Hacking
Discover expert analysis on hacking with news, features and insights from the team at IT Pro.
-
Podcast transcript: Does threat attribution matter?
IT Pro Podcast Read the full transcript for this episode of the IT Pro Podcast
By IT Pro Published
IT Pro Podcast -
Estonia fends off major cyber attack following Soviet-era monuments ousting
News The attack is reportedly one of the largest cyber attacks to hit the country since 2007
By Praharsha Anand Published
News -
Zoom patches privilege escalation flaw for macOS users
News Threat actors were able to use the application’s updater to distribute malicious files at superuser level
By Rory Bathgate Published
News -
Cloudflare scuppers Twilio-like cyber attack with hardware keys
News Phishing attempt was unable to gather information required to access the company’s systems thanks to secure hardware MFA
By Daniel Todd Published
News -
VMware warns of tumultuous threats amid Russia-Ukraine cyber war
News New report underscores burned-out security teams' response to geopolitically motivated cyber attacks
By Praharsha Anand Published
News -
What is Dark Utilities C2 as a service (C2aaS)?
In-depth Hackers can use the service to launch cyber attacks with ease for as little as £8.50
By Connor Jones Published
In-depth -
Nomad happy to forgive hackers if they return 90% of $190 million that was stolen
News The crypto bridge is offering 'white hat hackers' a 10% bounty following the attack earlier this week
By Zach Marzouk Published
News -
Auditors blame massive $4 million cryptocurrency heist on leaky logging technology
News Investigators raised concern over the thousands of vulnerable wallets containing Solana, USDC and other tokens
By Connor Jones Published
News -
Over 200,000 DrayTek routers vulnerable to total device takeover
News The routers are popular with small and medium businesses, but are easily exploitable by threat actors seeking to steal data or launch ransomware
By Rory Bathgate Published
News -
Tory party delays leadership selection over hacking fears
News The Conservatives have also been forced to abandon plans to allow members to change their vote later in the contest
By Zach Marzouk Published
News -
Nomad crypto bridge drained of $190 million through “chaotic” exploit
News The Nomad team has notified law enforcement and retained leading firms for blockchain intelligence and forensics, it said in a statement on Twitter
By Zach Marzouk Published
News -
Twitter API keys found leaked in over 3,200 apps, raising concerns for linked accounts
News Business and verified Twitter accounts linked to affected apps are at risk of takeover, use in malicious campaigns
By Rory Bathgate Published
News