Explore Security
Security
Latest about Security
![Microsoft logo and branding pictured on a sign outside the company's France headquarters.](https://cdn.mos.cms.futurecdn.net/eCAwFhn54sP5PuFBU39xZL-320-80.jpg)
Microsoft confirms customer emails were accessed during Midnight Blizzard breach
By Solomon Klappholz published
Microsoft has begun notifying certain customers that there emails were accessed by threat actors in a breach
![Seal of the US Federal Reserve, recently the subject of claims from LockBit of a data breach, pictured in blue with a silhouetted man pictured in the foreground.](https://cdn.mos.cms.futurecdn.net/xon587wZYeS8UEpadgzv9f-320-80.jpg)
LockBit's Federal Reserve data breach bluff failed miserably
By Solomon Klappholz published
News Data LockBit claimed to have stolen from the US Federal Reserve appears to originate from a banking as a service provider
![Cyber security concept image showing digitized padlock on a network interface with source code.](https://cdn.mos.cms.futurecdn.net/qH4rSgzMX6EfrTyVvDH7aB-320-80.jpg)
Hackers are trying to exploit a new critical MOVEit vulnerability – here’s what you need to know
By Solomon Klappholz published
A critical MOVEit vulnerability that could allow attackers to bypass authentication protocols is already attracting cyber criminals just hours after its disclosure
![Cloud complexity concept art showing scattered binary code with different colored lines of code interwoven on a digital interface.](https://cdn.mos.cms.futurecdn.net/C7CrfvjbGLhrsCT4GpKURh-320-80.jpg)
Small businesses face continued security threats as trojan attacks surge
By Emma Woollacott published
News Cyber attacks on small businesses are still growing at a steady pace
![Getting Value from Generative AI](https://cdn.mos.cms.futurecdn.net/Aa7PgiDrzJcbHNcZwdRhuK-320-80.jpg)
Getting value from generative AI
By ITPro published
Whitepaper Become more productive and pursue innovation
![An abstract CGI image of red, blue, white, and purple layers representing an organization's cyber incident response strategy.](https://cdn.mos.cms.futurecdn.net/SziFRufF3tyKcNVPeFHz8K-320-80.jpg)
Building an incident response strategy in 2024
By Kate O'Flaherty published
In-depth As the threat landscape changes, businesses must ensure their incident response strategy is up to the task and ready to meet the needs of regulators and stakeholders
![Man typing in password on keyboard in low light.](https://cdn.mos.cms.futurecdn.net/iEhgrdA3JJhRvzUkjjC3XA-320-80.jpg)
Most passwords take a matter of minutes to crack – here’s how you can create strong, hacker-resistant credentials
By Solomon Klappholz published
News Passwords are still criminally insecure and can be cracked or guessed by hackers with ease, but what precautions can you take to avoid getting breached?
![woman typing on laptop with security symbols superimposed](https://cdn.mos.cms.futurecdn.net/94YTsoVbWrYUMd4Aff5XzG-320-80.jpg)
Best business antivirus
By Darien Graham-Smith last updated
Best To help you find the ideal antivirus platform for your company, we analyzed some of the best business antivirus platforms of today
![Zscaler logo displayed on a smartphone screen with branding in background.](https://cdn.mos.cms.futurecdn.net/Hp6mLxakPPx4sAHg3VCe46-320-80.jpg)
Google Workspace just got a slew of new zero trust features to help supercharge user security – here's what you need to know
By Daniel Todd last updated
News New Zscaler integrations across Chrome Enterprise, Google Workspace, and Google Security Operations aim to enhance enterprise security and access
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.