IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

cyber attacks

deBridge suspects Lazarus Group behind attempted phishing attack
Phishing threats
phishing

deBridge suspects Lazarus Group behind attempted phishing attack

macOS systems remain unaffected, states deBridge co-founder Alex Smirnov
9 Aug 2022
Both Russia and Ukraine targeted by Chinese state-backed hackers
China flag is depicted on the screen in program code
malware

Both Russia and Ukraine targeted by Chinese state-backed hackers

A five-year-old Microsoft Office vulnerability was enough to gain a significant foothold in some of the most high-value organisations in each country
9 Aug 2022
What is Dark Utilities C2 as a service (C2aaS)?
Keyboard with a digital overlay
hacking

What is Dark Utilities C2 as a service (C2aaS)?

Hackers can use the service to launch cyber attacks with ease for as little as £8.50
8 Aug 2022
Cyber attack on software supplier causes "major outage" across the NHS
The NHS website as seen on an internet browser
cyber attacks

Cyber attack on software supplier causes "major outage" across the NHS

Unconfirmed reports suggest the attack may be ransomware-related, while the NHS contends with disrupted services on the 111 non-emergency line
8 Aug 2022
Decade-old malware strains top annual list of most pervasive business exploits
The Windows logo on a phone in front of a malware warning
malware

Decade-old malware strains top annual list of most pervasive business exploits

Allied cyber security authorities say the most active strains of 2021 have been in operation for longer than five years, and are being constantly deve…
5 Aug 2022
Cyber attacks rain on Taiwan during Pelosi visit
US House Speaker Nancy Pelosi giving a speech in Taiwan
cyber warfare

Cyber attacks rain on Taiwan during Pelosi visit

IP addresses from China and Russia were said to have been responsible for the attack
5 Aug 2022
Malware operators abusing Windows shortcuts to bypass VBA macro block
Skull depicted in code
exploits

Malware operators abusing Windows shortcuts to bypass VBA macro block

The likes of Emotet and Qakbot, as well as Russia-linked state-sponsored hackers, have all pivoted to the new infection technique
5 Aug 2022
Auditors blame massive $4 million cryptocurrency heist on leaky logging technology
Stacks of dollars set against a blue and red background of binary code, denoting cryptocurrency and monetary value
hacking

Auditors blame massive $4 million cryptocurrency heist on leaky logging technology

Investigators raised concern over the thousands of vulnerable wallets containing Solana, USDC and other tokens
4 Aug 2022
First Choice Community Healthcare hit by data breach
Close up of network cables with data breach label
data breaches

First Choice Community Healthcare hit by data breach

The Albuquerque-based firm first learned of the breach in March 2022
2 Aug 2022
Every leading UK university is compromising on email security, researchers say
Minimalist design of an envelope with red notification badges symbolising emails, against a powder green background
phishing

Every leading UK university is compromising on email security, researchers say

Proofpoint said none of the top ten universities in the UK have implemented the recommended email security policies, leaving institutions open to cybe…
2 Aug 2022
European energy company and gas pipeline hacked by AlphV ransomware
Power lines set against a city at night
ransomware

European energy company and gas pipeline hacked by AlphV ransomware

The ransomware gang responsible is also linked with the group that took down Colonial Pipeline a year ago
2 Aug 2022
Cyber attack on US court system being investigated, DoJ confirms
Matthew Olsen of the US National Security Division
cyber attacks

Cyber attack on US court system being investigated, DoJ confirms

The early 2020 attack, publicly disclosed for the first time this week, is thought to have had a "staggering effect" on the department and other agenc…
29 Jul 2022
NCSC launches startup incubator to protect against national cyber threats
Mockup of the the NCSC's official web page
National Cyber Security Centre (NCSC)

NCSC launches startup incubator to protect against national cyber threats

The program is focused on the protection of highly available operational technology where there is a high risk of digital sabotage
28 Jul 2022
Researchers uncover 'mysterious' Windows rootkit being actively exploited since 2016
Motherboard mockup
malware

Researchers uncover 'mysterious' Windows rootkit being actively exploited since 2016

Experts at Kaspersky say the rootkit was found embedded inside the firmware image of legacy Asus and Gigabyte motherboards
27 Jul 2022
Microsoft warns hackers turning to IIS exploits to create backdoors in businesses
Door in a wall in a black room painted with computer code leading to a digital red background
cyber attacks

Microsoft warns hackers turning to IIS exploits to create backdoors in businesses

Internet information service modules formed part of the attack of Microsoft's own Exchange servers earlier this year
27 Jul 2022
Ransomware now strikes one in 40 organisations per week, Check Point finds
"Ransomware" text within binary code
ransomware

Ransomware now strikes one in 40 organisations per week, Check Point finds

VARs, systems integrators, and distributors saw a 143% year-on-year increase in attacks during Q2
27 Jul 2022
TSA amends cyber security requirements for pipeline operators
Oil
Security

TSA amends cyber security requirements for pipeline operators

The revised directive provides operators with greater flexibility over security management and incident response
26 Jul 2022
Russian cyber attacks on Ukraine: What we know so far
A mockup image depicting a fractured relationship between Ukraine and Russia with cracks appearing across both flags
cyber warfare

Russian cyber attacks on Ukraine: What we know so far

The conflict between Russia and Ukraine has set the tone for all future wars, and the cyber attacks observed throughout will provide a how-to guide on…
22 Jul 2022
GPS tracker exploit puts the world's most high-value individuals in real-world danger
A hacker against a red background
hacking

GPS tracker exploit puts the world's most high-value individuals in real-world danger

Vulnerabilities in a GPS tracker used by governments, militaries, and Fortune 50 companies could be used to track the locations of high-value targets …
20 Jul 2022
Flipkart’s Cleartrip suffers “massive” data breach
The outline of a Boeing aircraft with clouds and moon in the background
data breaches

Flipkart’s Cleartrip suffers “massive” data breach

The Indian online travel company notified customers yesterday of the breach which seems to have taken place between April and May 2022
19 Jul 2022
Global ransomware activity surges again following a short decline in Q1
Abstract image showing a red circuit board containing a square chip with a glowing skull etched into it
ransomware

Global ransomware activity surges again following a short decline in Q1

Researchers blamed the rise on a marked increase in activity from a select few prolific ransomware operations
18 Jul 2022
How to protect against 'endemic' Log4j vulnerabilities
A mockup of the log4j Java library logo
cyber security

How to protect against 'endemic' Log4j vulnerabilities

A US government report details a series of recommendations to help counter the Log4Shell flaw in the long term
15 Jul 2022
What is threat hunting?
Somebody using a red-backlit keyboard on their laptop
cyber security

What is threat hunting?

Although most threats can be dealt with automatically, the tougher ones require a bit more investigation
15 Jul 2022