Malware
Latest about Malware

The cost of ‘good enough’ security
By ITPro published
Whitepaper Calculating the true value of cybersecurity solutions

Turning the tables
By ITPro published
Whitepaper How smart email reporting and remediation can transform attackers’ favourite targets into your best defence

Cloud in the crosshairs
By ITPro published
Whitepaper How cyber criminals exploit file-sharing, identity, and supply chain vulnerabilities in Microsoft 365

Beyond awareness training
By ITPro published
Whitepaper Building a sustainable security culture - and why it matters

The human factor report 2023
By ITPro published
Whitepaper Analysing the cyber attack chain

Password auditing guide
By ITPro published
whitepaper Stay ahead of today’s threats and secure your future

The economics of penetration testing for web application security
By ITPro published
whitepaper Get the most value from your security solution

Fake invoice scams are still a major threat to enterprises — and they’re only going to get stealthier
By Solomon Klappholz published
News Fake invoice scams are not a new trend, research shows, but hackers are refining these attacks to make sure they stay an effective entry method
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.