Hacking
Discover expert analysis on hacking with news, features and insights from the team at IT Pro.
- 
 The IT Pro Podcast: Does threat attribution matter?IT Pro Podcast There are many clues that can tell us who’s behind a hack - but it may not be worth knowing By IT Pro Published IT Pro Podcast
- 
 Podcast transcript: Does threat attribution matter?IT Pro Podcast Read the full transcript for this episode of the IT Pro Podcast By IT Pro Published IT Pro Podcast
- 
 Estonia fends off major cyber attack following Soviet-era monuments oustingNews The attack is reportedly one of the largest cyber attacks to hit the country since 2007 By Praharsha Anand Published News
- 
 Zoom patches privilege escalation flaw for macOS usersNews Threat actors were able to use the application’s updater to distribute malicious files at superuser level By Rory Bathgate Published News
- 
 Cloudflare scuppers Twilio-like cyber attack with hardware keysNews Phishing attempt was unable to gather information required to access the company’s systems thanks to secure hardware MFA By Daniel Todd Published News
- 
 VMware warns of tumultuous threats amid Russia-Ukraine cyber warNews New report underscores burned-out security teams' response to geopolitically motivated cyber attacks By Praharsha Anand Published News
- 
 What is Dark Utilities C2 as a service (C2aaS)?In-depth Hackers can use the service to launch cyber attacks with ease for as little as £8.50 By Connor Jones Published In-depth
- 
 Nomad happy to forgive hackers if they return 90% of $190 million that was stolenNews The crypto bridge is offering 'white hat hackers' a 10% bounty following the attack earlier this week By Zach Marzouk Published News
- 
 Auditors blame massive $4 million cryptocurrency heist on leaky logging technologyNews Investigators raised concern over the thousands of vulnerable wallets containing Solana, USDC and other tokens By Connor Jones Published News
- 
 Over 200,000 DrayTek routers vulnerable to total device takeoverNews The routers are popular with small and medium businesses, but are easily exploitable by threat actors seeking to steal data or launch ransomware By Rory Bathgate Published News
- 
 Tory party delays leadership selection over hacking fearsNews The Conservatives have also been forced to abandon plans to allow members to change their vote later in the contest By Zach Marzouk Published News
- 
 Nomad crypto bridge drained of $190 million through “chaotic” exploitNews The Nomad team has notified law enforcement and retained leading firms for blockchain intelligence and forensics, it said in a statement on Twitter By Zach Marzouk Published News