Cyber Attacks
Latest about Cyber Attacks

PyPI attack: Targeting of repository 'shows no sign of stopping'
By Ross Kelly published
News Greater collaboration and understanding of attackers’ tactics is key to mitigating open source security threats

Cisco reveals exploit code is publicly available for critical switch vulnerabilities
By Rory Bathgate published
News Attackers could target UI vulnerabilities in Cisco switches to execute malicious code

SOC modernization and the role of XDR
By ITPro published
Whitepaper Security operations remain challenging

JD Sports details cyber security revamp following January attack
By Connor Jones published
News It hopes a multi-vendor approach will substantially improve its cyber resilience

Is the new .zip top-level domain a cyber security risk?
By Rory Bathgate published
News While some experts have branded the new domain ‘unnecessary’, others dispute its usefulness for attacks

What is a 502 Bad Gateway error?
By Rene Millman last updated
In-depth We explain what the 502 Bad Gateway networking error means for users and website owners, and some potential steps for fixing it

What is the Computer Misuse Act?
By Jane McCallion last updated
In-depth If your computer systems are attacked, is the Computer Misuse Act effective enough to put those criminals behind bars?

Microsoft Authenticator mandates number matching to counter MFA fatigue attacks
By Connor Jones published
News The added layer of complexity aims to keep social engineering at bay
A daily dose of IT news, reviews, features and insights, straight to your inbox!
Thank you for signing up to ITPro. You will receive a verification email shortly.
There was a problem. Please refresh the page and try again.