IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

cyber attacks

Kaspersky finds most effective phishing emails imitate corporate messages, delivery notifications
A fishing hook rests on top of a stack of credit cards, while a padlock sits in the background out of focus
Security

Kaspersky finds most effective phishing emails imitate corporate messages, delivery notifications

Almost one in five employees clicked links in business related emails, but most emails containing threats or promising money were identified as phishi…
27 Jun 2022
UK government opts against regulation for cyber security standards
security breach alerts on a mobile
cyber attacks

UK government opts against regulation for cyber security standards

UK Cyber Security Council will move ahead with its planned chartered standards, with the government to monitor its adoption
22 Jun 2022
How to react to a data breach
Open padlock on circuit board
Security

How to react to a data breach

Would you know what to do if an online attacker got their hands on your data? We outline the first steps you should take following a security breach
22 Jun 2022
Delivery firm Yodel disrupted by cyber attack
Delivery van with Yodel logo photographed through a shop door frame
cyber attacks

Delivery firm Yodel disrupted by cyber attack

The company confirmed that some services are down but deliveries are continuing, though specific details are currently unknown
21 Jun 2022
Cloudflare mitigates biggest ever HTTPS DDoS attack
A laptop receiving numerous internet requests on its screen to represent a DDoS attack
distributed denial of service (DDOS)

Cloudflare mitigates biggest ever HTTPS DDoS attack

A botnet generated over 212 million HTTPS requests from over 1,500 networks in 121 countries
15 Jun 2022
Microsoft bolsters threat intelligence capabilities with Miburo acquisition
Microsoft sign on a building
cyber attacks

Microsoft bolsters threat intelligence capabilities with Miburo acquisition

Cyber threat and research firm will tackle malicious foreign information campaigns as part of Microsoft’s Customer Security and Trust organization
15 Jun 2022
What is phishing as a service (Phaas)?
Graphic representing phishing with a hacker stealing data from one computer to anotheri
cyber security

What is phishing as a service (Phaas)?

With phishing as a service attacks surging, we explain what this low-cost, off-the-shelf method of targeting businesses is and why it’s growing in pop…
15 Jun 2022
Palermo ransomware attack: Vice Society claims responsibility as city details recovery strategy
Photograph taken of an old building in Palermo, Italy, with the sun setting in the background over the hills
ransomware

Palermo ransomware attack: Vice Society claims responsibility as city details recovery strategy

The Italian municipality is attempting to defy attackers by restoring its systems from backups
10 Jun 2022
What is metaverse security?
Somebody wearing a headset with green and blue lights shone on them
Security

What is metaverse security?

As the metaverse evolves, businesses need to think differently about virtual security to protect their IT infrastructure, staff, and customers
9 Jun 2022
Cyber criminals are spending longer inside business' networks after the initial breach
Digital generated image of electronic circuit security padlock made out of numbers on black background.
cyber attacks

Cyber criminals are spending longer inside business' networks after the initial breach

Cyber attackers' dwell time is up 36% thanks to initial access brokers and repeat exploitation of Microsoft Exchange vulnerabilities, according to Sop…
7 Jun 2022
Cyber security companies ‘must remember who the enemies are’
A hacker in a darkened room with digital maps and computer equipment
cyber security

Cyber security companies ‘must remember who the enemies are’

Tech giants must collaborate more with the wider industry, WithSecure’s CEO urges, as he lays bare European anxieties
6 Jun 2022
Exploitation of Atlassian Confluence zero-day surges fifteen-fold in 24 hours
Atlassian logo on a smartphone, with the logo on a wall in the background too
zero-day exploit

Exploitation of Atlassian Confluence zero-day surges fifteen-fold in 24 hours

The zero-day code execution vulnerability was discovered last week and cyber attackers are already capitalising on the proof-of-concept code
6 Jun 2022
Russian Killnet cyber attacks begin on Italian-linked businesses
Russian hacking on a laptop mockup with code sprawling over the screen
cyber warfare

Russian Killnet cyber attacks begin on Italian-linked businesses

Italy's cyber security authority issued a warning to all public and private sector organisations with links to the country to prepare for an increased…
31 May 2022
What is hacktivism?
Two masked members of Anonymous demonstrating during the Occupy protest on October 15, 2011 in The Hague
hacking

What is hacktivism?

From Anonymous to Omega, here’s everything you need to know about hackers with a conscience
27 May 2022
Why don’t we ever hear about ransomware demands in the tens of millions of dollars?
Stacks and rows of gold bars
ransomware

Why don’t we ever hear about ransomware demands in the tens of millions of dollars?

At a certain level, the alleged perfect security of the dark web becomes amenable to enquiry
21 May 2022
What is cyber warfare?
A red world map with white pixels
Security

What is cyber warfare?

We explain what cyber warfare is and why you need to pay attention to the threats posed
20 May 2022
Microsoft says it's provided over $100 million in tech support to Ukrainian government
Brad Smith on stage at Microsoft Envision giving his keynote
cyber attacks

Microsoft says it's provided over $100 million in tech support to Ukrainian government

The company says its tech platforms will be instrumental to creating Nuremberg-style trials after the war
20 May 2022
QNAP NAS drives targeted by DeadBolt ransomware for the third time this year
Visual representation of ransomware by showing encrypted files on a display
ransomware

QNAP NAS drives targeted by DeadBolt ransomware for the third time this year

The ransomware strain is back and equipped with stronger cryptography for more effective attacks
20 May 2022
US indicts heart doctor for allegedly spearheading high-profile ransomware operations
Male hacker hand on laptop computer keyboard with red binary screen of ransomware attack
ransomware

US indicts heart doctor for allegedly spearheading high-profile ransomware operations

The 55-year-old cardiologist profited from a ransomware side hustle and coached would-be hackers in using his tools for maximum rewards
17 May 2022
Microsoft warns of new botnet variant targeting Windows and Linux systems
Image of small robots connected to represent a botnet
Security

Microsoft warns of new botnet variant targeting Windows and Linux systems

The Sysrv botnet is back and equipped with more exploits though the primary goal of installing cryptominers remains the same
16 May 2022
Russian hackers declare war on 10 countries after failed Eurovision DDoS attack
Flag of Russia on a computer binary codes falling from the top and fading away
hacking

Russian hackers declare war on 10 countries after failed Eurovision DDoS attack

Italian police thwart cyber attacks on Eurovision's voting systems from the Russian-linked hacker group Killnet after the same group targeted public s…
16 May 2022
SES GS wins US government’s TROJAN contract
Finger pointing towards malware on a piece of code
cyber attacks

SES GS wins US government’s TROJAN contract

The five-year deal is aimed at fortifying the country’s cyber security resilience
16 May 2022
The rise of double extortion ransomware
Red computer screen with "RANSOM!" on it
ransomware

The rise of double extortion ransomware

With the use of this tactic increasing, we look at how you can protect your business
13 May 2022