by Andrew Hunt | Nov 8, 2025 | IT News & Insights New Zealand | Cybersecurity, AI & Microsoft Updates, Security
Why This Brief Matters A cybercriminal only has to be lucky once. You have to be lucky every minute of every day. That remains the stark reality for kiwi businesses in Q4 2025. This isn’t another dry technical report filled with acronyms and alerts. Kinetics has...
by Andrew Hunt | Oct 2, 2025 | AI, IT News & Insights New Zealand | Cybersecurity, AI & Microsoft Updates, Security
For years, we’ve told businesses to watch for telltale phishing signs: poor grammar, suspicious sender addresses, generic greetings. But what happens when cybercriminals have access to the same sophisticated AI tools your marketing team uses—except weaponised...
by Andrew Hunt | Aug 29, 2025 | AI, IT News & Insights New Zealand | Cybersecurity, AI & Microsoft Updates, Security
Unveiling a dark future: The First AI-Powered Ransomware In a groundbreaking discovery, researchers at ESET have uncovered what they believe to be the first known AI-powered ransomware strain, aptly named PromptLock. This sophisticated malware is not just a step...
by Andrew Hunt | Aug 20, 2025 | IT News & Insights New Zealand | Cybersecurity, AI & Microsoft Updates, Security, Webinar Recording
Cyber-protection keeps getting more complex, more restrictive and more expensive. This month we are talking with expert Thomas Shobbrook. He updates us on the latest security trends and help us understand how well protected your device is out-of-the-box. We ask...
by Andrew Hunt | Jul 16, 2025 | IT News & Insights New Zealand | Cybersecurity, AI & Microsoft Updates, Security, Webinar Recording
As mobile devices become the backbone of modern business operations, they also present a growing target for cyber threats. Apple or Android – they’re both important. Every time you use these to access your Teams, Email or anything else, you are relying...
by Andrew Hunt | Jul 9, 2025 | IT News & Insights New Zealand | Cybersecurity, AI & Microsoft Updates, Security
Device code phishing is a sneaky new way hackers are stealing people’s online accounts. In device code phishing, threat actors exploit the device code authentication flow to capture authentication tokens, which they then use to access target accounts, and...
Recent Comments