Cyber Attacks
Latest about Cyber Attacks
![P2PInfect: A CGI render of Europe, North Africa, and the Middle East as viewed from space, with red light similar to fiber optic cables arcing up from points on the Earth (including from other unseen continents) to represent malware attacks.](https://cdn.mos.cms.futurecdn.net/PkA5drTvL6Rx3senG4rDTn-320-80.jpg)
P2PInfect self-replicating Rust worm discovered attacking Redis instances
By Rory Bathgate published
News Researchers believe that the worm could be laying the groundwork for a larger campaign to be launched at some point in the future
![OpenSSH vulnerability: A red warning sign on a background of code, denoting malware and cyber attacks](https://cdn.mos.cms.futurecdn.net/qKCkPsC9o3LPrJHDP6Jkr7-320-80.jpg)
OpenSSH vulnerability uncovered by researchers, RCE exploit developed
By Rory Bathgate published
News Attackers can remotely manipulate common libraries to execute arbitrary code
![Adobe ColdFusion: Adobe logo seen displayed on a smartphone](https://cdn.mos.cms.futurecdn.net/v4KLXLjXMKNGk3ifya7hvm-320-80.jpg)
Warning issued over “incomplete” fix for Adobe ColdFusion vulnerability
By Ross Kelly published
News An incomplete fix for a vulnerability disclosure could be placing users at risk, researchers warned
![JumpCloud: A CGI render of a glowing blue cloud, made of interconnected data points, hovering above a faint blue grid and surrounded by small padlocks. It is set against a black background.](https://cdn.mos.cms.futurecdn.net/urzkXUM92ynXRdk7bRPyje-320-80.jpg)
JumpCloud reveals nation-state hackers breached internal systems, following customer speculation
By Rory Bathgate published
News Suspicious activity was discovered in June, but a customer link took longer than a week to establish
![Microsoft SQL: The Microsoft logo against a white background out of focus, with the silhouette of a hand holding a padlock to the left of frame in focus.](https://cdn.mos.cms.futurecdn.net/U3XRG9ZZjSHHxMUXhHdqk7-320-80.jpg)
Microsoft SQL password-guessing attacks rising as hackers pivot from OneNote vectors
By Rory Bathgate published
News Database admins are advised to enforce better controls as attacks ending in ransomware are being observed
![Whitepaper cover with title over purple shaded image of female worker peering over the top of an office cubicle](https://cdn.mos.cms.futurecdn.net/XLoUwV2iUi4cPwrDUKxR6k-320-80.jpg)
Defence in depth: Closing the gaps in Microsoft 365 security
By ITPro published
Whitepaper Exploring the security challenges facing organisations with a reliance on Microsoft 365
![The words 'Why are cyber criminals targeting the UK?' with ‘cyber criminals’ highlighted in yellow and the other words in white, against a blurred photo of a padlock, sitting on top of the UK flag and surrounded by loose keys from a keyboard](https://cdn.mos.cms.futurecdn.net/PG7KS52nxnQfFWfcFuQFrf-320-80.jpg)
Why are cyber criminals targeting the UK?
By Rory Bathgate published
ITPro Podcast Attacks will continue until threat actors are hit in their wallets
![Iranian hackers: Iran flag digital distorted to denote a disruption caused by a hack](https://cdn.mos.cms.futurecdn.net/RBmH3m9HDsh4cfAWBqaJqf-320-80.jpg)
Iranian hackers targeted nuclear expert, ported Windows infection chain to Mac in a week
By Richard Speed published
News Fresh research demonstrates the sophistication and capability of state-sponsored threat actors to compromise diverse targets
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.