Tech News

Tech Business News

  • Home
  • Technology
  • Business
  • News
    • Technology News
    • Local Tech News
    • World Tech News
    • General News
    • News Stories
  • Media Releases
    • Tech Media Releases
    • General Media Releases
  • Advertisers
    • Advertiser Content
    • Promoted Content
    • Sponsored Whitepapers
    • Advertising Options
  • Cyber
  • Reports
  • People
  • Science
  • Articles
    • Opinion
    • Digital Marketing
    • Gaming
    • Guest Publishers
  • About
    • Tech Business News
    • News Contributions -Submit
    • Journalist Application
    • Contact Us
Reading: Cequence.ai Joins Australian Authorities In Warning Against Iranian Cyber-Attacks
Share
Font ResizerAa
Tech Business NewsTech Business News
  • Home
  • Technology News
  • Business News
  • News Stories
  • General News
  • World News
  • Media Releases
Search
  • News
    • Technology News
    • Business News
    • Local News
    • News Stories
    • General News
    • World News
    • Global News
  • Media Releases
    • Tech Media Releases
    • General Press
  • Categories
    • Crypto News
    • Cyber
    • Digital Marketing
    • Education
    • Gadgets
    • Technology
    • Guest Publishers
    • IT Security
    • People In Technology
    • Reports
    • Science
    • Software
    • Stock Market
  • Promoted Content
    • Advertisers
    • Promoted
    • Sponsored Whitepapers
  • Contact & About
    • Contact Information
    • About Tech Business News
    • News Contributions & Submissions
Follow US
© 2022 Tech Business News- Australian Technology News. All Rights Reserved.
Tech Business News > Media Releases > Cequence.ai Joins Australian Authorities In Warning Against Iranian Cyber-Attacks
Media Releases

Cequence.ai Joins Australian Authorities In Warning Against Iranian Cyber-Attacks

On the back of an official warning from the Australian Signals Directorate that Iran-based hackers are “compromising critical infrastructure” using brute force attacks Cequence has urged organisations to review their federation controls and third-party integrations.

Austech Media
Last updated: July 1, 2025 6:12 pm
Austech Media
Share
SHARE

Randolph Barr Chief Information Security Officer at Cequence says companies and governments need to ensure identity federation (SSO, SAML, OAuth) is hardened and validate that third-party applications only have the minimal access required.

Mr Barr said, “We live in a time where cyberattacks are no longer isolated to the countries directly involved in geopolitical conflict,”

“In the case of Iran, it’s not just about their known cyber capabilities—it’s about the broader network of proxy actors and aligned nations who may view recent U.S. actions as justification for retaliation,”

“This dramatically increases the likelihood that the U.S. and its allies will become targets of cyberwarfare, especially from adversaries seeking to exploit regional instability,” said Barr

“Iran has historically demonstrated a strong capability in cyber operations, often leveraging credential theft, social engineering, and access via federated identity systems,”

“What makes their tactics especially dangerous is their tendency to abuse federated and third-party access—essentially exploiting trusted relationships and integrations to move laterally and persist undetected.” he said.

Microsoft has dubbed cyber threats based from Iran with the code-name “sandstorm”. Tehran has been escalating its digital attacks on critical infrastructure in Israel and other Middle Eastern and Western countries for the past decade.

Iran is ranked alongside Russia, China and North Korea in its capacity to wreak cyber havoc, and Australia is not immune.

The Australian Signals Directorate has warned that Iran-based hackers are “compromising critical infrastructure” using brute force attacks, such as “password spraying” and “multi-factor authentication (MFA) push bombing” to gain access to user accounts and infiltrate corporate and government networks.

Password spraying is when hackers attempt to access a large number of accounts with a few commonly used passwords, while MFA push bombing tricks users into approving log on requests.


Mr Barr said in light of the recent DHS and NYDFS warnings, companies should focus on the following priorities:

  • Implement MCP-style continuous session validation: Move beyond one-time authentication and continuously verify trust throughout a session.

  • Simulate geopolitical threat scenarios: Test your incident response and business continuity plans against scenarios involving nation-state tactics, particularly those aligned with Iran’s known behaviours.

“Cyber conflict is no longer theoretical—it’s strategic, targeted, and often masked behind false flags. Companies need to prepare not just for a direct hit, but for sophisticated campaigns that exploit the gaps between identity, access, and trust.”

