+ AI data hunger feeding a shadowy proxy ecosystem; Europol and tech firms take down Tycoon 2FA bypass service; and more
Can't view this message? Click here to view it online.
iTnews

WEEKLY SECURITY WRAP

Tuesday March 10, 2026

  Security  

Poor WA gov M365 security led to $71k theft and children's data breached

State auditor unearths missing security controls at departments.

By Juha Saarinen

 

Latest Security News


AI data hunger feeding a shadowy proxy ecosystem
  Security  

AI data hunger feeding a shadowy proxy ecosystem

Users often unaware of what agreeing to "bandwidth sharing" means.

By Juha Saarinen

 
Europol and tech firms take down Tycoon 2FA bypass service
  Security  

Europol and tech firms take down Tycoon 2FA bypass service

Session cookie thievery got through MFA.

By Juha Saarinen

 
 
 
 
In Pictures: Securing AI agents and NHIs - Saviynt Sydney roundtable
  Security  

In Pictures: Securing AI agents and NHIs - Saviynt Sydney roundtable

A selection of photos from a recent iTnews roundtable lunch at Establishment in Sydney.

By VB Templeman

 
Health and Aged Care CISO retires
  Security  

Health and Aged Care CISO retires

After three-decade long public service career.

By Juha Saarinen

 
US suspects China in breach of FBI surveillance network
  Security  

US suspects China in breach of FBI surveillance network

Scope ‌and severity of the intrusion ⁠are not yet known.

By Staff Writer

 
Russia-backed hackers breach Signal, WhatsApp accounts of officials, journalists
  Security  

Russia-backed hackers breach Signal, WhatsApp accounts of officials, journalists

Masquerade as support chatbot.

By Anthony Deutsch

 
 
 
 

Featured whitepaper


 
 

MOST POPULAR


Poor WA gov M365 security led to $71k theft and children's data breached
  Security  

Poor WA gov M365 security led to $71k theft and children's data breached

By Juha Saarinen

Health and Aged Care CISO retires
  Security  

Health and Aged Care CISO retires

By Juha Saarinen

Services Australia describes fraud, debt-related machine learning use cases
  Security  

Services Australia describes fraud, debt-related machine learning use cases

By Ry Crozier

AI data hunger feeding a shadowy proxy ecosystem
  Security  

AI data hunger feeding a shadowy proxy ecosystem

By Juha Saarinen

Australia's big end of town is paying ransomware groups
  Security  

Australia's big end of town is paying ransomware groups

By Juha Saarinen

 
 
unsubscribe