#
apm
Selector raises USD $32m at a USD $375m valuation to expand its AI-driven observability platform and accelerate global enterprise growth.
Untitled design  71

Scottish Continuity appoints Alison Stone as new Chair

Thu, 19th Feb 2026
#
data protection
#
dr
#
physical security
Alison Stone has been appointed incoming Chair of Scottish Continuity, with her role to be confirmed at this month's Resilient Scotland conference.
Uk dusk infrastructure cyber attack wind turbines power grid net

UK warned over growing cyber threat to key services

Thu, 19th Feb 2026
#
dr
#
ransomware
#
pam
UK's cyber agency warns ageing infrastructure and SMEs face rising attack risk, urging urgent resilience upgrades and stronger regulation.
Uk high street office dusk security key mfa glowing padlock scene

UK campaign targets small firms' growing cyber risk

Thu, 19th Feb 2026
#
ransomware
#
mfa
#
phishing
UK urges small firms to 'lock the door' on cyber crime as attacks cost businesses GBP £14.7 billion a year and basic defences lag.
Dev

Rubrik launches Agent Cloud to govern enterprise AI

Thu, 19th Feb 2026
#
data protection
#
dr
#
devops
Rubrik unveils Agent Cloud, promising real-time oversight, guardrails and rollback for risky AI agents embedded in enterprise systems.
Office worker ai phishing notifications shadowy hands illustration

AI-driven phishing surge dominates 2025 cyberattacks

Thu, 19th Feb 2026
#
malware
#
ransomware
#
digital transformation
AI-powered phishing drives a sharp 2025 surge in email and chat attacks, as Acronis warns of a new era of automated cybercrime at scale.
It control room live conference walls mission critical operations

VQ unveils Advanced Conferencing Centre for Cisco users

Wed, 18th Feb 2026
#
uc
#
data protection
#
rpa
VQ launches Advanced Conferencing Centre to give Cisco Meeting Server users tighter control over complex, operator-led multi-room calls.
Global corporate socs room world map endpoints locks shields

AI & endpoints reshape global information governance

Wed, 18th Feb 2026
#
saas
#
data protection
#
mdm
AI tools and shadow IT push information governance to the endpoint, forcing organisations to align policy with device-level reality.
Oil refinery renewables control room power loss venting steam dusk tension

OT cyber threats shift from spying to disruption in 2025

Wed, 18th Feb 2026
#
ransomware
#
iot security
#
advanced persistent threat protection
Cyber attacks on industrial systems in 2025 shifted from quiet spying to coordinated operations aiming to disrupt critical infrastructure.
Moody office building chained padlock ransomware gangs night scene

Record ransomware surge as 7,458 victims named in 2025

Wed, 18th Feb 2026
#
malware
#
ransomware
#
encryption
Ransomware hits record 7,458 named victims in 2025 as 124 gangs crowd dark web leak sites and new “supergroup” alliances emerge.
Small business office ransomware attack refusing to pay secure safe

Ransomware victims refuse to pay as data extortion soars

Wed, 18th Feb 2026
#
firewalls
#
data protection
#
dr
Most ransomware-hit firms now refuse to pay, as Arctic Wolf reports an 11-fold surge in data-only extortion and booming remote access abuse.
Dim corporate server room mixed os racks chained ransomware lock

LockBit 5.0 ransomware targets Windows, Linux, ESXi

Wed, 18th Feb 2026
#
malware
#
virtualisation
#
data protection
New LockBit 5.0 ransomware hits Windows, Linux and ESXi in single campaigns, widening blast radius across mixed and virtualised environments.
Modern cybersecurity war room ai brain shield team collab

CompTIA launches SecAI+ to tackle AI security skills

Wed, 18th Feb 2026
#
malware
#
data protection
#
devops
CompTIA unveils SecAI+ certification to equip cybersecurity professionals with AI security, risk management and governance skills.
It ops command center automated incident triage hybrid cloud

ManageEngine boosts Site24x7 with causal, agentic AI

Wed, 18th Feb 2026
#
hybrid cloud
#
data analytics
#
cx
ManageEngine adds causal intelligence and AI agents to Site24x7, promising faster incident triage and automated remediation for hybrid IT ops.
Dark office night remote access shadowy hacker silent data theft

Data-only extortion surges as remote access abused

Wed, 18th Feb 2026
#
data protection
#
dr
#
vpns
Data-only extortion soars 11-fold as attackers 'log in instead of break in', abusing remote access tools for faster, stealthier raids.