Cyber Attacks
Latest about Cyber Attacks
![A phone showing the Citrix logo in black against a white background. It is held in the hand of an unseen person, with blurred blue stock graphs in the background.](https://cdn.mos.cms.futurecdn.net/QgRVqmVpvE4xQ44wmPi6Zc-320-80.jpg)
Patch-resistant autonomous exploits of Citrix NetScaler hardware hit thousands in Europe
By Rory Bathgate published
News More than 1,800 Citrix NetScaler devices still contained backdoors at the time of publication
![Kerberoasting attacks: Cyber Security Ransomware Email Phishing Encrypted Technology](https://cdn.mos.cms.futurecdn.net/BByVuGVeFJCJKekuHdacrY-320-80.jpg)
Stealthy Kerberoasting attacks surge and lend support to latest ransomware trend
By Ross Kelly published
News Kerberoasting techniques could be emerging as a viable alternative to traditional ransomware attacks, experts have warned
![CISA passwordless: Security padlock operating on the electronic circuit CPU](https://cdn.mos.cms.futurecdn.net/JiT3Ap3nyi8dqAUWbuxrF7-320-80.jpg)
CISA urges organizations to adopt passwordless security in LAPSUS$ report
By Rory Bathgate published
News The agency stated that telcos have not adequately protected customers from ‘SIM swap’ attacks
![Multi-colored noise and distortion on a screen, to represent a cyber attack or hacking.](https://cdn.mos.cms.futurecdn.net/hH9HxvQtYFeD4rRCTA2TtN-320-80.jpg)
Threat of cyber attacks to national security compared to that of chemical weapons
By Rory Bathgate published
News The UK government has raised the threat level posed by cyber attacks, deeming it greater on average than an event such as the Salisbury poisoning
![Top 12 most-exploited security vulnerabilities: NCSC logo superimposed with a translucent background in front of an office building](https://cdn.mos.cms.futurecdn.net/xVTMjZ6UmEQAhwxsGt2JDC-320-80.jpg)
Top 12 most-exploited security vulnerabilities revealed by national cyber security agencies
By Richard Speed published
News Cyber leaders from the Five Eyes alliance said attackers favor older vulnerabilities rather than new ones
![Russian hackers using Teams: The Microsoft Teams logo on a smartphone around stationary](https://cdn.mos.cms.futurecdn.net/48N8u88jYWrCuhouwEZSpP-320-80.jpg)
How Russia-linked hackers launched their latest attack using Microsoft Teams
By Ross Kelly published
News The group has been observed targeting dozens of organizations worldwide
![Deloitte logo pictured on a sign outside the company's offices in London](https://cdn.mos.cms.futurecdn.net/ANkB7KcLjDMevLieGtQG9P-320-80.jpg)
Deloitte denies Cl0p data breach impacted client data in wake of MOVEit attack
By Ross Kelly published
News Deloitte was the third of the 'Big Four' professional services firms to have appeared on the ransomware group's 'wall of shame' victim blog
![Cryptojacking: A neon purple, fragmenting cryptocurrency token is hovering above the ground in a futuristic looking room](https://cdn.mos.cms.futurecdn.net/MZTBPVYpCXchNj6t4aFJ4T-320-80.jpg)
Cryptojacking attacks surge 399% globally as threat actors diversify tactics
By Ross Kelly published
News Attackers are switching tactics to wreak havoc and maximize financial gains
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.