Vulnerability
Discover expert analysis on vulnerability with news, features and insights from the team at IT Pro.
-

LockBit macOS ransomware strain discovered, sparks concerns over shifting tactics
News Researchers noted that while this disclosure should be a cause for concern, the program is currently very buggy
By Ross Kelly Published
News -

OpenAI to pay up to $20k in rewards through new bug bounty program
News The move follows a period of unrest over data security concerns
By Ross Kelly Published
News -

Windows, macOS, and Tesla exploits debuted at Pwn2Own hacking contest
News Researchers took home more than $375,000 in winnings on the first day of the competition
By Ross Kelly Published
News -

Outlook zero day patch causes headaches for Windows admins
News The patch comes along with Microsoft's monthly Patch Tuesday updates which fix 83 vulnerabilities and two total zero days
By Ross Kelly Published
News -

Google pays largest-ever bug bounty worth £500,000
News The company remained tight-lipped over the exploit itself, but speculation is possible given its publicly available rewards breakdown
By Connor Jones Published
News -

Cisco issues patch for critical vulnerability in open source ClamAV antivirus
News Cisco said there is no evidence to suggest the vulnerability has been actively exploited
By Ross Kelly Published
News -

Microsoft patches three zero days, 77 security vulnerabilities in February Patch Tuesday
News Microsoft’s February update contains the largest number of fixes for SQL Server vulnerabilities in several years and nine 'critical' RCE flaws
By Ross Kelly Published
News -

Podcast transcript: Uprooting legacy tech
IT Pro Podcast Read the full transcript for this episode of the IT Pro Podcast
By IT Pro Published
IT Pro Podcast -

The IT Pro Podcast: Uprooting legacy tech
IT Pro Podcast ‘Remodelling the house’ rather than rebuilding might be the best approach to digital transformation
By IT Pro Published
IT Pro Podcast -

What is spell-jacking?
In-depth Spell-jacking vulnerabilities are threatening to unwittingly leak data to third parties, undermining any drive to protect privacy
By Davey Winder Published
In-depth -

The IT Pro Podcast: The problem with APIs
IT Pro Podcast With API attacks on the rise, knowing your attack surface is crucial
By IT Pro Published
IT Pro Podcast -

Podcast transcript: The problem with APIs
IT Pro Podcast Read the full transcript for this episode of the IT Pro Podcast
By IT Pro Published
IT Pro Podcast