Active Directory stories
Domain controllers face urgent patching after a Netlogon flaw was rated 9.8, with no privileges or user interaction needed for exploitation.
Rising identity-based attacks are pushing Australian and New Zealand businesses to seek faster recovery tools for Active Directory and hybrid systems.
The surge in attacks shows how criminals are bypassing passwords and multifactor checks to hijack Microsoft 365 accounts for days or weeks.
Boards are being pressed to abandon periodic patching as AI models can now uncover and chain software flaws faster than human teams can respond.
Machines now account for most cloud identities, leaving firms exposed to faster attacks, over-privileged access and AI-driven risks.
AI agents and service accounts are exposing Australian and New Zealand firms to regulatory, financial and reputational risk as controls lag.
A Monday-morning Microsoft 365 login from Germany was flagged, letting a partner reset a compromised account before attackers could act.
Weak identity controls are now driving most attacks on Australian organisations, with breaches hitting revenue, customers and supply chains.
Hundreds of Microsoft 365 users are being compromised daily as attackers bypass passwords with device code phishing and OAuth tokens.
Large employers can now handle desk and room bookings in Outlook and Teams as Eptura deepens its Microsoft 365 integration.
Many firms still lack recoverable copies of critical data as ransomware increasingly targets cloud and SaaS systems, experts warn.
Businesses can now manage devices, branding and customer listings from one Apple platform, as the company retires two separate services worldwide.
Enterprises with fragmented identity systems can now avoid forest trusts as the integrated product covers humans and AI agents across domains.
Horizon3.ai doubles ARR as more than 5,200 organisations adopt its NodeZero platform, fuelled by MSSP demand and rising cyber risks.
Rubrik links Microsoft Defender with its identity recovery tools to speed response to credential-based attacks and cut downtime after breaches.
Identity breaches now take months to spot, prompting ThreatDown to add post-authentication monitoring for smaller IT teams and MSPs.
Attackers are now moving fast enough that patching delays, standing privilege and inherited trust leave organisations exposed within minutes.
Businesses are seeking more advisers as AI and tighter rules make cybersecurity compliance the most in-demand skillset on Malt’s platform.
Agencies using Microsoft Government Community Cloud High can now scan cloud identities for weaknesses, closing a gap in hybrid security oversight.
Only 42% of Australian organisations back up all workloads, leaving many exposed when ransomware or hardware failures hit.