Connor Jones
Connor Jones has been at the forefront of global cyber security news coverage for the past few years, breaking developments on major stories such as LockBit’s ransomware attack on Royal Mail International, and many others. He has also made sporadic appearances on the ITPro Podcast discussing topics from home desk setups all the way to hacking systems using prosthetic limbs.
Connor has previously written for the likes of Red Bull Esports and UNILAD, before a lengthy stint at ITPro. He has a master’s degree in Magazine Journalism from one of the UK’s leading journalism departments at the University of Sheffield, as well as an undergraduate degree in English Language from Sheffield Hallam University.
When he’s not hitting the phones trying to squeeze stories out of sources and press offices, in his free time Connor studies software development, is a keen cook, and enjoys leading an active life through cycling, hiking, racket sports, and weightlifting.
Latest articles by Connor Jones
![Gold Apple iPhone 5s held against a gold iPhone 6s by a woman in an Apple store](https://cdn.mos.cms.futurecdn.net/LEXWMhknDpUNcoHiaVoNJ8-320-80.jpg)
Apple breaks update policy to secure older iPhones and iPads against zero-day
By Connor Jones published
News It's been four years since the company patched an end-of-life device against a major vulnerability
![Xcode environment showcasing new features added at WWDC 2022](https://cdn.mos.cms.futurecdn.net/TnwSpiWAATnvbvutMQHfPT-320-80.jpg)
Apple expands Xcode Cloud platform with launch of paid subscriptions
By Connor Jones published
News The new paid tiers will allow development teams to purchase additional compute resources for uses such as app testing and automated bug hunting
![Parliament of Montenegro](https://cdn.mos.cms.futurecdn.net/MsvnuuchcyDBCcQuG3tfui-320-80.jpg)
Cuba ransomware group claims attack on Montenegro government
By Connor Jones published
News The double extortion specialists claim to have stolen the data days before Montenegro announced a sustained and co-ordinated series of cyber attacks targeting it from Russia
![A digital render of a blue padlock fragmenting into a cloud of data](https://cdn.mos.cms.futurecdn.net/oX9XyayN63jXpqGSoj5zdB-320-80.jpg)
More than 130 organisations affected by “inexperienced” Twilio hackers
By Connor Jones published
News A thorough investigation revealed sophisticated methods coupled with relatively unsophisticated tooling
![The Plex logo displayed on a black background](https://cdn.mos.cms.futurecdn.net/oztCTQyPvrdgKbby9YKXSE-320-80.png)
Plex confirms passwords, emails stolen in “limited” data breach
By Connor Jones published
News The video streaming giant is requiring all users to reset their passwords in case the stolen hashed passwords can be cracked
![Abstract image of a padlock on a dark blue background to represent cyber security](https://cdn.mos.cms.futurecdn.net/2jYqxQWEJ7hyP7B34uWZUn-320-80.jpg)
Digital transformation giant Orion Innovation hit by LockBit ransomware, hacker group claims
By Connor Jones published
News The company has a star-studded client list that includes some of the biggest sports organisations in the world and an assortment of tech behemoths
![Office workers in India at their desks](https://cdn.mos.cms.futurecdn.net/YQZUADcbEfrfVA4gZRJmjV-320-80.jpg)
IT teams need to optimise and tackle tech debt ahead of economic downturn, warn analysts
By Connor Jones published
News Forrester argues shrinking budgets will require tough decisions on spending, although innovation should continue where possible
![LockBit 3.0 logo](https://cdn.mos.cms.futurecdn.net/jL6hcbhCjjMxY3gN2w2dJo-320-80.jpg)
LockBit hacking group to be 'more aggressive' after falling victim to large-scale DDoS attack
By Connor Jones published
News The ransomware group is currently embroiled in a battle after it leaked data belonging to cyber security company Entrust
![The Capitol building in Washington, DC](https://cdn.mos.cms.futurecdn.net/kkTAvBdVdtUXsuJ3SVTcVZ-320-80.jpg)
US government set to outlaw leaky software in the military
By Connor Jones published
News The 'secure-by-design' approach has been met broadly positively by experts and will aim to prevent high-profile security incidents
![A symbol of a white padlock inside the outline of a shield on a red microchip](https://cdn.mos.cms.futurecdn.net/5ZTNVsy5m5Zunicxnf8EmX-320-80.jpg)
Apple patches 'superpower' zero-days affecting iPhones, iPads, and Macs
By Connor Jones published
News The RCE and kernel-level bugs may have been actively exploited and could give high-level privileges to attackers
![Mockup of the UK viewed from space, but with a neon red overlay to demote global cyber security](https://cdn.mos.cms.futurecdn.net/iXzK7zGXN6AZbgYcWr9yK9-320-80.jpg)
