Latest about Cyber Attacks
What is business email compromise (BEC)?
By Kate O'Flaherty published
In-Depth Business email compromise (BEC) is surging. What is BEC, why is it growing, and how can firms spot and mitigate attacks?
Here's what you need to know about the upcoming curl security patches
By Rory Bathgate published
News Developers behind the open source library described one Curl vulnerability as one of the worst they've ever encountered
Hackers are spoofing themselves as GitHub's Dependabot to steal user passwords
By Connor Jones published
News GitHub Dependabot was crudely spoofed in hundreds of successful attacks on open source projects
JetBrains TeamCity critical vulnerability opens door for supply chain attacks
By Connor Jones published
News TeamCity users are advised to install JetBrains' full upgrade rather than just relying on the available hotfixes
Novel China-linked Linux backdoor exploits organizations that fail to patch old vulnerabilities
By Ross Kelly published
News The threat should serve as a “wake-up call” for organizations running Linux, an expert has said
MGM Resorts back online after suspected ransomware attack
By Rory Bathgate published
News The company’s casinos and hotels experienced severe disruption, with financial impacts of the outage expected to be significant
NCSC, SBU reveal overt Russian cyber campaign as cyber war continues to evolve
By Rory Bathgate published
News Sandworm-linked threat actors gained access to battlefield tablets
Email still the top vector for attackers
By Richard Speed published
News Infection chains might change, but the initiation method remains the same
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.