security
-
Warning issued over ‘fast flux’ techniques used to obscure malicious signals on compromised networks
News Cybersecurity agencies have issued a stark message that too little is being done to sniff out malware hiding in corporate networks
By Rory Bathgate Published
News -
Zero trust gains momentum amid growing network visibility challenges
News Organizations are looking to automation, orchestration, and risk mitigation as key security priorities
By Emma Woollacott Published
News -
Security experts issue warning over the rise of 'gray bot' AI web scrapers
News While not malicious, the bots can overwhelm web applications in a way similar to bad actors
By Jane McCallion Published
News -
Bugcrowd’s new MSP program looks to transform pen testing for small businesses
News Cybersecurity provider Bugcrowd has launched a new service aimed at helping MSP’s drive pen testing capabilities - with a particular focus on small businesses.
By Ross Kelly Published
News -
ICO admits it's too slow dealing with complaints
News The UK's data protection authority has apologized for being slow to respond to data protection complaints, saying it's been overwhelmed by increased workloads.
By Emma Woollacott Published
News -
Cyber scams cost businesses $1.7 million per year, claims report
News Supply chain attacks, brand impersonation, and APTs top the list of threats to businesses
By Jane McCallion Published
News -
Fake North Korean IT workers have expanded to Europe
News Individuals from the Democratic People's Republic of Korea (DPRK) are now infiltrating European organizations
By Emma Woollacott Published
News -
Surging DDoS attack rates show no sign of slowing down – here’s why
News The number of DDoS attacks has shot up since the first half of last year, according to new research.
By Emma Woollacott Published
News -
ReliaQuest targets international growth, agentic AI gains with $500 million investment
News Cybersecurity firm ReliaQuest has raised $500 million as part of a funding round aimed at accelerating international growth and product development.
By Ross Kelly Published
News -
Former GCHQ intern risked national security after taking home top secret data
News A former GCHQ intern has pleaded guilty to transferring data from a top-secret computer onto his work phone.
By Bobby Hellard Published
News -
What are business logic vulnerabilities?
Explainer Business logic vulnerabilities let attackers exploit design flaws in software, bypassing security controls to manipulate pricing, authentication, and more
By David Howell Published
Explainer -
ITPro launches Picks 2025 Awards
We will be celebrating the best of the best in cybersecurity in June...
By ITPro Published