Latest about Cyber Attacks
What is the Computer Misuse Act?
By Jane McCallion last updated
In-depth If your computer systems are attacked, is the Computer Misuse Act effective enough to put those criminals behind bars?
SOC modernization and the role of XDR
By ITPro published
Whitepaper Automate security processes to deliver efficiencies across IT
LockBit claims “tremendous” Boeing breach, sets deadline for data leak
By Rory Bathgate published
News Claims hackers used a zero-day to breach Boeing have not been confirmed
What is Citrix Bleed and should you be worried?
By Rory Bathgate published
News A critical buffer over-read can expose sensitive information in affected devices
Everything we know so far about Okta’s data breach
By Rory Bathgate published
News Threat actors breached Okta’s support environment and used stolen files to launch further attacks
New Bing AI bug bounty program offers rewards of up to $15,000
By Rory Bathgate published
News The Bing AI bug bounty aims to catch flaws that would let attackers alter the behavior of the chatbot
What is business email compromise (BEC)?
By Kate O'Flaherty published
In-Depth Business email compromise (BEC) is surging. What is BEC, why is it growing, and how can firms spot and mitigate attacks?
Here's what you need to know about the upcoming curl security patches
By Rory Bathgate published
News Developers behind the open source library described one Curl vulnerability as one of the worst they've ever encountered
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.