Explore Security
Security
Latest about Security

The Zservers takedown is another big win for law enforcement
By Solomon Klappholz published
News LockBit has been dealt another blow by law enforcement after Dutch police took 127 of its servers offline

There’s a new ransomware player on the scene
By Solomon Klappholz published
News Security experts have warned the BlackLock group could become the most active ransomware operator in 2025

Unlock profitability with Cove Data Protection
By ITPro published
Whitepaper Agile risk management starts with a common language

Ransomware missteps that can cost you
By ITPro published
Whitepaper Agile risk management starts with a common language

The big book of selling data protection
By ITPro published
Whitepaper Agile risk management starts with a common language

Hackers are using this new phishing technique to bypass MFA
By Solomon Klappholz published
News Microsoft has warned that a threat group known as Storm-2372 has altered its tactics using a specific ‘device code phishing’ technique to bypass MFA and steal access tokens.

Why vendor breaches still haunt enterprise IT leaders
By George Fitzmaurice published
News Nearly half (47%) of enterprises suffered highly disruptive outages due to vendor-related breaches last year, according to research from Resilience

Zacks Investment breach could leave 12 million customer accounts exposed
By Solomon Klappholz published
News A threat actor claims to have seized data belonging to 12 million Zacks Investment customer accounts.
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.