Security
Discover expert analysis on security with news, features and insights from the team at IT Pro.
Explore Security
-
The new ransomware groups worrying security researchers in 2025
In-depth Who are the new ransomware groups on the block, what are their aims – and what are their novel attacks methods?
By Kate O'Flaherty Published
In-depth -
Why ‘malware as a service’ is becoming a serious problem
News Researchers have issued a warning over the rise of 'malware as a service' platforms amid a surge in attacks over the last year.
By Solomon Klappholz Published
News -
Billions of IoT devices will need to be secured in the next four years – zero trust could be the key to success
News Researchers have warned more than 28 billion IoT devices will need to be secured by 2028 as attacks on connected devices surge.
By Emma Woollacott Published
News -
How an online B2B resale platform helps handle post-holiday returns
Whitepaper A buyer's guide for meeting the unprecedented speed and complexity of today's development practices
By ITPro Published
Whitepaper -
The State of B2B Recommerce
Whitepaper A buyer's guide for meeting the unprecedented speed and complexity of today's development practices
By ITPro Published
Whitepaper -
Solving the sustainability problem: Fueling the secondary market with high-value goods
Whitepaper A buyer's guide for meeting the unprecedented speed and complexity of today's development practices
By ITPro Published
Whitepaper -
The Zservers takedown is another big win for law enforcement
News LockBit has been dealt another blow by law enforcement after Dutch police took 127 of its servers offline
By Solomon Klappholz Published
News -
There’s a new ransomware player on the scene
News Security experts have warned the BlackLock group could become the most active ransomware operator in 2025
By Solomon Klappholz Published
News -
Unlock profitability with Cove Data Protection
Whitepaper Agile risk management starts with a common language
By ITPro Published
Whitepaper -
Ransomware missteps that can cost you
Whitepaper Agile risk management starts with a common language
By ITPro Published
Whitepaper -
The big book of selling data protection
Whitepaper Agile risk management starts with a common language
By ITPro Published
Whitepaper -
Hackers are using this new phishing technique to bypass MFA
News Microsoft has warned that a threat group known as Storm-2372 has altered its tactics using a specific ‘device code phishing’ technique to bypass MFA and steal access tokens.
By Solomon Klappholz Published
News