Cyber Attacks
Latest about Cyber Attacks
![Purple screen with a white hand placing down asterisks denoting a security and password theme](https://cdn.mos.cms.futurecdn.net/UaP5kHNKkKoP3pWDHEYFjc-320-80.jpg)
Azure AD vulnerability gave attackers backdoor authentication control
By Ross Kelly published
News Secureworks shared its findings with Microsoft in 2022, and the company has since issued changes to improve audit logs
![PyPI: Program code on computer display in magnifying glass](https://cdn.mos.cms.futurecdn.net/bAiGGXQ2x5LyWfprG6PHhi-320-80.jpg)
PyPI attack: Targeting of repository 'shows no sign of stopping'
By Ross Kelly published
News Greater collaboration and understanding of attackers’ tactics is key to mitigating open source security threats
![Cisco Logo, hanging from the ceiling at a conference and shot through a telephoto lens](https://cdn.mos.cms.futurecdn.net/HYyDuEBwPRmEfwuuAiRurK-320-80.jpg)
Cisco reveals exploit code is publicly available for critical switch vulnerabilities
By Rory Bathgate published
News Attackers could target UI vulnerabilities in Cisco switches to execute malicious code
![JD Sports logo on a square sign fixed to one of its high street stores, with a clear blue sky in the background](https://cdn.mos.cms.futurecdn.net/jjjzqvzwjbSBAZ6UsX2qMa-320-80.jpg)
JD Sports details cyber security revamp following January attack
By Connor Jones published
News It hopes a multi-vendor approach will substantially improve its cyber resilience
![Top-level domain: A pixelated rendition of three folders in a line, with a red folder in the middle to represent a malicious .zip file and beige folders either side to represent legitimate files. Above and below the files, black and yellow checked marks indicate danger](https://cdn.mos.cms.futurecdn.net/tmWc8b2X79j3DTnvT7bVNG-320-80.jpg)
Is the new .zip top-level domain a cyber security risk?
By Rory Bathgate published
News While some experts have branded the new domain ‘unnecessary’, others dispute its usefulness for attacks
![Microsoft Authenticator: Microsoft logo on an office building](https://cdn.mos.cms.futurecdn.net/SwwWx2x86rG7LZCCN4yjxL-320-80.jpg)
Microsoft Authenticator mandates number matching to counter MFA fatigue attacks
By Connor Jones published
News The added layer of complexity aims to keep social engineering at bay
![The reflection of a hacker seen in a broken mirror to represent identity-based cyber attacks](https://cdn.mos.cms.futurecdn.net/fYUM6JWPRVgRkHVduyaHcB-320-80.jpg)
How to mitigate identity-based attacks
By Sandra Vogel published
In-depth If identity-based cyber attacks are successful, they can give hackers the opportunity to infiltrate an entire network
![Capita logo appearing a smartphone](https://cdn.mos.cms.futurecdn.net/v4bNLWAEzqCsyMte33vp5C-320-80.jpg)
Capita's handling of cyber attack shows companies still fail at breach reporting
By Ross Kelly published
Analysis Capita initially told customers there was “no evidence” of data having been compromised in the March cyber attack
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.