IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

cyber crime

Three ransomware attacks hit single company over two weeks
A simple graphic of a white laptop on a red background, with a distorted red padlock showing on the laptop's otherwise black screen
ransomware

Three ransomware attacks hit single company over two weeks

It's the first time an attack of this nature has been seen by the expert researchers
11 Aug 2022
Cisco Talos confirms data breach after ransomware gang 'forces' incident disclosure
A upward angled photo showing the Cisco logo suspended from the ceiling of a dark conference room
data breaches

Cisco Talos confirms data breach after ransomware gang 'forces' incident disclosure

The attack has been attributed to an initial access broker linked to LAPSUS$ and the Yanluowang ransomware groups
11 Aug 2022
Should your business worry about Chinese cyber attacks?
A cyber criminal with the Chinese flag reflected in his glasses
cyber warfare

Should your business worry about Chinese cyber attacks?

State-backed hackers are upping the anti, with businesses on high alert over the potential for falling victim to cyber espionage and IP theft
10 Aug 2022
South Korean public sector organisations targeted by Gwisin ransomware
A simple graphic of a white laptop on a red background, with a distorted red padlock showing on the laptop's otherwise black screen
ransomware

South Korean public sector organisations targeted by Gwisin ransomware

Threat actors tailored attacks on victims such as pharmaceutical companies, with researchers still in the dark on key details
8 Aug 2022
What is Dark Utilities C2 as a service (C2aaS)?
Keyboard with a digital overlay
hacking

What is Dark Utilities C2 as a service (C2aaS)?

Hackers can use the service to launch cyber attacks with ease for as little as £8.50
8 Aug 2022
T-Mobile ‘social engineer’ store owner ran $25 million black market operation
A pink T-Mobile logo on a storefront in Aachen, Germany
cyber crime

T-Mobile ‘social engineer’ store owner ran $25 million black market operation

The five-year campaign saw the former owner defraud the company after stealing more than 50 employees' login credentials
3 Aug 2022
European energy company and gas pipeline hacked by AlphV ransomware
Power lines set against a city at night
ransomware

European energy company and gas pipeline hacked by AlphV ransomware

The ransomware gang responsible is also linked with the group that took down Colonial Pipeline a year ago
2 Aug 2022
Young hacker faces 20-year prison sentence for creating prolific Imminent Monitor RAT
Graphic of a CCTV camera observing anonymous people in a crowd
spyware

Young hacker faces 20-year prison sentence for creating prolific Imminent Monitor RAT

He created the RAT when he was aged just 15 and is estimated to have netted around $400,000 from the sale of it over six years
1 Aug 2022
US doubles reward for information on North Korean cybercrime syndicates
North Korea
cyber crime

US doubles reward for information on North Korean cybercrime syndicates

The news follows the recent Maui ransomware attacks targeting US public health organizations
28 Jul 2022
Equifax eyes increased fraud prevention capabilities with Midigator acquisition
Man entering fake ID information onto a computer
cyber security

Equifax eyes increased fraud prevention capabilities with Midigator acquisition

The deal marks Equifax’s twelfth acquisition since the beginning of 2021
27 Jul 2022
Fraud detection and prevention market to hit $176 billion by 2030
A graphic presenting two people emerging from laptops with one person being a criminal posing as a customer
cyber crime

Fraud detection and prevention market to hit $176 billion by 2030

Payment fraud ranks highest in Acumen’s recent forecast, with identity theft growing by the day
27 Jul 2022
Romanian man extradited to US over Gozi virus hacking charges
A man in handcuffs standing in front of computer equipment in a darkened room
malware

Romanian man extradited to US over Gozi virus hacking charges

The man allegedly ran a service that helped cyber criminals distribute the Gozi virus which ended up infecting over one million computers worldwide, i…
20 Jul 2022
What is threat hunting?
Somebody using a red-backlit keyboard on their laptop
cyber security

What is threat hunting?

Although most threats can be dealt with automatically, the tougher ones require a bit more investigation
15 Jul 2022
Bandai Namco finally confirms massive cyber attack
Bandai Namco logo displayed on a landscape-held smartphone with a city's neon lights in the background
ransomware

Bandai Namco finally confirms massive cyber attack

AlphV/BlackCat claims "data is coming soon" to its deep web blog in a suspected double-extortion ransomware attack
14 Jul 2022
What is cyber insurance?
Graphic with light pastel colours and a padlock overlaid with binary
cyber security

What is cyber insurance?

In an age of increasingly devastating cyber attacks, many businesses are looking to cyber insurance to cushion the financial blow
13 Jul 2022
An analysis of the European cyber threat landscape
Whitepaper cover with title and three colleagues sat at a table laughing togetherwhitepaper
Whitepaper

An analysis of the European cyber threat landscape

Human risk review 2022
8 Jul 2022
Microsoft identifies sophisticated Hive ransomware variant written in Rust
An abstract image showing a person trying to connect to a computer which has a large padlock attached to it, as a ghost wearing a fedora floats menacingly out of it and demands money
Security

Microsoft identifies sophisticated Hive ransomware variant written in Rust

The move away from Go and an encryption redesign makes the new strain even more of a threat to business targets
6 Jul 2022
Latest LockBit ransomware strain 'strikingly similar' to BlackMatter
LockBit 3.0 logo
ransomware

Latest LockBit ransomware strain 'strikingly similar' to BlackMatter

Experts have got their hands on the latest ransomware program from LockBit with "large portions of the code" ripped straight from the scariest strains…
4 Jul 2022
Kaspersky finds most effective phishing emails imitate corporate messages, delivery notifications
A fishing hook rests on top of a stack of credit cards, while a padlock sits in the background out of focus
Security

Kaspersky finds most effective phishing emails imitate corporate messages, delivery notifications

Almost one in five employees clicked links in business related emails, but most emails containing threats or promising money were identified as phishi…
27 Jun 2022
What is phishing as a service (Phaas)?
Graphic representing phishing with a hacker stealing data from one computer to anotheri
cyber security

What is phishing as a service (Phaas)?

With phishing as a service attacks surging, we explain what this low-cost, off-the-shelf method of targeting businesses is and why it’s growing in pop…
15 Jun 2022
How rural businesses can overcome their cyber security handicaps
Digital lines imposed onto a rural business in the sun
Security

How rural businesses can overcome their cyber security handicaps

From a false sense of safety to fewer resources, rural organisations face unique cyber security challenges that need to be addressed
13 Jun 2022
Protecting healthcare from cybercrime
Whitepaper cover with title and image of healthcare professionals in white coats and latex gloves looking at a tablet in a labwhitepaper
Whitepaper

Protecting healthcare from cybercrime

Best practices to address evolving cyber security threats
25 May 2022
Why don’t we ever hear about ransomware demands in the tens of millions of dollars?
Stacks and rows of gold bars
ransomware

Why don’t we ever hear about ransomware demands in the tens of millions of dollars?

At a certain level, the alleged perfect security of the dark web becomes amenable to enquiry
21 May 2022