Cyber Attacks
Latest about Cyber Attacks

UK law firms are facing a torrent of cyber threats – here’s why
By Emma Woollacott published
News Cyber criminals are targeting the sensitive customer data UK law firms hold for ransomware attacks or blackmail

British Library issues £400,000 tender as rebuild continues after 2023 cyber attack
By Solomon Klappholz published
News The British Library's digital transformation project was initially set back by a major cyber attack in October 2023 – now it’s looking to get back on track

Toyota’s cyber woes continue as latest breach marks fifth major IT incident in two years
By Solomon Klappholz published
Toyota is once again in the headlines after a hacker collective claimed to have exfiltrated 240GB of sensitive data from the car manufacturer’s internal systems

Hackers are flocking to a new SMS spam tool
By George Fitzmaurice published
News The Xeon Sender tool has been repurposed by numerous threat actor actors since its initial sighting in 2022

Why attacks against critical national infrastructure (CNI) are such a threat
By Kate O'Flaherty published
In-depth Organizations operating critical national infrastructure face an onslaught of cyber attacks by state-sponsored adversaries, prompting experts to call for better defense strategies and cooperation

How to recover from a DDoS attack – and what they can teach businesses
By Kate O'Flaherty published
In-depth As distributed denial of service (DDoS) attacks get bigger and stealthier, firms that can recover fast and learn from the experience have the edge

Stopping cyber attackers from targeting the weakest links in security
By Peter Ray Allison published
In-depth Hackers are targeting the weakest link in network security – detecting and protecting these most vulnerable points is one of the most urgent jobs for any security team

Protecting the public sector from hackers
By Rory Bathgate published
ITPro Podcast With the public sector facing increasingly sophisticated threat actors, leaders need centralized security plans and better communication
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.