Cyber Attacks
Latest about Cyber Attacks
![French flag pictured on top of a government building against a clear sky backdrop.](https://cdn.mos.cms.futurecdn.net/AQsU8kBm5havT9dd5CYMpJ-320-80.jpg)
Hackers steal personal data of 43 million French job seekers
By Emma Woollacott published
News The data breach is the largest in French history and comes amid a period of escalating attacks against public services
![The words ‘February rundown: LockBit takedown and ChatGPT woes’ overlaid on a lightly-blurred image of code. Decorative: the words ‘LockBit takedown’ and ‘ChatGPT woes’ are in yellow, while other words are in white. The ITPro podcast logo is in the bottom right corner](https://cdn.mos.cms.futurecdn.net/5AFRyHsLgqzcdbxAwVX3j7-320-80.jpg)
February rundown: LockBit takedown and ChatGPT woes
By Rory Bathgate published
ITPro Podcast LockBit was put on the backfoot through international action and OpenAI’s moment of madness will linger in the minds of its customers
![An envelope sitting on glass above red and blue text, to represent business email compromise attacks. The image is a CGI render, and diffused with light.](https://cdn.mos.cms.futurecdn.net/bVTTDby3MUWYR5Cg9VFzKL-320-80.jpg)
Business email compromise attacks are evolving, but what can be done about it?
By Solomon Klappholz published
In-depth As business email compromise attacks have become more sophisticated, organizations have been forced to adapt tactics in defense
![Warning icon on a digital LCD display with reflection. Concept of cyber attack, malware, ransomware, data breach](https://cdn.mos.cms.futurecdn.net/i22TSGKUFg9aGSnHyhnAbm-320-80.jpg)
Here's what you need to know about the AnyDesk breach
By George Fitzmaurice published
News AnyDesk issued a warning after threat actors gained access to production systems, but says there's "no evidence" of customer data loss
![Microsoft logo pictured on a store front in New York City.](https://cdn.mos.cms.futurecdn.net/9cTyiBRdDK9hHRkkAWkpR7-320-80.jpg)
Sneak-and-peek Midnight Blizzard attack highlights “worrying flaws” in Microsoft security processes
By George Fitzmaurice published
News Microsoft leadership communications were exposed through the Midnight Blizzard brute-force password attack
![An industrial engineer standing outdoors, his face is lit by the light from a laptop and a power station blurred in the background. He is wearing a hard hat and high-vis jacket over an orange jumper.](https://cdn.mos.cms.futurecdn.net/HEuPZ3MHXKEfCnnXvCLP2j-320-80.jpg)
What are the most-targeted industries for cyber attacks?
By Kate O'Flaherty published
In-depth What makes the most-targeted industries for cyber attacks such common victims, and what can they do to shore up security?
![A statue of Lady Justice, a blindfolded woman raising two scales in the air to represent the legal system, set against a blurred background of a laptop with blue light streaming from the monitor, to represent the Computer Misuse Act.](https://cdn.mos.cms.futurecdn.net/cFGftVxymDaVkoPEafBXm9-320-80.jpg)
What is the Computer Misuse Act?
By Jane McCallion last updated
In-depth If your computer systems are attacked, is the Computer Misuse Act effective enough to put those criminals behind bars?
![A whitepaper from Trend Micro on the topic of SOC modernization, with image of male worker at a computer](https://cdn.mos.cms.futurecdn.net/AYQsuHj3acyx5AbN9VeYb9-320-80.png)
SOC modernization and the role of XDR
By ITPro published
Whitepaper Automate security processes to deliver efficiencies across IT
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.