Explore Security
Security
Latest about Security

DevSecOps is dead...or is it?:
By ITPro published
Whitepaper A buyer's guide for meeting the unprecedented speed and complexity of today's development practices

Developer security best practices for FinServ
By ITPro last updated
Whitepaper Developer security in a financial services institution

Optimizing AppSec in the financial services sector
By ITPro last updated
Whitepaper A buyer's guide for meeting the unprecedented speed and complexity of today's development practices

Two of the world's largest cyber crime forums knocked offline
By Emma Woollacott published
News Two cyber crime forums, Cracked and Nulled, have been taken down as part of a police operation involving international partners.

How hackers bypass MFA
By Kate O'Flaherty published
In-depth Security leaders must ensure there’s more to their defenses than the simplest identity checks

Malicious GitHub repositories target users with malware
By Emma Woollacott published
News Criminals are exploiting GitHub's reputation to install Lumma Stealer disguised as game hacks and cracked software

UK government doesn't know how vulnerable its IT systems are
By Emma Woollacott published
News A report from the audit watchdog has found creaking legacy systems and a severe cyber skills shortage

Hackers are using a new AI chatbot to create malware
By Nicole Kobie published
News Researchers at Abnormal Security have warned about the rise of GhostGPT, a new chatbot used by cyber criminals to create malicious code and malware.
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.