IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Security

South Korean public sector organisations targeted by Gwisin ransomware
A simple graphic of a white laptop on a red background, with a distorted red padlock showing on the laptop's otherwise black screen
ransomware

South Korean public sector organisations targeted by Gwisin ransomware

Threat actors tailored attacks on victims such as pharmaceutical companies, with researchers still in the dark on key details
8 Aug 2022
Why convenience is the biggest threat to your security
Man holding smart phone with data security on display at office
Sponsored

Why convenience is the biggest threat to your security

The shortcuts and human error that lead to breaches - and how to guard against them
8 Aug 2022
VMware warns of tumultuous threats amid Russia-Ukraine cyber war
Hacker in front of a Russian flag
hacking

VMware warns of tumultuous threats amid Russia-Ukraine cyber war

New report underscores burned-out security teams' response to geopolitically motivated cyber attacks
8 Aug 2022
What is Dark Utilities C2 as a service (C2aaS)?
Keyboard with a digital overlay
hacking

What is Dark Utilities C2 as a service (C2aaS)?

Hackers can use the service to launch cyber attacks with ease for as little as £8.50
8 Aug 2022
Microsoft blocking Tutanota users from Teams registration, claims fix unfeasible
The Microsoft Teams logo is shown on a smartphone, with the Microsoft logo displayed in the background on a wall
Business operations

Microsoft blocking Tutanota users from Teams registration, claims fix unfeasible

Tutanota claim this is an antitrust issue, as the company shares the problem with the public
8 Aug 2022
Cyber attack on software supplier causes "major outage" across the NHS
The NHS website as seen on an internet browser
cyber attacks

Cyber attack on software supplier causes "major outage" across the NHS

Unconfirmed reports suggest the attack may be ransomware-related, while the NHS contends with disrupted services on the 111 non-emergency line
8 Aug 2022
Brave pushes the boundaries of privacy by design
The Brave browser icon in the background behind somebody using their phone
privacy

Brave pushes the boundaries of privacy by design

It’s quite a big step to abandon the big three of Chrome, Edge and Safari for a niche option that doesn’t just tack privacy on top
6 Aug 2022
Home Office to collect foreign offenders' biometric data using smartwatch scheme
A smartwatch on someone's arm, lit in red
privacy

Home Office to collect foreign offenders' biometric data using smartwatch scheme

Facial recognition and geolocation data will be matched against Home Office, Ministry of Justice and police databases
5 Aug 2022
Nomad happy to forgive hackers if they return 90% of $190 million that was stolen
A hacker against a red background
hacking

Nomad happy to forgive hackers if they return 90% of $190 million that was stolen

The crypto bridge is offering 'white hat hackers' a 10% bounty following the attack earlier this week
5 Aug 2022
Decade-old malware strains top annual list of most pervasive business exploits
The Windows logo on a phone in front of a malware warning
malware

Decade-old malware strains top annual list of most pervasive business exploits

Allied cyber security authorities say the most active strains of 2021 have been in operation for longer than five years, and are being constantly deve…
5 Aug 2022
Cyber attacks rain on Taiwan during Pelosi visit
US House Speaker Nancy Pelosi giving a speech in Taiwan
cyber warfare

Cyber attacks rain on Taiwan during Pelosi visit

IP addresses from China and Russia were said to have been responsible for the attack
5 Aug 2022
Malware operators abusing Windows shortcuts to bypass VBA macro block
Skull depicted in code
exploits

Malware operators abusing Windows shortcuts to bypass VBA macro block

The likes of Emotet and Qakbot, as well as Russia-linked state-sponsored hackers, have all pivoted to the new infection technique
5 Aug 2022
Fortinet unveils ‘fastest’ compact firewall for hyperscale data centers and 5G networks
Fortinet sign on a grey building
firewalls

Fortinet unveils ‘fastest’ compact firewall for hyperscale data centers and 5G networks

The new FortiGate 4800F firewall series packs 2.4 Tbps of capacity into a compact 4RU form-factor
4 Aug 2022
North Korean-linked Gmail spyware 'SHARPEXT' harvesting sensitive email content
A digital render of a red envelope hovering above a blocky grey surface
Security

North Korean-linked Gmail spyware 'SHARPEXT' harvesting sensitive email content

The insidious software exfiltrates all mail and attachments, researchers warn, putting sensitive documents at risk
4 Aug 2022
Thoma Bravo adds Ping Identity to growing cyber security portfolio in $2.8 billion acquisition
Two interconnected puzzle pieces overlaid on a top-down cityscape
Acquisition

Thoma Bravo adds Ping Identity to growing cyber security portfolio in $2.8 billion acquisition

The intelligent identity company joins Proofpoint and Sophos, among others, as it looks to accelerate its cloud transformation
4 Aug 2022
Auditors blame massive $4 million cryptocurrency heist on leaky logging technology
Stacks of dollars set against a blue and red background of binary code, denoting cryptocurrency and monetary value
hacking

Auditors blame massive $4 million cryptocurrency heist on leaky logging technology

Investigators raised concern over the thousands of vulnerable wallets containing Solana, USDC and other tokens
4 Aug 2022
India scraps privacy bill following big tech outcry
India's parliament building at sunset
Policy & legislation

India scraps privacy bill following big tech outcry

However, the government is developing a new bill which it hopes to bring into law early next year
4 Aug 2022
How to incorporate password protection into your security strategy
Graphic of padlocks in hexagons
Sponsored

How to incorporate password protection into your security strategy

A comprehensive security strategy needs to incorporate password protection
3 Aug 2022
Over 200,000 DrayTek routers vulnerable to total device takeover
A digital render of a blue padlock fragmenting into a cloud of data
Security

Over 200,000 DrayTek routers vulnerable to total device takeover

The routers are popular with small and medium businesses, but are easily exploitable by threat actors seeking to steal data or launch ransomware
3 Aug 2022
Google Cloud and MITRE make it easier for businesses to threat-hunt in their cloud environments
2D clouds on a circuitboard background
cloud security

Google Cloud and MITRE make it easier for businesses to threat-hunt in their cloud environments

The new pre-built queries aim to make it easier to navigate cloud security for organisations without the deep understanding that's required to effecti…
3 Aug 2022
Microsoft unveils new threat intelligence and surface management solutions
threats
cyber security

Microsoft unveils new threat intelligence and surface management solutions

New Microsoft Defender offerings aim to offer deeper insights into threat actors and their behaviours
3 Aug 2022
Tory party delays leadership selection over hacking fears
Sunak and Truss standing next to each other at a BBC debate
hacking

Tory party delays leadership selection over hacking fears

The Conservatives have also been forced to abandon plans to allow members to change their vote later in the contest
3 Aug 2022
Legal challenge for Sadiq Khan over ANPR expansion, Met access to data
An automated number-plate recognition (ANPR) camera watches over a dual carriageway
data processing

Legal challenge for Sadiq Khan over ANPR expansion, Met access to data

Rights campaigners argue that the increase in surveillance is unlawful and unjustified
3 Aug 2022