IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

hacking

GPS tracker exploit puts the world's most high-value individuals in real-world danger
A hacker against a red background
hacking

GPS tracker exploit puts the world's most high-value individuals in real-world danger

Vulnerabilities in a GPS tracker used by governments, militaries, and Fortune 50 companies could be used to track the locations of high-value targets …
20 Jul 2022
Roblox hacker posts stolen documents online
A smartphone with Roblox characters and logo on the screen
phishing

Roblox hacker posts stolen documents online

The company said that it has been investigating a phishing incident in which an employee was targeted through social engineering
18 Jul 2022
Will FIDO passwordless authentication save cyber security?
A digital padlock representing security
cyber security

Will FIDO passwordless authentication save cyber security?

Plans to eradicate passwords from the business landscape are underway, but there are significant hurdles to overcome
14 Jul 2022
Australian university suffers data breach of 47,000 students
Digital generated image of electronic circuit security padlock made out of numbers on black background.
data breaches

Australian university suffers data breach of 47,000 students

The attacker also launched a smishing attempt while inside the university’s systems
13 Jul 2022
SHI malware attack causes major disruption and forces staff offline
Digital generated image of electronic circuit security padlock made out of numbers on black background.
cyber attacks

SHI malware attack causes major disruption and forces staff offline

IT supplier says there's no evidence to suggest customer data was exfiltrated during the "security incident" attack
8 Jul 2022
HackerOne employee fired for using position to steal bug bounties
A hand holding a magnifying glass reveals a red lock, unlocked among several blue locked locks
Security

HackerOne employee fired for using position to steal bug bounties

The threat actor was identified by their duplicate data, which they were trying to pass off as their own for financial gain
4 Jul 2022
Businesses urged to abandon Microsoft Exchange legacy authentication earlier than planned
Digital padlock hovering over a screen
Security

Businesses urged to abandon Microsoft Exchange legacy authentication earlier than planned

Basic Auth will be turned off by Microsoft in October, but CISA wants all organisations to migrate from the vulnerable method as soon as possible
30 Jun 2022
How does a SQL injection attack work?
SQL injection
hacking

How does a SQL injection attack work?

Understanding one of the simplest, yet most effective, methods of cyber attack
10 Jun 2022
Palermo ransomware attack: Vice Society claims responsibility as city details recovery strategy
Photograph taken of an old building in Palermo, Italy, with the sun setting in the background over the hills
ransomware

Palermo ransomware attack: Vice Society claims responsibility as city details recovery strategy

The Italian municipality is attempting to defy attackers by restoring its systems from backups
10 Jun 2022
WithSecure CTO: Industry needs to do a better job of targeting ransomware supply chains
Abstract image showing a red circuit board containing a square chip with a glowing skull etched into it
ransomware

WithSecure CTO: Industry needs to do a better job of targeting ransomware supply chains

The centralisation of services and tools for hackers should represent a point of vulnerability for those fighting cyber crime
1 Jun 2022
Fresh Microsoft Office zero-day executes code on fully patched applications
A magnifying glass hovering over a PC screen with the symbols for Microsoft Office software displayed
zero-day exploit

Fresh Microsoft Office zero-day executes code on fully patched applications

Malicious documents saved in Rich Text Format are especially concerning since they can execute code without even being opened
30 May 2022
What is hacktivism?
Two masked members of Anonymous demonstrating during the Occupy protest on October 15, 2011 in The Hague
hacking

What is hacktivism?

From Anonymous to Omega, here’s everything you need to know about hackers with a conscience
27 May 2022
Linux-based Cheerscrypt ransomware found targeting VMware ESXi servers
A smartphone, lying on its side in front of a data graphic, with the word VMware displayed
ransomware

Linux-based Cheerscrypt ransomware found targeting VMware ESXi servers

Cheerscrypt malware could cause severe disruption to companies using the virtualisation software
26 May 2022
Open source packages with millions of installs hacked to harvest AWS credentials
A screen showing code written in Python
hacking

Open source packages with millions of installs hacked to harvest AWS credentials

Two popular open source packages used by Python and PHP developers have been quietly compromised with successful attacks already being reported
24 May 2022
What is cyber warfare?
A red world map with white pixels
Security

What is cyber warfare?

We explain what cyber warfare is and why you need to pay attention to the threats posed
20 May 2022
Russian hackers declare war on 10 countries after failed Eurovision DDoS attack
Flag of Russia on a computer binary codes falling from the top and fading away
hacking

Russian hackers declare war on 10 countries after failed Eurovision DDoS attack

Italian police thwart cyber attacks on Eurovision's voting systems from the Russian-linked hacker group Killnet after the same group targeted public s…
16 May 2022
The rise of double extortion ransomware
Red computer screen with "RANSOM!" on it
ransomware

The rise of double extortion ransomware

With the use of this tactic increasing, we look at how you can protect your business
13 May 2022
WannaCry's ghost is still wreaking havoc
Abstract image of a ghost on a digital screen
ransomware

WannaCry's ghost is still wreaking havoc

A retooled version of the infamous ransomware strain continues to haunt corporate networks around the world
12 May 2022
IoT privacy and security concerns
A secure network depicted by connected padlocks
Security

IoT privacy and security concerns

We take a look at what's needed to really secure internet-connected devices
6 May 2022
How do you become an ethical hacker?
Ethical hacker silhouette walking through a keyhole, symbolising physical security and penetration testing
ethical hacking

How do you become an ethical hacker?

We examine what certifications do you need, what jobs are available and how much you can expect to be paid
29 Apr 2022
DDoS attacks surge to record numbers in 2022 as a result of Russia-Ukraine war
Mockup depicting crumbled relationship between Ukraine and Russia
distributed denial of service (DDOS)

DDoS attacks surge to record numbers in 2022 as a result of Russia-Ukraine war

Cases this year saw some of the longest-lasting DDoS attacks ever seen as hacktivists assembled to take on their enemies in the ongoing cyber war betw…
26 Apr 2022
Russian-affiliates believed to be behind cyber attacks on wind turbines firms
Wind turbine from Vestas Wind Systems
cyber attacks

Russian-affiliates believed to be behind cyber attacks on wind turbines firms

Three German-based renewable energy companies attacked as country attempts to wean itself off Russian oil
26 Apr 2022
What is the LAPSUS$ group and who is behind the criminal operation?
An image of a digital padlock with code around it
cyber attacks

What is the LAPSUS$ group and who is behind the criminal operation?

The most prolific cyber criminals of 2022 have largely evaded identification for months despite being anything but secretive in the way they work
26 Apr 2022
LAPSUS$ breached T-Mobile systems, stole source code
A pink T-Mobile logo on a storefront in Aachen, Germany
data breaches

LAPSUS$ breached T-Mobile systems, stole source code

T-Mobile has denied that the hackers obtained customer or government information
25 Apr 2022