Hacking
Discover expert analysis on hacking with news, features and insights from the team at IT Pro.
-
Cyber attack on US court system being investigated, DoJ confirms
News The early 2020 attack, publicly disclosed for the first time this week, is thought to have had a "staggering effect" on the department and other agencies
By Connor Jones Published
News -
GPS tracker exploit puts the world's most high-value individuals in real-world danger
News Vulnerabilities in a GPS tracker used by governments, militaries, and Fortune 50 companies could be used to track the locations of high-value targets and disable emergency service vehicles
By Connor Jones Published
News -
Roblox hacker posts stolen documents online
News The company said that it has been investigating a phishing incident in which an employee was targeted through social engineering
By Zach Marzouk Published
News -
Will FIDO passwordless authentication save cyber security?
In-depth Plans to eradicate passwords from the business landscape are underway, but there are significant hurdles to overcome
By Debabrata Deb Published
In-depth -
SHI malware attack causes major disruption and forces staff offline
News IT supplier says there's no evidence to suggest customer data was exfiltrated during the "security incident" attack
By Daniel Todd Published
News -
HackerOne employee fired for using position to steal bug bounties
News The threat actor was identified by their duplicate data, which they were trying to pass off as their own for financial gain
By Rory Bathgate Published
News -
Businesses urged to abandon Microsoft Exchange legacy authentication earlier than planned
News Basic Auth will be turned off by Microsoft in October, but CISA wants all organisations to migrate from the vulnerable method as soon as possible
By Connor Jones Published
News -
LockBit 2.0 ransomware disguised as PDFs distributed in email attacks
News Researchers have urged vigilance over compressed attachments sent under false pretenses
By Rory Bathgate Published
News -
How does a SQL injection attack work?
In-depth Understanding one of the simplest, yet most effective, methods of cyber attack
By Adam Shepherd Last updated
In-depth -
Palermo ransomware attack: Vice Society claims responsibility as city details recovery strategy
News The Italian municipality is attempting to defy attackers by restoring its systems from backups
By Connor Jones Published
News -
WithSecure CTO: Industry needs to do a better job of targeting ransomware supply chains
News The centralisation of services and tools for hackers should represent a point of vulnerability for those fighting cyber crime
By Keumars Afifi-Sabet Published
News -
Fresh Microsoft Office zero-day executes code on fully patched applications
News Malicious documents saved in Rich Text Format are especially concerning since they can execute code without even being opened
By Connor Jones Published
News