Cyber Attacks
Discover expert analysis on cyber attacks with news, features and insights from the team at IT Pro.
-
T-Mobile’s VM logs allegedly leaked in 20 GB Capgemini data breach
The attacker claims to have stolen databases, source code, credentials, private keys, as well as log files generated by virtual machines belonging to T-Mobile
By Solomon Klappholz Published
-
Cracking open insider threats
ITPro Podcast Leaders need to perform strict identity measures on would-be hires – and ensure employees who leave have access promptly removed
By Rory Bathgate Published
ITPro Podcast -
TfL reveals bank data on 5,000 customers exposed in cyber attack, arrest made following incident
News London's public transport operator has warned some customer data may have been compromised
By Emma Woollacott Published
News -
The Iran cyber threat: Breaking down attack tactics
In-depth Iran has been implicated in multiple recent cyber attacks – as state-backed hackers evolve their tactics, businesses must respond by shoring up defenses
By Kate O'Flaherty Published
In-depth -
LockBit claims breach on Canada’s largest school board: Is the group back with a vengeance?
News A breach at the largest school board in Canada has been claimed by LockBit as the group rears its head once more
By Solomon Klappholz Published
News -
UK law firms are facing a torrent of cyber threats – here’s why
News Cyber criminals are targeting the sensitive customer data UK law firms hold for ransomware attacks or blackmail
By Emma Woollacott Published
News -
British Library issues £400,000 tender as rebuild continues after 2023 cyber attack
News The British Library's digital transformation project was initially set back by a major cyber attack in October 2023 – now it’s looking to get back on track
By Solomon Klappholz Published
News -
Toyota’s cyber woes continue as latest breach marks fifth major IT incident in two years
Toyota is once again in the headlines after a hacker collective claimed to have exfiltrated 240GB of sensitive data from the car manufacturer’s internal systems
By Solomon Klappholz Published
-
Hackers are flocking to a new SMS spam tool
News The Xeon Sender tool has been repurposed by numerous threat actor actors since its initial sighting in 2022
By George Fitzmaurice Published
News -
Why attacks against critical national infrastructure (CNI) are such a threat
In-depth Organizations operating critical national infrastructure face an onslaught of cyber attacks by state-sponsored adversaries, prompting experts to call for better defense strategies and cooperation
By Kate O'Flaherty Published
In-depth -
How to recover from a DDoS attack – and what they can teach businesses
In-depth As distributed denial of service (DDoS) attacks get bigger and stealthier, firms that can recover fast and learn from the experience have the edge
By Kate O'Flaherty Published
In-depth -
Stopping cyber attackers from targeting the weakest links in security
In-depth Hackers are targeting the weakest link in network security – detecting and protecting these most vulnerable points is one of the most urgent jobs for any security team
By Peter Ray Allison Published
In-depth