Cequence Security is uniquely positioned to help organizations defend against these sophisticated threats through API and application-level protection that’s purpose-built for modern attack methods:

  • Discover and lock down exposed APIs: Cequence’s API Spyder and API Sentinel solutions automatically discover shadow, deprecated, or undocumented APIs—often the first targets of state-sponsored actors seeking a foothold via unmonitored entry points.

  • Defend against credential stuffing and access abuse: Cequence Bot Defense detects and blocks credential stuffing campaigns in real time, even those masked as legitimate traffic by proxies or human-like automation—a method frequently used by Iranian and proxy actors.

  • Harden federated identity paths through behavioral fingerprinting: Cequence tracks behavioral anomalies across sessions, enabling continuous validation and helping identify misuse of SSO, OAuth, or SAML-based identity systems.

  • Block malicious third-party access and lateral movement: By monitoring and scoring API interactions, Cequence helps security teams detect when a trusted third-party begins acting abnormally—an early signal of lateral movement or compromise via supply chain relationships.

  • Geo-intelligence and reputation-based controls: Cequence incorporates threat intelligence and geo-based risk scoring to throttle or block traffic from regions known to harbor adversarial infrastructure, including those linked to Iranian operations or their proxies.

Simulate geopolitical threat scenarios: Test your incident response and business continuity plans against scenarios involving nation-state tactics, particularly those aligned with Iran’s known behaviours. 

Data from Cequence can enrich tabletop exercises with real-world indicators of compromise, attack patterns, and telemetry from live bot and API abuse attempts

ByAustech Media
Follow:
Austech Media Press Release - Disclaimer: This press release was submitted by an external organisation All data, statistics, and insights provided by the submitting party.
Previous Article Aussie entrepreneurs are skipping startups and buying established businesses instead Aussie Entrepreneurs Skipping Startups And Buying Established Businesses Instead  
Next Article SYSPRO Expands Smart Manufacturing Capabilities with Acquisition of riteSOFT SYSPRO Acquires riteSOFT To Enhance Smart Factory Solutions
Leave a Comment

Leave a Reply Cancel reply

You must be logged in to post a comment.

Cequence.ai joins Australian authorities in warning against Iranian cyber-attacks

Tech Articles

Australia's Heavy Vehicle EV Charging Market

Australia’s Heavy Vehicle EV Charging Market: A Critical Infrastructure Gap Being Filled

Australia’s heavy EV market is accelerating, but charging is the…

February 15, 2026
Email Authentication Hacking SPF, DKIM, and DMARC business security

Email Authentication: The Security Triple-Lock Your Business Can’t Afford To Ignore

Email authentication relies on SPF, DKIM and DMARC to verify…

January 11, 2026
How Telstra Held Back Australia’s Internet Speed — And What It Means for Users

How Telstra Held Back Australia’s Internet Speed — And What It Means for Users

How Telstra Held Back Australia’s Internet Speed — And What…

January 21, 2026

Recent News

VisualCortex and i-PRO partner
Media Releases

VisualCortex and i-PRO partner to facilitate enterprise-wide Computer Vision technology deployments in APAC

4 Min Read
CONNECTIVITY DIGITAL SERVICES NSW
Media Releases

PeopleTray Develops System To Combat Issues Facing FIFO Workers

5 Min Read
Tencent Cloud BeLive Technology
Media Releases

Tencent Cloud Joins Forces With BeLive Technology

4 Min Read
Lumify Work cements its leadership in ANZ as the key provider of Microsoft Certified Training
Media Releases

Lumify Work Wins Prestigious Microsoft MCT Superstars Award For FY24 Cementing Its Leadership In ANZ

4 Min Read
Tech News

Tech Business News

In 2026, technology news is shaping business outcomes faster than ever—driven by AI adoption, rising cyber risk, cloud modernisation, data regulation, and constant platform change.


Tech News keeps Australian organisations and industry professionals informed with timely reporting and practical coverage across AI, cybersecurity, cloud, enterprise IT, startups, science, people and business, plus major world and local news impacting the tech sector.


Tech Business News publishes news and analysis designed to be clear, relevant, and easy to act on. It supports the industry with technology news reports, whitepaper publishing services, and a range of media, advertising and publishing options 

About

About Us 
Contact Us 
Privacy Policy
Copyright Policy
Terms & Conditions

April, 03, 2026

Contact

Tech Business News
Melbourne, Australia
Werribee 3030
Phone: +61 431401041

Hours : Monday to Friday, 9am 530-pm.

Tech News

© Copyright Tech Business News 

Latest Australian Tech News – 2026

Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?