Latest about Cyber Attacks
What is Citrix Bleed and should you be worried?
By Rory Bathgate published
News A critical buffer over-read can expose sensitive information in affected devices
Everything we know so far about Okta’s data breach
By Rory Bathgate published
News Threat actors breached Okta’s support environment and used stolen files to launch further attacks
New Bing AI bug bounty program offers rewards of up to $15,000
By Rory Bathgate published
News The Bing AI bug bounty aims to catch flaws that would let attackers alter the behavior of the chatbot
What is business email compromise (BEC)?
By Kate O'Flaherty published
In-Depth Business email compromise (BEC) is surging. What is BEC, why is it growing, and how can firms spot and mitigate attacks?
Here's what you need to know about the upcoming curl security patches
By Rory Bathgate published
News Developers behind the open source library described one Curl vulnerability as one of the worst they've ever encountered
Hackers are spoofing themselves as GitHub's Dependabot to steal user passwords
By Connor Jones published
News GitHub Dependabot was crudely spoofed in hundreds of successful attacks on open source projects
JetBrains TeamCity critical vulnerability opens door for supply chain attacks
By Connor Jones published
News TeamCity users are advised to install JetBrains' full upgrade rather than just relying on the available hotfixes
Novel China-linked Linux backdoor exploits organizations that fail to patch old vulnerabilities
By Ross Kelly published
News The threat should serve as a “wake-up call” for organizations running Linux, an expert has said
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.