Latest about Hacking
Escape the ransomware maze
By ITPro published
Whitepaper Conventional endpoint protection tools just aren’t the best defence anymore
The IT Pro Podcast: Does threat attribution matter?
By IT Pro published
IT Pro Podcast There are many clues that can tell us who’s behind a hack - but it may not be worth knowing
Podcast transcript: Does threat attribution matter?
By IT Pro published
IT Pro Podcast Read the full transcript for this episode of the IT Pro Podcast
Estonia fends off major cyber attack following Soviet-era monuments ousting
By Praharsha Anand published
News The attack is reportedly one of the largest cyber attacks to hit the country since 2007
Zoom patches privilege escalation flaw for macOS users
By Rory Bathgate published
News Threat actors were able to use the application’s updater to distribute malicious files at superuser level
Cloudflare scuppers Twilio-like cyber attack with hardware keys
By Daniel Todd published
News Phishing attempt was unable to gather information required to access the company’s systems thanks to secure hardware MFA
VMware warns of tumultuous threats amid Russia-Ukraine cyber war
By Praharsha Anand published
News New report underscores burned-out security teams' response to geopolitically motivated cyber attacks
What is Dark Utilities C2 as a service (C2aaS)?
By Connor Jones published
In-depth Hackers can use the service to launch cyber attacks with ease for as little as £8.50
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.