Hacking
Latest about Hacking
![The Fortinet logo on a phone, with blue binary code in the background](https://cdn.mos.cms.futurecdn.net/EbCCK9B4A8MjWT59KzrtnU-320-80.jpg)
Fortinet reiterates call to mitigate against active zero-day, as customers delay fixes
By Rory Bathgate published
News A large number of customers have yet to apply mitigations necessary to avoid the critical vulnerability
![A hand holding a phone bearing the Nvidia logo](https://cdn.mos.cms.futurecdn.net/wSUe7xy46fLGDo8WqBhoRE-320-80.jpg)
Nvidia's new RTX 4090 is a powerful password-cracking tool
By Rory Bathgate published
News Hackers using an array of the consumer-grade GPU could see brute force timings halve
![Mockup of an antivirus product protecting a computer, with an 'IT Pro Recommended' award bade logo overlaid](https://cdn.mos.cms.futurecdn.net/RF4kC3X3XY8anKJ2FE75Bi-320-80.jpg)
Best antivirus for Windows 10
By Carly Page last updated
In-depth Want to stay secure? Here's the best business-class protection around
![Win 11 on a smartphone in front of code on a monitor](https://cdn.mos.cms.futurecdn.net/xQfg5Vc7YXULHE5hc4CvHi-320-80.jpg)
Microsoft still searching for zero-day fixes following Patch Tuesday
By Rory Bathgate published
News ProxyNotShell remains unaddressed even as Microsoft fixes several critical flaws in its monthly package of security patches
![A phone held in someone's hand close to the camera shows the Binance logo, while stock numbers are seen on a blurred screen in the background](https://cdn.mos.cms.futurecdn.net/m3Br22uCVTsWDu3UpHQkib-320-80.jpg)
Hacker steals $566 million from Binance Bridge using proof-forgery exploit
By Rory Bathgate published
News An exploit discovered in the exchange platform's proof verifier let the hacker take 2m BNB without raising alarm bells
![A digital render of a blue padlock fragmenting into a cloud of data](https://cdn.mos.cms.futurecdn.net/oX9XyayN63jXpqGSoj5zdB-320-80.jpg)
US military contractor hacked through Microsoft Exchange vulnerabilities, custom exfiltration tools
By Rory Bathgate published
News In a joint advisory, US security groups have warned the prolonged campaign showed new strategies in play, with the vector still unknown
![Fancy Bear](https://cdn.mos.cms.futurecdn.net/ZkSaUJMZxkxN6LR5QEUKxV-320-80.jpg)
Fancy Bear hackers exploit PowerPoint files to spread Graphite malware
By Praharsha Anand published
News The ongoing attack reportedly targets entities in the defense and government sectors of the European Union and Eastern European nations
![Podcast transcript: Meet the cyborg hacker](https://cdn.mos.cms.futurecdn.net/e68dF8GWJKnWi2HERUMHr6-320-80.jpg)
Podcast transcript: Meet the cyborg hacker
By IT Pro published
IT Pro Podcast Read the full transcript for this episode of the IT Pro Podcast
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.