Cyber Attacks
Latest about Cyber Attacks

Why LinkedIn has become a prime hunting ground for cyber criminals
By Solomon Klappholz published
News Cyber criminals are flocking to LinkedIn to conduct social engineering campaigns, research shows.

How hackers bypass MFA
By Kate O'Flaherty published
In-depth Security leaders must ensure there’s more to their defenses than the simplest identity checks

Malicious GitHub repositories target users with malware
By Emma Woollacott published
News Criminals are exploiting GitHub's reputation to install Lumma Stealer disguised as game hacks and cracked software

UK government doesn't know how vulnerable its IT systems are
By Emma Woollacott published
News A report from the audit watchdog has found creaking legacy systems and a severe cyber skills shortage

UnitedHealth reveals 190 million US citizens were impacted by the Change Healthcare breach
By George Fitzmaurice published
News UnitedHealth has confirmed that 190 million US citizens were affected by the Change Healthcare cyber attack in 2024.

Hackers are using Microsoft Teams to conduct “email bombing” attacks
By George Fitzmaurice published
News Experts told ITPro that tactics like this are on the rise, and employees must be trained effectively

Global cyber attacks jumped 44% last year
By Emma Woollacott published
News A new report from Check Point Software warns of new tactics from threat actors

Hackers are turning S3 buckets against customers
By Solomon Klappholz published
News Attackers are using AWS’ server-side encryption to conduct ransomware attacks
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.