Cyber Attacks
Latest about Cyber Attacks
![Okta logo appearing on a smartphone held aloft by a silhouetted hand in front of a blue and purple background](https://cdn.mos.cms.futurecdn.net/LiZWJGJqRCM9SveYkNxnYE-320-80.jpg)
Everything we know so far about Okta’s data breach
By Rory Bathgate published
News Threat actors breached Okta’s support environment and used stolen files to launch further attacks
![Microsoft logo displayed on a phone screen and Bing logo on website displayed on a laptop screen](https://cdn.mos.cms.futurecdn.net/cai79kaBNCVpW4gYSyFExf-320-80.jpg)
New Bing AI bug bounty program offers rewards of up to $15,000
By Rory Bathgate published
News The Bing AI bug bounty aims to catch flaws that would let attackers alter the behavior of the chatbot
![An CGI render of a white envelope being shot at from all directions by arrows with red-tips, to represent business email compromise (BEC).](https://cdn.mos.cms.futurecdn.net/XwWCccN8DFYGdyRyZj9Eo3-320-80.jpg)
What is business email compromise (BEC)?
By Kate O'Flaherty published
In-Depth Business email compromise (BEC) is surging. What is BEC, why is it growing, and how can firms spot and mitigate attacks?
![Digital umbrella in neon blue blocking rainfall made up of neon red binary code, connoting antivirus](https://cdn.mos.cms.futurecdn.net/uysvAeXT4doKihhCPviKUf-320-80.jpg)
Here's what you need to know about the upcoming curl security patches
By Rory Bathgate published
News Developers behind the open source library described one Curl vulnerability as one of the worst they've ever encountered
![GitHub Dependabot story illustrated by a white GitHub logo on a charcoal background and yellow and white detail showing ITPro's brand identity](https://cdn.mos.cms.futurecdn.net/rYtK5YoX2DnGaBwTwatqpD-320-80.jpg)
Hackers are spoofing themselves as GitHub's Dependabot to steal user passwords
By Connor Jones published
News GitHub Dependabot was crudely spoofed in hundreds of successful attacks on open source projects
![JetBrains TeamCity software logos appearing side by side on a dark background with binary code on](https://cdn.mos.cms.futurecdn.net/X2kiqCAgnXt5dXrUYuf9Se-320-80.jpg)
JetBrains TeamCity critical vulnerability opens door for supply chain attacks
By Connor Jones published
News TeamCity users are advised to install JetBrains' full upgrade rather than just relying on the available hotfixes
![Linux backdoor: A digital render of a red, microchip-like pattern with semi-transparent white representations of an open padlock and skull and crossbones overlaid on top, alongside the text DATA LEAK, SECURITY, and EXPLOIT FOUND to represent data theft.](https://cdn.mos.cms.futurecdn.net/QX2iVwGXSoqdgmhNkLEveC-320-80.jpg)
Novel China-linked Linux backdoor exploits organizations that fail to patch old vulnerabilities
By Ross Kelly published
News The threat should serve as a “wake-up call” for organizations running Linux, an expert has said
![The MGM logo on a large sign in the background, near the MGM Grand Hotel in Las Vegas. In the foreground sits a lion statue, the symbol of MGM.](https://cdn.mos.cms.futurecdn.net/a57d7chshW2YaMGukTHS9f-320-80.jpg)
MGM Resorts back online after suspected ransomware attack
By Rory Bathgate published
News The company’s casinos and hotels experienced severe disruption, with financial impacts of the outage expected to be significant
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.