Cyber Attacks
Discover expert analysis on cyber attacks with news, features and insights from the team at IT Pro.
-
ThreatLabz Report: The state of encrypted attacks
Whitepaper What's hiding in your web traffic?
By ITPro Published
Whitepaper -
Hackers steal personal data of 43 million French job seekers
News The data breach is the largest in French history and comes amid a period of escalating attacks against public services
By Emma Woollacott Published
News -
February rundown: LockBit takedown and ChatGPT woes
ITPro Podcast LockBit was put on the backfoot through international action and OpenAI’s moment of madness will linger in the minds of its customers
By Rory Bathgate Published
ITPro Podcast -
Business email compromise attacks are evolving, but what can be done about it?
In-depth As business email compromise attacks have become more sophisticated, organizations have been forced to adapt tactics in defense
By Solomon Klappholz Published
In-depth -
Here's what you need to know about the AnyDesk breach
News AnyDesk issued a warning after threat actors gained access to production systems, but says there's "no evidence" of customer data loss
By George Fitzmaurice Published
News -
Sneak-and-peek Midnight Blizzard attack highlights “worrying flaws” in Microsoft security processes
News Microsoft leadership communications were exposed through the Midnight Blizzard brute-force password attack
By George Fitzmaurice Published
News -
What are the most-targeted industries for cyber attacks?
In-depth What makes the most-targeted industries for cyber attacks such common victims, and what can they do to shore up security?
By Kate O'Flaherty Published
In-depth -
What is the Computer Misuse Act?
In-depth If your computer systems are attacked, is the Computer Misuse Act effective enough to put those criminals behind bars?
By Jane McCallion Last updated
In-depth -
SOC modernization and the role of XDR
Whitepaper Automate security processes to deliver efficiencies across IT
By ITPro Published
Whitepaper -
LockBit claims “tremendous” Boeing breach, sets deadline for data leak
News Claims hackers used a zero-day to breach Boeing have not been confirmed
By Rory Bathgate Published
News -
What is Citrix Bleed and should you be worried?
News A critical buffer over-read can expose sensitive information in affected devices
By Rory Bathgate Published
News -
Everything we know so far about Okta’s data breach
News Threat actors breached Okta’s support environment and used stolen files to launch further attacks
By Rory Bathgate Published
News