Explore Security
Security
Latest about Security

Personal data compromised in Gateshead Council cyber attack
By Emma Woollacott published
News The Medusa ransomware group has claimed responsibility for the attack

US authorities just purged malware from thousands of devices across the world
By Solomon Klappholz published
News After taking control of the PlugX malware’s command-and-control server, the coalition were able to trigger a self-delete mechanism to remove the malicious program

How the channel can simplify cybersecurity to build trust and agility for SMBs
By Ben Aung published
Industry Insights There's an opportunity for the channel to move from tech resellers to trusted advisors on security and help alleviate the security burden on SMBs

Vulnerability management complexity is leaving enterprises at serious risk
By Emma Woollacott published
News Fragmented data and siloed processes mean remediation is taking too long

Hackers are turning S3 buckets against customers
By Solomon Klappholz published
News Attackers are using AWS’ server-side encryption to conduct ransomware attacks

UK government officials consider banning ransomware payments
By Nicole Kobie published
News Public bodies could be prevented from paying out to hackers to regain control of systems

Phishing campaign targets developers with fake CrowdStrike job offers
By Solomon Klappholz published
News Victims are drawn in with the promise of an interview for a junior developer role at CrowdStrike

A critical Ivanti flaw is being exploited in the wild – here’s what you need to know
By Solomon Klappholz published
News Cyber criminals are actively exploiting a critical RCE flaw affecting Ivanti Connect Secure appliances
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.