Malware
Discover expert analysis on malware with news, features and insights from the team at IT Pro.
-
The cost of ‘good enough’ security
Whitepaper Calculating the true value of cybersecurity solutions
By ITPro Published
Whitepaper -
Turning the tables
Whitepaper How smart email reporting and remediation can transform attackers’ favourite targets into your best defence
By ITPro Published
Whitepaper -
Cloud in the crosshairs
Whitepaper How cyber criminals exploit file-sharing, identity, and supply chain vulnerabilities in Microsoft 365
By ITPro Published
Whitepaper -
Beyond awareness training
Whitepaper Building a sustainable security culture - and why it matters
By ITPro Published
Whitepaper -
The human factor report 2023
Whitepaper Analysing the cyber attack chain
By ITPro Published
Whitepaper -
Password auditing guide
whitepaper Stay ahead of today’s threats and secure your future
By ITPro Published
whitepaper -
The economics of penetration testing for web application security
whitepaper Get the most value from your security solution
By ITPro Published
whitepaper -
Fake invoice scams are still a major threat to enterprises — and they’re only going to get stealthier
News Fake invoice scams are not a new trend, research shows, but hackers are refining these attacks to make sure they stay an effective entry method
By Solomon Klappholz Published
News -
What is malware?
In-depth Knowing what malware is means knowing the differences between viruses, trojans, ransomware, and more
By Connor Jones Last updated
In-depth -
This malware is trying to steal your AWS keys and more, here's how to protect yourself
News Androxgh0st malware is stealing credentials and building a botnet to go after more targets, according to the FBI and CISA
By Steve Ranger Published
News -
Zero trust, zero phish
webinar Protecting against deceptive and dangerous link-based attacks
By ITPro Published
webinar -
Warning issued over “inadvertent” spread of malvertising on Google Dynamic Search Ads
News The malvertising campaign represents a novel case in which threat actors were unaware of the success of their campaign
By Solomon Klappholz Published
News