IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Security

Cloudflare scuppers Twilio-like cyber attack with hardware keys
The Cloudflare website accessed through a web browser on a PC
cyber security

Cloudflare scuppers Twilio-like cyber attack with hardware keys

Phishing attempt was unable to gather information required to access the company’s systems thanks to secure hardware MFA
11 Aug 2022
Darktrace partners with HackerOne to bring AI to attack resistance
Abstract visualisation of padlock icon
cyber security

Darktrace partners with HackerOne to bring AI to attack resistance

New collaboration combines Darktrace’s attack surface management technology with HackerOne’s continuous security assessment capabilities
11 Aug 2022
Google adds stronger safeguards for Workspace accounts
Google's Workspace suite on a smartphone
collaboration

Google adds stronger safeguards for Workspace accounts

An automatic safety features notify users of risky account actions
11 Aug 2022
Three ransomware attacks hit single company over two weeks
A simple graphic of a white laptop on a red background, with a distorted red padlock showing on the laptop's otherwise black screen
ransomware

Three ransomware attacks hit single company over two weeks

It's the first time an attack of this nature has been seen by the expert researchers
11 Aug 2022
Cisco Talos confirms data breach after ransomware gang 'forces' incident disclosure
A upward angled photo showing the Cisco logo suspended from the ceiling of a dark conference room
data breaches

Cisco Talos confirms data breach after ransomware gang 'forces' incident disclosure

The attack has been attributed to an initial access broker linked to LAPSUS$ and the Yanluowang ransomware groups
11 Aug 2022
DoD taps up Torch.AI to strengthen cyber security capabilities
A digital version of the US flag, the right side of which has been transformed to binary code
cyber security

DoD taps up Torch.AI to strengthen cyber security capabilities

The new threat intelligence system eliminates conventional constraints on data analysis
11 Aug 2022
Inside Liverpool FC's cyber recruitment revolution
The crowd during a match at Liverpool FC's Anfield stadium
Careers & training

Inside Liverpool FC's cyber recruitment revolution

The next generation of cyber talent is best scouted pitchside with former youth players armed to the teeth with the soft skills businesses are crying …
11 Aug 2022
Dogwalk RCE variant among 121 vulnerabilities fixed in Microsoft's August Patch Tuesday
Microsoft Windows 11 logo on a smartphone set against a background of neon blue code on a screen to denote a cyber security theme
zero-day exploit

Dogwalk RCE variant among 121 vulnerabilities fixed in Microsoft's August Patch Tuesday

The second-biggest security update released by Microsoft this year featured 17 critical-rated RCEs and privilege escalation bugs
10 Aug 2022
Should your business worry about Chinese cyber attacks?
A cyber criminal with the Chinese flag reflected in his glasses
cyber warfare

Should your business worry about Chinese cyber attacks?

State-backed hackers are upping the anti, with businesses on high alert over the potential for falling victim to cyber espionage and IP theft
10 Aug 2022
deBridge suspects Lazarus Group behind attempted phishing attack
Email sign with a fish hook on blue digital background
phishing

deBridge suspects Lazarus Group behind attempted phishing attack

macOS systems remain unaffected, states deBridge co-founder Alex Smirnov
9 Aug 2022
Meta clamps down on South Asian cyber espionage operations involving Facebook
Meta Platforms signage outside the company's headquarters in Menlo Park, California
cyber warfare

Meta clamps down on South Asian cyber espionage operations involving Facebook

The firm’s latest threat intelligence report discloses successful takedowns in India, Greece, South Africa and Indonesia
9 Aug 2022
Twilio account breach result of sophisticated social engineering campaign
Man typing code on a laptop
Security

Twilio account breach result of sophisticated social engineering campaign

Employees were subjected to personalised texts that impersonated Twilio's IT department, in a strategic credential harvesting operation
9 Aug 2022
Logicalis snaps up UK-based IT consultancy Q Associates
Database graphic
mergers and acquisitions

Logicalis snaps up UK-based IT consultancy Q Associates

MSP extends specialist Microsoft and data-centric IT services capabilities across the UK and Ireland
9 Aug 2022
Both Russia and Ukraine targeted by Chinese state-backed hackers
China flag is depicted on the screen in program code
malware

Both Russia and Ukraine targeted by Chinese state-backed hackers

A five-year-old Microsoft Office vulnerability was enough to gain a significant foothold in some of the most high-value organisations in each country
9 Aug 2022
South Korean public sector organisations targeted by Gwisin ransomware
A simple graphic of a white laptop on a red background, with a distorted red padlock showing on the laptop's otherwise black screen
ransomware

South Korean public sector organisations targeted by Gwisin ransomware

Threat actors tailored attacks on victims such as pharmaceutical companies, with researchers still in the dark on key details
8 Aug 2022
Why convenience is the biggest threat to your security
Man holding smart phone with data security on display at office
Sponsored

Why convenience is the biggest threat to your security

The shortcuts and human error that lead to breaches - and how to guard against them
8 Aug 2022
VMware warns of tumultuous threats amid Russia-Ukraine cyber war
Abstract silhouette of a computer hacker in front of a Russian flag
hacking

VMware warns of tumultuous threats amid Russia-Ukraine cyber war

New report underscores burned-out security teams' response to geopolitically motivated cyber attacks
8 Aug 2022
What is Dark Utilities C2 as a service (C2aaS)?
Keyboard with a digital overlay
hacking

What is Dark Utilities C2 as a service (C2aaS)?

Hackers can use the service to launch cyber attacks with ease for as little as £8.50
8 Aug 2022
Microsoft blocking Tutanota users from Teams registration, claims fix unfeasible
The Microsoft Teams logo is shown on a smartphone, with the Microsoft logo displayed in the background on a wall
Business operations

Microsoft blocking Tutanota users from Teams registration, claims fix unfeasible

Tutanota claim this is an antitrust issue, as the company shares the problem with the public
8 Aug 2022
Cyber attack on software supplier causes "major outage" across the NHS
The NHS website as seen on an internet browser
cyber attacks

Cyber attack on software supplier causes "major outage" across the NHS

Unconfirmed reports suggest the attack may be ransomware-related, while the NHS contends with disrupted services on the 111 non-emergency line
8 Aug 2022
Brave pushes the boundaries of privacy by design
The Brave browser icon in the background behind somebody using their phone
privacy

Brave pushes the boundaries of privacy by design

It’s quite a big step to abandon the big three of Chrome, Edge and Safari for a niche option that doesn’t just tack privacy on top
6 Aug 2022
Home Office to collect foreign offenders' biometric data using smartwatch scheme
A smartwatch on someone's arm, lit in red
privacy

Home Office to collect foreign offenders' biometric data using smartwatch scheme

Facial recognition and geolocation data will be matched against Home Office, Ministry of Justice and police databases
5 Aug 2022
Nomad happy to forgive hackers if they return 90% of $190 million that was stolen
A hacker against a red background
hacking

Nomad happy to forgive hackers if they return 90% of $190 million that was stolen

The crypto bridge is offering 'white hat hackers' a 10% bounty following the attack earlier this week
5 Aug 2022