Calls for international support to fight ‘uncontrollable’ ransomware surge in developing countries
By Connor Jones published
News Rapidly growing internet penetration is outpacing implementation of appropriate cyber security standards while countries in Global South are excluded from benefits of international sanctions
![A woman and two men having an important business discussion](https://cdn.mos.cms.futurecdn.net/urAcwSy5hKR7i3KvGiQU8T-320-80.jpg)
Most business leaders only prioritise cyber security after a major breach, report finds
By Connor Jones published
News UK government research on hacked UK businesses revealed a general lack of engagement from board members and senior management on security matters
![A smartphone sat on top of a white keyboard with the Signal app logo superimposed onto the phone's display - an image all set in dark blue and black lighting](https://cdn.mos.cms.futurecdn.net/najgS7VeKqTawCG5Th9gXC-320-80.jpg)
Signal confirms 1,900 of its users were hit by Twilio breach
By Connor Jones published
News Last week's phishing attack on Twilio has exposed phone numbers exposed and compromised user accounts
![Ransomware mockup with dark red colour scheme, a lock denoting encryption, and binary code set in the backdrop](https://cdn.mos.cms.futurecdn.net/cBajWuTEG6Xgkp68dMFCNW-320-80.jpg)
UK water supplier confirms hack by Cl0p ransomware gang
By Connor Jones published
News The 'sympathetic' ransomware group originally misattributed the victim as Thames Water
![A graphic of a printer spewing paper across a green background](https://cdn.mos.cms.futurecdn.net/VwUUxNZXrfoP3muTCx6gyS-320-80.jpg)
How do wireless printers work?
By Connor Jones published
In-depth Printers are still essential in the modern office, but wireless printers are perhaps the most useful
![A simple graphic of a white laptop on a red background, with a distorted red padlock showing on the laptop's otherwise black screen](https://cdn.mos.cms.futurecdn.net/BRAvsmRa4oYkmULN9aNPQH-320-80.jpg)
Three ransomware attacks hit single company over two weeks
By Connor Jones published
News It's the first time an attack of this nature has been seen by the expert researchers
![A upward angled photo showing the Cisco logo suspended from the ceiling of a dark conference room](https://cdn.mos.cms.futurecdn.net/h8RDwWwXd4iRuWjaLVeoXK-320-80.jpg)
Cisco Talos confirms data breach after ransomware gang 'forces' incident disclosure
By Connor Jones published
News The attack has been attributed to an initial access broker linked to LAPSUS$ and the Yanluowang ransomware groups
![The crowd during a match at Liverpool FC's Anfield stadium](https://cdn.mos.cms.futurecdn.net/S7miteCKLAsCAXbqGuMqBc-320-80.jpg)
Inside Liverpool FC's cyber recruitment revolution
By Connor Jones published
Case Studies The next generation of cyber talent is best scouted pitchside with former youth players armed to the teeth with the soft skills businesses are crying out for
![Microsoft Windows 11 logo on a smartphone set against a background of neon blue code on a screen to denote a cyber security theme](https://cdn.mos.cms.futurecdn.net/7VYEef5aeuutQXcvxqPgUc-320-80.jpg)
Dogwalk RCE variant among 121 vulnerabilities fixed in Microsoft's August Patch Tuesday
By Connor Jones published
News The second-biggest security update released by Microsoft this year featured 17 critical-rated RCEs and privilege escalation bugs
![China flag is depicted on the screen in program code](https://cdn.mos.cms.futurecdn.net/9QcH5RxDnssSJwzMU7X3od-320-80.jpg)
Both Russia and Ukraine targeted by Chinese state-backed hackers
By Connor Jones published
News A five-year-old Microsoft Office vulnerability was enough to gain a significant foothold in some of the most high-value organisations in each country
![Keyboard with a digital overlay](https://cdn.mos.cms.futurecdn.net/ZzEtmAWxrh7ueMbqXGH6oN-320-80.jpg)
What is Dark Utilities C2 as a service (C2aaS)?
By Connor Jones published
In-depth Hackers can use the service to launch cyber attacks with ease for as little as £8.50
![The NHS website as seen on an internet browser](https://cdn.mos.cms.futurecdn.net/WXZgQTSHenuJb2Usx8kKB8-320-80.jpg)
Cyber attack on software supplier causes "major outage" across the NHS
By Connor Jones published
News Unconfirmed reports suggest the attack may be ransomware-related, while the NHS contends with disrupted services on the 111 non-emergency line
![The Windows logo on a phone in front of a malware warning](https://cdn.mos.cms.futurecdn.net/T3kcYWHsx4f9aTsbZJgEhn-320-80.jpg)
Decade-old malware strains top annual list of most pervasive business exploits
By Connor Jones published
News Allied cyber security authorities say the most active strains of 2021 have been in operation for longer than five years, and are being constantly developed
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.