Vulnerability
Discover expert analysis on vulnerability with news, features and insights from the team at IT Pro.
-
Microsoft links PaperCut server attacks to Cl0p, LockBit ransomwareNews Microsoft Threat Intelligence noted attacks were facilitated by GoAnywhere vulnerabilities and the Raspberry Robin worm
By Rory Bathgate Published
News -
LockBit macOS ransomware strain discovered, sparks concerns over shifting tacticsNews Researchers noted that while this disclosure should be a cause for concern, the program is currently very buggy
By Ross Kelly Published
News -
OpenAI to pay up to $20k in rewards through new bug bounty programNews The move follows a period of unrest over data security concerns
By Ross Kelly Published
News -
Windows, macOS, and Tesla exploits debuted at Pwn2Own hacking contestNews Researchers took home more than $375,000 in winnings on the first day of the competition
By Ross Kelly Published
News -
Outlook zero day patch causes headaches for Windows adminsNews The patch comes along with Microsoft's monthly Patch Tuesday updates which fix 83 vulnerabilities and two total zero days
By Ross Kelly Published
News -
Google pays largest-ever bug bounty worth £500,000News The company remained tight-lipped over the exploit itself, but speculation is possible given its publicly available rewards breakdown
By Connor Jones Published
News -
Cisco issues patch for critical vulnerability in open source ClamAV antivirusNews Cisco said there is no evidence to suggest the vulnerability has been actively exploited
By Ross Kelly Published
News -
Microsoft patches three zero days, 77 security vulnerabilities in February Patch TuesdayNews Microsoft’s February update contains the largest number of fixes for SQL Server vulnerabilities in several years and nine 'critical' RCE flaws
By Ross Kelly Published
News -
Podcast transcript: Uprooting legacy techIT Pro Podcast Read the full transcript for this episode of the IT Pro Podcast
By IT Pro Published
IT Pro Podcast -
The IT Pro Podcast: Uprooting legacy techIT Pro Podcast ‘Remodelling the house’ rather than rebuilding might be the best approach to digital transformation
By IT Pro Published
IT Pro Podcast -
What is spell-jacking?In-depth Spell-jacking vulnerabilities are threatening to unwittingly leak data to third parties, undermining any drive to protect privacy
By Davey Winder Published
In-depth -
The IT Pro Podcast: The problem with APIsIT Pro Podcast With API attacks on the rise, knowing your attack surface is crucial
By IT Pro Published
IT Pro Podcast