IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

cybercrime

WordPress plugin vulnerability leaves sites open to total takeover
A silhouette of a hand holding a phone displaying the WordPress logo, with a world map drawn in green code in the background
vulnerability

WordPress plugin vulnerability leaves sites open to total takeover

Customers on WordFence's paid tiers will get protection from the WPGate exploit right away, but those on the free-tier face a 30-day delay
14 Sep 2022
New approach to ransomware encryption threatens to undermine cyber security strategies
An abstract image showing a person trying to connect to a computer which has a large padlock attached to it, as a ghost wearing a fedora floats menacingly out of it and demands money
ransomware

New approach to ransomware encryption threatens to undermine cyber security strategies

Intermittent encryption is already in use with ransomware such as BlackCat and Qyick, and could mark a widespread shift in the threat landscape
12 Sep 2022
French telco giant Altice reportedly hit by Hive ransomware attack
The Altice logo is shown on a phone, while an out of focus version of the same logo shows in white on a wall
Security

French telco giant Altice reportedly hit by Hive ransomware attack

Dark web listings indicate that the French multinational was attacked in early August, but the company has made no announcement
26 Aug 2022
Escape the ransomware maze
Whitepaper cover with overhead image of a man sat at a deska with a computer in the centre of a maze in the shadowswhitepaper
Whitepaper

Escape the ransomware maze

Conventional endpoint protection tools just aren’t the best defence anymore
23 Aug 2022
What is zero trust?
Key lit up on a dark background of 1s and 0s
network security

What is zero trust?

How a zero trust security strategy better protects your business from internal and external attackers
14 Jul 2022
An analysis of the European cyber threat landscape
Whitepaper cover with title and three colleagues sat at a table laughing togetherwhitepaper
Whitepaper

An analysis of the European cyber threat landscape

Human risk review 2022
8 Jul 2022
Protecting healthcare from cybercrime
Whitepaper cover with title and image of healthcare professionals in white coats and latex gloves looking at a tablet in a labwhitepaper
Whitepaper

Protecting healthcare from cybercrime

Best practices to address evolving cyber security threats
25 May 2022
The truth about cyber security training
Pair of feet in socks with a chair and plant in the backgroundwhitepaper
Whitepaper

The truth about cyber security training

Stop ticking boxes. Start delivering real change.
25 Apr 2022
The Total Economic Impact™ of Mimecast
Total economic impact of Mimecast - whitepaper from Mimecastwhitepaper
Whitepaper

The Total Economic Impact™ of Mimecast

Cost savings and business benefits enabled by using Mimecast with Microsoft 365
25 Apr 2022
Security awareness training strategies for account takeover protection
Security awareness training strategies for account takeover protection - whitepaper from Mimecastwhitepaper
Whitepaper

Security awareness training strategies for account takeover protection

Why you need an inside-the-perimeter strategy for internal threats
25 Apr 2022
Bring insights and data closer to customers with edge computing
Whitepaper cover with title, text and Red Hat logowhitepaper
Whitepaper

Bring insights and data closer to customers with edge computing

How to innovate, make faster decisions and provide engaging experiences
5 Apr 2022
Microsoft 365 protection made MSPEasy
Whitepaper cover with layered graphic of tablet, envelope and padlockwhitepaper
Whitepaper

Microsoft 365 protection made MSPEasy

The cloud protection solution built for MSPs
4 Apr 2022
Ransomware and Microsoft 365 for business
Whitepaper cover with over-layered graphics of laptop, folder, file and skull/malware imageswhitepaper
Whitepaper

Ransomware and Microsoft 365 for business

What you need to know about reducing ransomware risk
4 Apr 2022
The best defence against ransomware
Blue padlock whitepaper
Whitepaper

The best defence against ransomware

How ransomware is evolving and how to defend against it
31 Jan 2022
TikTok phishing campaign tried to scam over 125 influencer accounts
The TikTok logo on an application store accessed from a smartphone
social media

TikTok phishing campaign tried to scam over 125 influencer accounts

Hackers threatened to delete accounts over copyright violations
18 Nov 2021
Smart luggage is not so smart when it comes to cyber security
Smart luggage in an airport
cyber security

Smart luggage is not so smart when it comes to cyber security

If luggage owners aren’t careful, hackers could use app to steal baggage
15 Nov 2021
Europol reveals how ransomware gangs are evolving to evade capture
Image of a Europol sign affixed to its Amsterdam headquarters
cyber crime

Europol reveals how ransomware gangs are evolving to evade capture

The annual crime report explains how ransomware continues to grow in profitability despite recent capture attempts, and the novel ways DDoS attackers …
12 Nov 2021
The Okta digital trust index
Woman types on a laptop, image is faded purple with title text beside it on white backgroundwhitepaper
Whitepaper

The Okta digital trust index

Exploring the human edge of trust
11 Nov 2021
Attackers use CSS to fool anti-phishing systems
Email sign with a fish hook on blue digital background
phishing

Attackers use CSS to fool anti-phishing systems

Inserting invisible links throws off natural language processing, say researchers
11 Nov 2021
Hackers could use new Wslink malware in highly targeted cyber attacks
Malware in code
malware

Hackers could use new Wslink malware in highly targeted cyber attacks

Malware acts as a server, but its origins baffle boffins
1 Nov 2021
Marsh McLennan reveals its cyber risk analytics center
Hand hovering over laptop with padlock graphic superimposed
risk management

Marsh McLennan reveals its cyber risk analytics center

The center combines the expertise of Marsh, Guy Carpenter, Mercer, and Oliver Wyman
15 Oct 2021
Justice Department unveils civil cyber fraud initiative to battle online crime
Department of justice sign on a building
cyber attacks

Justice Department unveils civil cyber fraud initiative to battle online crime

New proposal will respond to cyber security breaches and cryptocurrency use in undertaking cyber fraud
7 Oct 2021
Senator to introduce new bill to force ransomware payment disclosures
The senate floor during a vote
ransomware

Senator to introduce new bill to force ransomware payment disclosures

Organizations would have 48 hours to inform DHS
6 Oct 2021