IT Brief UK - Technology news for CIOs & IT decision-makers

PowerShell stories

Flux result 2a0e4632 8072 4ed3 9f1d 043e15c75687

Microsoft warns of Storm-1175's rapid Medusa attacks

Last week
#
ransomware
#
cybersecurity
#
microsoft
Microsoft says Storm-1175 is exploiting newly disclosed flaws within hours, hitting organisations in the UK and elsewhere with fast-moving Medusa ransomware.
Flux result 40d5bcdc 27bf 48a0 8c08 a87cb6325b88

Zscaler flags Xloader malware's tougher obfuscation

This month
#
malware
#
firewalls
#
encryption
Zscaler says Xloader malware has added layered encryption, decoy servers and new obfuscation tricks to hinder analysts.
Flux result 6459960a 8b91 4ad1 9ab4 cab1e0e740d2

DeepLoad malware steals credentials via ClickFix campaign

This month
#
malware
#
firewalls
#
network infrastructure
ReliaQuest flags DeepLoad malware stealing live credentials in enterprise networks, with AI-style obfuscation, USB spread and hidden WMI persistence.
Flux result 600dd12e b693 45cc 8e4a 8dfc977dd7c1

Bitdefender launches free attack surface assessment

This month
#
firewalls
#
network security
#
pam
Bitdefender offers free 45-day internal security check to spot over-entitled staff access as attackers increasingly abuse trusted tools.
Flux result 152657c8 7738 4bac 81b1 a1995321cc8c

N-able adds AI detections for stealthier cyber attacks

Last month
#
firewalls
#
network security
#
cloud security
N-able rolls out AI-led SOC detections to flag PowerShell abuse, suspicious DNS traffic and unusual Windows processes across multiple layers.
Moody corporate night office fileless ransomware cloud lock reflection

LeakNet adopts ClickFix lures & Deno fileless loader

Last month
#
storage
#
uc
#
firewalls
Ransomware group LeakNet adopts ClickFix lures and a Deno-based fileless loader to scale attacks and evade traditional endpoint defences.
Moody cloud padlock human silhouettes identity theft pixels

Cloud identity compromise now drives most cyber attacks

Last month
#
malware
#
uc
#
firewalls
Cloud identity compromise now drives over 80% of cyber incidents, as attackers increasingly abuse trusted accounts and workplace tools.
Dev night windows11 office ai assistant python coding scene

OpenAI launches Codex desktop app for Windows devs

Last month
#
devops
#
digital transformation
#
apm
OpenAI brings its Codex desktop app to Windows, targeting the nearly half of professional developers who use the platform daily.
Server room night encrypted code swirls malware cracked shield

WatchGuard warns of surge in evasive, encrypted malware

Fri, 20th Feb 2026
#
malware
#
firewalls
#
ransomware
WatchGuard reports a 1,548% surge in new evasive malware and a 2,000% jump in encrypted threats, straining signature-based defences.
Overwhelmed it control room microsoft automation governance chaos

Governance gaps stall Microsoft automation at scale

Mon, 9th Feb 2026
#
digital transformation
#
pam
#
cartech
Governance gaps and tool sprawl are stalling Microsoft automation at scale, with most large IT teams lacking control, visibility and integration.
Cinematic night city cyberattack red windows shattering locks

Fewer ransomware gangs, but more victims in late 2025

Thu, 29th Jan 2026
#
ransomware
#
digital transformation
#
advanced persistent threat protection
Ransomware gangs shrank in number but hit more victims in late 2025, with leak-site postings soaring despite fewer active groups.
Dark server room ransomware attack shadowy hacker hands locks

Storm-0249 hijacks security tools to fuel ransomware

Wed, 7th Jan 2026
#
malware
#
firewalls
#
ransomware
Storm-0249 hijacks trusted security and Windows tools to stealthily broker high-value network access for ransomware operators.
Hybrid cloud windows linux datacenters high availability dr

SIOS unveils LifeKeeper v10 with unified web console

Wed, 7th Jan 2026
#
dr
#
devops
#
hybrid cloud
SIOS launches LifeKeeper v10, adding a unified browser console to simplify high availability and disaster recovery across Linux and Windows.
Covert cyber espionage software download bug warning china russia

Chinese hackers fake Teams downloads in false flag ploy

Thu, 18th Dec 2025
#
malware
#
uc
#
martech
Chinese state-backed hackers mimic Microsoft Teams downloads in a false flag campaign to infect Chinese speakers and blame Russian actors.
Windows laptop shield blocking email malware cloud security

Microsoft patches Windows zero-day & risky Office flaws

Wed, 10th Dec 2025
#
storage
#
dr
#
encryption
Microsoft fixes a Windows zero-day used in attacks and Office flaws that can execute code when emails are merely received or previewed.
Masked hacker breaking into digital network data cloud security breach

Attackers exploit ScreenConnect & Microsoft 365 for breaches

Fri, 5th Dec 2025
#
firewalls
#
ransomware
#
network security
Attackers exploit unpatched ScreenConnect and Microsoft 365 credentials for unauthorised network access, raising breach risks for organisations worldwide.
Modern office workspace people laptops desktops cloud collaboration remote

Parallels RAS 21.0 enhances hybrid cloud & user experience

Sat, 22nd Nov 2025
#
hybrid cloud
#
mfa
#
multi-cloud
Parallels has launched RAS 21.0, enhancing hybrid cloud management, security, and user experience for distributed workforces with multi-cloud support.
Realistic email inbox with magnifying glass revealing hidden malicious code in image attachment phishing

Phishing kits & steganography drive new wave of email threats

Fri, 14th Nov 2025
#
malware
#
data protection
#
phishing
Cybersecurity experts warn of rising email threats as phishing kits Tycoon 2FA and Cephas evolve, using steganography and code obfuscation to evade detection.
Illustration computer server virtual machines shadowy malware network wires secure data center

Curly COMrades abuse Hyper-V for covert malware operations in VMs

Wed, 5th Nov 2025
#
malware
#
virtualisation
#
firewalls
Curly COMrades exploit Microsoft Hyper-V to run hidden malware inside lightweight VMs, evading detection and maintaining stealthy control over targets.
Realistic invoice with hidden malware warnings on computer screen in german office

Cybercriminals use fake invoices & images to outsmart defences

Wed, 17th Sep 2025
#
malware
#
phishing
#
martech
Cybercriminals use ultra-realistic fake Adobe Reader invoices and images with embedded malware to bypass defences, targeting German-speaking regions.