Latest about Cyber Attacks
SOC modernization and the role of XDR
By ITPro published
Whitepaper Automate security processes to deliver efficiencies across IT
LockBit claims “tremendous” Boeing breach, sets deadline for data leak
By Rory Bathgate published
News Claims hackers used a zero-day to breach Boeing have not been confirmed
What is Citrix Bleed and should you be worried?
By Rory Bathgate published
News A critical buffer over-read can expose sensitive information in affected devices
Everything we know so far about Okta’s data breach
By Rory Bathgate published
News Threat actors breached Okta’s support environment and used stolen files to launch further attacks
New Bing AI bug bounty program offers rewards of up to $15,000
By Rory Bathgate published
News The Bing AI bug bounty aims to catch flaws that would let attackers alter the behavior of the chatbot
What is business email compromise (BEC)?
By Kate O'Flaherty published
In-Depth Business email compromise (BEC) is surging. What is BEC, why is it growing, and how can firms spot and mitigate attacks?
Here's what you need to know about the upcoming curl security patches
By Rory Bathgate published
News Developers behind the open source library described one Curl vulnerability as one of the worst they've ever encountered
Hackers are spoofing themselves as GitHub's Dependabot to steal user passwords
By Connor Jones published
News GitHub Dependabot was crudely spoofed in hundreds of successful attacks on open source projects
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.