Cyber Attacks
Latest about Cyber Attacks

Hackers are turning S3 buckets against customers
By Solomon Klappholz published
News Attackers are using AWS’ server-side encryption to conduct ransomware attacks

2024 was a record year for commercial cyber attacks
By Emma Woollacott published
News China-backed attacks on IoT systems helped keep numbers high

China cyber threats: What businesses can do to protect themselves
By Kate O'Flaherty published
In-depth As attacks from the likes of Salt Typhoon escalate, business leaders must take a proactive approach to improving their cyber capabilities

Everything you need to know about Cloudflare
By David Howell last updated
In-depth A look at Cloudflare’s journey from a web security startup to a leader in internet performance, including what customers can expect from the company

Chinese threat actors breached the US Treasury in ‘major incident’ – here’s what you need to know
By Solomon Klappholz published
News The attackers took control of Treasury Department workstations to access the office in charge of US economic sanctions, officials say

IntelBroker leaks 2.9 TB of exposed Cisco records
By Solomon Klappholz published
News The hacker claims to have 4.5TB of data associated with Cisco products and telecoms and financial services customers

LastPass breach comes back to haunt users as hackers steal $12 million in cryptocurrency
By Solomon Klappholz published
News The hackers behind the LastPass breach are on a rampage two years after their initial attack

Russia is targeting unpatched vulnerabilities – what can tech leaders do to shore up defenses?
By Kate O'Flaherty published
In-depth Understanding the leading Russian threat groups and their methodologies is the key to a robust business cyber strategy
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.