CFOtech UK - Technology news for CFOs & financial decision-makers

Business Email Compromise stories - Page 2

Dark server room ai cyber attack red network path spreading

AI-driven cyber attacks now breach networks in minutes

Last month
#
malware
#
firewalls
#
ransomware
AI-fuelled hackers can now spread across corporate networks in as little as four minutes, outpacing human defenders by hours.
Cio nighttime office ai cyber attack warning screens digital storm

CIOs brace for AI-led cyber attacks but feel unready

Last month
#
digital transformation
#
cloud security
#
phishing
Most CIOs expect AI-driven cyber attacks within a year, but only a third feel prepared, exposing a widening gap in cyber resilience.
Global ransomware lock ai phishing spreading across nations

AI-driven phishing surge as Acronis warns MSPs at risk

Last month
#
malware
#
ransomware
#
cloud security
Acronis warns AI is turbocharging phishing, email attacks and ransomware in 2025, with MSPs and collaboration tools under rising fire.
Morgan headshots 56

KnowBe4 appoints Kelly Morgan as Chief Customer Officer

Last month
#
cloud security
#
cx
#
phishing
KnowBe4 appoints former DocuSign executive Kelly Morgan as chief customer officer to steer global client strategy amid rising AI security risks.
Internal auditors anxious over ai driven fraud in dark office

Internal auditors fear AI fraud but lack readiness

Last month
#
data analytics
#
digital transformation
#
fintech
Internal auditors warn AI-driven fraud is surging, but most concede they lack the tools, skills and time needed to spot it effectively.
Office worker ai phishing notifications shadowy hands illustration

AI-driven phishing surge dominates 2025 cyberattacks

Last month
#
malware
#
ransomware
#
digital transformation
AI-powered phishing drives a sharp 2025 surge in email and chat attacks, as Acronis warns of a new era of automated cybercrime at scale.
Small business office ransomware attack refusing to pay secure safe

Ransomware victims refuse to pay as data extortion soars

Last month
#
firewalls
#
data protection
#
dr
Most ransomware-hit firms now refuse to pay, as Arctic Wolf reports an 11-fold surge in data-only extortion and booming remote access abuse.
Dark office night remote access shadowy hacker silent data theft

Data-only extortion surges as remote access abused

Last month
#
data protection
#
dr
#
vpns
Data-only extortion soars 11-fold as attackers 'log in instead of break in', abusing remote access tools for faster, stealthier raids.
Moody datacenter night glowing shield cyber espionage ai theft

Google warns of AI model theft & state-backed misuse

Last month
#
malware
#
surveillance
#
cloud security
Google flags surging attempts to steal AI models as state-backed hackers weaponise Gemini for phishing, intel gathering and malware support.
Moody person at computer ai romance scams shadowy faces

AI turns romance scams into industrial-scale fraud

Last month
#
phishing
#
physical security
#
email security
AI is turning romance scams into industrial-scale fraud, with deepfakes and chatbots driving billions in losses, Tenable warns.
Moody user at desk surrounded by phishing login screens monitors

Record rise in digital squatting fuels phishing wave

Last month
#
malware
#
phishing
#
martech
Record digital squatting surge sees 6,200 disputes in 2025, as lookalike domains drive costly phishing, malware and payment fraud.
Shadowy figure laptop fake law firm scam network red blue glow

Sygnia uncovers global law firm recovery scam network

Last month
#
data analytics
#
phishing
#
physical security
Sygnia links 150+ domains to a global recovery-scam ring posing as law firms, using WhatsApp and cloned sites to repeatedly target victims.
Moody corporate office night remote access malware attack scene

Screensaver phishing installs remote access tools covertly

Last month
#
storage
#
firewalls
#
ransomware
Attackers are abusing Windows screensaver files in a spearphishing campaign to stealthily install remote access tools on business systems.
Office worker anxious at laptop phishing emails shadowy hands clouds

Callback phishing surges as BEC email fraud dominates

Last month
#
hyperscale
#
phishing
#
hcm
Callback phishing jumps sixfold as BEC fraud stays dominant, with criminals weaponising CAPTCHAs, trusted brands and cloud platforms.
Shadowy hacker dark office red warnings world map cyber attacks

AI-fuelled cyber attacks surge 70%, Check Point warns

Fri, 30th Jan 2026
#
saas
#
firewalls
#
data protection
AI-driven hacking has pushed weekly cyber attacks up 70% since 2023, with Check Point warning campaigns are faster, broader and harder to stop.
Executive face digital mask biometric scan blurred cityscape

AI deepfakes force firms to rethink trust & security

Thu, 29th Jan 2026
#
firewalls
#
data protection
#
surveillance
AI deepfakes are eroding faith in biometrics and executive identities, forcing companies to rebuild trust in how they verify people and payments.
Shadowy hacker at multiple monitors faces fingerprints binary

AI crime matures as jailbreak, malware & deepfakes grow

Thu, 29th Jan 2026
#
malware
#
physical security
#
email security
AI crime is shifting from experiments to a stable industry, with jailbreak services, adaptive malware and deepfake fraud becoming routine.
Lotem finkelsteen 2

AI drives 70% surge in weekly cyber attacks in 2025

Thu, 29th Jan 2026
#
firewalls
#
ransomware
#
hybrid cloud
AI-fuelled automation drove a 70% surge in weekly cyber attacks in 2025, with nearly 2,000 incidents per organisation, Check Point warns.
Moody office worker phishing remote access cursor corporate net

Phishing campaign exploits RMM tools for stealthy access

Fri, 23rd Jan 2026
#
firewalls
#
network security
#
phishing
Phishing campaign uses stolen logins and trusted RMM tools like GoTo Resolve and LogMeIn to quietly maintain access to corporate systems.
Hooded binary figure ai cyber threats glowing locked data shield

Experts warn AI era demands tougher data protection

Fri, 23rd Jan 2026
#
data protection
#
digital transformation
#
pam
Experts say AI-driven attacks and rampant data leaks mean organisations must verify outputs, curb collection and harden identity controls.