IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Security

Tips for Boosting your Organisation’s Security Posture with Encryption
A person typing on a laptop with their right hand while holding a see through padlock in their left
Sponsored

Tips for Boosting your Organisation’s Security Posture with Encryption

Encryption should be as much a part of your cyber security as firewalls and antimalware
6 Feb 2023
Warning issued over ransomware attacks targeting VMware ESXi servers globally
The entrance sign at VMware's headquarters in Palo Alto
cyber attacks

Warning issued over ransomware attacks targeting VMware ESXi servers globally

Businesses have been urged to patch the two-year-old vulnerability amidst heightened ransomware threats
6 Feb 2023
ION Trading reportedly pays LockBit ransom demands
Ransomware mockup with dark red colour scheme, a lock denoting encryption, and binary code set in the backdrop
ransomware

ION Trading reportedly pays LockBit ransom demands

Paying ransomware groups is a highly discouraged practice but has been historically sanctioned in the most severe cases
6 Feb 2023
Windows 10 users locked out of devices by unskippable Microsoft 365 advert
Windows 10 desktop on an open laptop
bugs

Windows 10 users locked out of devices by unskippable Microsoft 365 advert

Entering payment information was the only way for some to enter their own PCs
3 Feb 2023
Lacklustre leadership from DCMS delays UK-wide biometric identity platform rollout
A digital fingerprint with blue data streaming upwards from it
Policy & legislation

Lacklustre leadership from DCMS delays UK-wide biometric identity platform rollout

For years the UK government has longed for a fully functional digital identity system, but it isn't helping those who are crying out to build it
2 Feb 2023
Hackers target business cloud environments by abusing Microsoft’s ‘verified publisher’ status
Someone holding a padlock in front of the Microsoft logo
Security

Hackers target business cloud environments by abusing Microsoft’s ‘verified publisher’ status

Proofpoint research found that hackers deliberately abused verification procedures to dupe firms with malicious apps
1 Feb 2023
What is Apple's T2 security chip?
An Apple Mac sat on an office bench
components

What is Apple's T2 security chip?

Apple’s T2 security chip powers an array of security features in Macs including biometric login and data encryption
1 Feb 2023
Cyber criminal groups wooing hackers with seven-figure salaries and holiday pay
A person at a computer looking dejected with one hand on their head staring at computer code
cyber crime

Cyber criminal groups wooing hackers with seven-figure salaries and holiday pay

Paid leave, competitive salaries, and ‘friendly team’ environments were among the benefits highlighted by dark web job ads
31 Jan 2023
Yandex data breach reveals source code littered with racist language
Yandex logo on a self-driving car
data breaches

Yandex data breach reveals source code littered with racist language

Yandex source code for a range of key services was leaked to a popular hacker forum last week
30 Jan 2023
10 million customers exposed in JD Sports cyber attack
View of the exterior of a branch of JD sports fashion store
cyber attacks

10 million customers exposed in JD Sports cyber attack

The sports fashion retailer has urged customers to be “on the look-out" for scam emails in the wake of the incident
30 Jan 2023
US extradites French ShinyHunters hacker, faces 123 years in prison
A hacker wearing black gloves using a laptop keyboard
hacking

US extradites French ShinyHunters hacker, faces 123 years in prison

The hacker is believed to be a member of the hacking group known for its spree of data breaches across 2020 and 2021
30 Jan 2023
The IT Pro Podcast: The problem with APIs
The IT Pro Podcast logo with the episode number 158 and title 'The problem with APIs'
application programming interface (API)

The IT Pro Podcast: The problem with APIs

With API attacks on the rise, knowing your attack surface is crucial
27 Jan 2023
Podcast transcript: The problem with APIs
The IT Pro Podcast logo with subheading 'Transcript' and the episode title 'The problem with APIs'
application programming interface (API)

Podcast transcript: The problem with APIs

Read the full transcript for this episode of the IT Pro Podcast
27 Jan 2023
Bitwarden users raise alarm over 'highly convincing' Google malvertising risks
Malware in code
Security

Bitwarden users raise alarm over 'highly convincing' Google malvertising risks

The volume of fake ads impersonating popular software has increased significantly in recent months
27 Jan 2023
FBI's landmark Hive ransomware takedown 'a drop in the ocean'
Abstract image of a ghost on a digital screen
cyber crime

FBI's landmark Hive ransomware takedown 'a drop in the ocean'

A huge win for law enforcement, but the 'hacking back' takedown of Hive's domain is just a small drop in the expansive ransomware ocean
27 Jan 2023
CISA: Phishing campaign targeting US federal agencies went undetected for months
Abstract image of a fishing hook through a red email to represent a phishing attack
phishing

CISA: Phishing campaign targeting US federal agencies went undetected for months

Threat actors used legitimate remote access software to maliciously target federal employees
26 Jan 2023
Dutch hacker steals data from virtually entire population of Austria
The Austrian parliament building in Vienna
data breaches

Dutch hacker steals data from virtually entire population of Austria

The data was stolen from a misconfigured cloud database found by the attacker through a search engine
26 Jan 2023
NCSC warns UK under state-sponsored spear-phishing attacks from Russia and Iran
Russian hacking on a laptop mockup with code sprawling over the screen
cyber security

NCSC warns UK under state-sponsored spear-phishing attacks from Russia and Iran

The acceleration in spear-phishing campaigns last year coincided with the escalating conflict in Ukraine, according to the NCSC
26 Jan 2023
GoTo admits hackers stole customer backups in LastPass breach
A gloved cartoon hand inserts a key, the teeth of which are asterisks, into a keyhole against a red background
hacking

GoTo admits hackers stole customer backups in LastPass breach

In addition to losing encrypted backups such as hashed passwords, the firm has confirmed hackers stole an encryption key relating to the data
25 Jan 2023
Report: Regulatory and monetary incentives needed to adopt safer programming languages
Abstract and obscured programming code displayed on a digital display
programming languages

Report: Regulatory and monetary incentives needed to adopt safer programming languages

Companies have been urged to create plans on how they intend to get rid of memory-unsafe code in their products
25 Jan 2023
How MSPs can capitalise on SMBs' security spending spree
Mockup image with padlocks to symbolise a cyber security vulnerability
Sponsored

How MSPs can capitalise on SMBs' security spending spree

A single cyber attack can easily provide a death blow to SMBs and they’re now ready to spend their way to safety
25 Jan 2023
Delinea appoints David Castignola as new CRO, sales leader
David Castignola headshot
Security

Delinea appoints David Castignola as new CRO, sales leader

The 25-year veteran joins after previously holding leadership positions at Optiv and RSA
25 Jan 2023
Up to 350,000 open source projects vulnerable to 15-year-old Python bug
A screen showing code written in Python
open source

Up to 350,000 open source projects vulnerable to 15-year-old Python bug

Researchers at Trellix and GitHub have patched nearly 62,000 affected projects so far
24 Jan 2023