IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

hacking

Auditors blame massive $4 million cryptocurrency heist on leaky logging technology
Stacks of dollars set against a blue and red background of binary code, denoting cryptocurrency and monetary value
hacking

Auditors blame massive $4 million cryptocurrency heist on leaky logging technology

Investigators raised concern over the thousands of vulnerable wallets containing Solana, USDC and other tokens
4 Aug 2022
Tory party delays leadership selection over hacking fears
Sunak and Truss standing next to each other at a BBC debate
hacking

Tory party delays leadership selection over hacking fears

The Conservatives have also been forced to abandon plans to allow members to change their vote later in the contest
3 Aug 2022
Nomad crypto bridge drained of $190 million through “chaotic” exploit
Blocks organised in several lines to represent blockchain technology
hacking

Nomad crypto bridge drained of $190 million through “chaotic” exploit

The Nomad team has notified law enforcement and retained leading firms for blockchain intelligence and forensics, it said in a statement on Twitter
2 Aug 2022
Twitter API keys found leaked in over 3,200 apps, raising concerns for linked accounts
Twitter's own page on a smartphone
Security

Twitter API keys found leaked in over 3,200 apps, raising concerns for linked accounts

Business and verified Twitter accounts linked to affected apps are at risk of takeover, use in malicious campaigns
2 Aug 2022
Cyber attack on US court system being investigated, DoJ confirms
Matthew Olsen of the US National Security Division
cyber attacks

Cyber attack on US court system being investigated, DoJ confirms

The early 2020 attack, publicly disclosed for the first time this week, is thought to have had a "staggering effect" on the department and other agenc…
29 Jul 2022
Data on 69 million Neopets users stolen and listed for sale on hacker forum
A woman sketching cartoon characters using a tablet while looking at a second monitor
Security

Data on 69 million Neopets users stolen and listed for sale on hacker forum

Email addresses, passwords, and zip codes are all thought to have been stolen by the hacker
21 Jul 2022
GPS tracker exploit puts the world's most high-value individuals in real-world danger
A hacker against a red background
hacking

GPS tracker exploit puts the world's most high-value individuals in real-world danger

Vulnerabilities in a GPS tracker used by governments, militaries, and Fortune 50 companies could be used to track the locations of high-value targets …
20 Jul 2022
Roblox hacker posts stolen documents online
A smartphone with Roblox characters and logo on the screen
phishing

Roblox hacker posts stolen documents online

The company said that it has been investigating a phishing incident in which an employee was targeted through social engineering
18 Jul 2022
Will FIDO passwordless authentication save cyber security?
A digital padlock representing security
cyber security

Will FIDO passwordless authentication save cyber security?

Plans to eradicate passwords from the business landscape are underway, but there are significant hurdles to overcome
14 Jul 2022
Australian university suffers data breach of 47,000 students
Digital generated image of electronic circuit security padlock made out of numbers on black background.
data breaches

Australian university suffers data breach of 47,000 students

The attacker also launched a smishing attempt while inside the university’s systems
13 Jul 2022
SHI malware attack causes major disruption and forces staff offline
Digital generated image of electronic circuit security padlock made out of numbers on black background.
cyber attacks

SHI malware attack causes major disruption and forces staff offline

IT supplier says there's no evidence to suggest customer data was exfiltrated during the "security incident" attack
8 Jul 2022
HackerOne employee fired for using position to steal bug bounties
A hand holding a magnifying glass reveals a red lock, unlocked among several blue locked locks
Security

HackerOne employee fired for using position to steal bug bounties

The threat actor was identified by their duplicate data, which they were trying to pass off as their own for financial gain
4 Jul 2022
Businesses urged to abandon Microsoft Exchange legacy authentication earlier than planned
Digital padlock hovering over a screen
Security

Businesses urged to abandon Microsoft Exchange legacy authentication earlier than planned

Basic Auth will be turned off by Microsoft in October, but CISA wants all organisations to migrate from the vulnerable method as soon as possible
30 Jun 2022
How does a SQL injection attack work?
SQL injection
hacking

How does a SQL injection attack work?

Understanding one of the simplest, yet most effective, methods of cyber attack
10 Jun 2022
Palermo ransomware attack: Vice Society claims responsibility as city details recovery strategy
Photograph taken of an old building in Palermo, Italy, with the sun setting in the background over the hills
ransomware

Palermo ransomware attack: Vice Society claims responsibility as city details recovery strategy

The Italian municipality is attempting to defy attackers by restoring its systems from backups
10 Jun 2022
WithSecure CTO: Industry needs to do a better job of targeting ransomware supply chains
Abstract image showing a red circuit board containing a square chip with a glowing skull etched into it
ransomware

WithSecure CTO: Industry needs to do a better job of targeting ransomware supply chains

The centralisation of services and tools for hackers should represent a point of vulnerability for those fighting cyber crime
1 Jun 2022
Fresh Microsoft Office zero-day executes code on fully patched applications
A magnifying glass hovering over a PC screen with the symbols for Microsoft Office software displayed
zero-day exploit

Fresh Microsoft Office zero-day executes code on fully patched applications

Malicious documents saved in Rich Text Format are especially concerning since they can execute code without even being opened
30 May 2022
What is hacktivism?
Two masked members of Anonymous demonstrating during the Occupy protest on October 15, 2011 in The Hague
hacking

What is hacktivism?

From Anonymous to Omega, here’s everything you need to know about hackers with a conscience
27 May 2022
Linux-based Cheerscrypt ransomware found targeting VMware ESXi servers
A smartphone, lying on its side in front of a data graphic, with the word VMware displayed
ransomware

Linux-based Cheerscrypt ransomware found targeting VMware ESXi servers

Cheerscrypt malware could cause severe disruption to companies using the virtualisation software
26 May 2022
Open source packages with millions of installs hacked to harvest AWS credentials
A screen showing code written in Python
hacking

Open source packages with millions of installs hacked to harvest AWS credentials

Two popular open source packages used by Python and PHP developers have been quietly compromised with successful attacks already being reported
24 May 2022
What is cyber warfare?
A red world map with white pixels
Security

What is cyber warfare?

We explain what cyber warfare is and why you need to pay attention to the threats posed
20 May 2022
Russian hackers declare war on 10 countries after failed Eurovision DDoS attack
Flag of Russia on a computer binary codes falling from the top and fading away
hacking

Russian hackers declare war on 10 countries after failed Eurovision DDoS attack

Italian police thwart cyber attacks on Eurovision's voting systems from the Russian-linked hacker group Killnet after the same group targeted public s…
16 May 2022
The rise of double extortion ransomware
Red computer screen with "RANSOM!" on it
ransomware

The rise of double extortion ransomware

With the use of this tactic increasing, we look at how you can protect your business
13 May 2022
WannaCry's ghost is still wreaking havoc
Abstract image of a ghost on a digital screen
ransomware

WannaCry's ghost is still wreaking havoc

A retooled version of the infamous ransomware strain continues to haunt corporate networks around the world
12 May 2022