IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

hacking

LockBit 2.0 ransomware disguised as PDFs distributed in email attacks
A digital render of an envelope, floating above blue cubes and the outlines of cubes made of red energy
Security

LockBit 2.0 ransomware disguised as PDFs distributed in email attacks

Researchers have urged vigilance over compressed attachments sent under false pretenses
27 Jun 2022
Hackers use Linux backdoor on compromised e-commerce sites with software skimmer
Small shopping cart on a keyboard
malware

Hackers use Linux backdoor on compromised e-commerce sites with software skimmer

Cyber criminals in China control the malware
19 Nov 2021
Iranian hackers ramp up attacks against IT services sector
The flag of Iran depicted in programming code
hacking

Iranian hackers ramp up attacks against IT services sector

Microsoft security researchers warn hacking is part of broader cyber espionage effort
19 Nov 2021
TikTok phishing campaign tried to scam over 125 influencer accounts
The TikTok logo on an application store accessed from a smartphone
social media

TikTok phishing campaign tried to scam over 125 influencer accounts

Hackers threatened to delete accounts over copyright violations
18 Nov 2021
Alibaba ECS instances targeted in new cryptojacking campaign
A view of Alibaba's headquarters in China
cryptocurrencies

Alibaba ECS instances targeted in new cryptojacking campaign

Cyber criminals have been disabling security features in the cloud to mine for Monero
16 Nov 2021
What is Emotet?
Trojan horse on a red laptop screen with blind justice in front of it
hacking

What is Emotet?

A deep dive into one of the most infamous and prolific strains of malware
16 Nov 2021
Iranian hackers targeting telcos and ISPs using upgraded malware
Red skull and crossbones atop binary code
hacking

Iranian hackers targeting telcos and ISPs using upgraded malware

New report shines a light on Lyceum cyberespionage group
10 Nov 2021
Hackers abuse poorly secured Docker Hub accounts to mine cryptocurrency
Bitcoin cryptocurrency mining
hacking

Hackers abuse poorly secured Docker Hub accounts to mine cryptocurrency

TeamTNT behind new campaign to install crypto miners on containers
10 Nov 2021
Magecart card skimmer avoids detection by evading virtual machines
Woman holding a credit card over a keyboard
hacking

Magecart card skimmer avoids detection by evading virtual machines

Browser script detects VMs used by researchers
5 Nov 2021
Fake Steam phishing baits victims with free Discord Nitro
The mobile app for communication platform Discord
phishing

Fake Steam phishing baits victims with free Discord Nitro

Victims end up on a fake page where their credentials are stolen
4 Nov 2021
Mekotio trojan continues to spread despite its operators’ arrests
Red horse image imposed atop a circuitboard
trojans

Mekotio trojan continues to spread despite its operators’ arrests

Hackers have used it in 100 more attacks since arrests
4 Nov 2021
161% surge in mobile phishing pushes energy industry to its limits
Power lines set against a city at night
hacking

161% surge in mobile phishing pushes energy industry to its limits

Following Colonial Pipeline, crooks get a taste for energy companies
4 Nov 2021
Office 365 phishing campaign used stolen Kaspersky Amazon SES token to fool victims
Kaspersky's antivirus software on a smartphone in someone's pocket
hacking

Office 365 phishing campaign used stolen Kaspersky Amazon SES token to fool victims

Credentials stolen from users after legitimate-looking email arrives in inboxes
2 Nov 2021
“Trojan Source” hides flaws in source code from humans
Toy horse on a digital screen to symbolise the attack of the Trojan virus
trojans

“Trojan Source” hides flaws in source code from humans

Organizations urged to take action to combat the new threat that could result in SolarWinds-style attacks
2 Nov 2021
Hackers could use new Wslink malware in highly targeted cyber attacks
Malware in code
malware

Hackers could use new Wslink malware in highly targeted cyber attacks

Malware acts as a server, but its origins baffle boffins
1 Nov 2021
Microsoft touts new cyber security help for nonprofits
Microsoft logo
cyber security

Microsoft touts new cyber security help for nonprofits

Free training, security assessments, and access to tools given to strengthen charities’ security posture
22 Oct 2021
A quarter of all malicious JavaScript is obfuscated
JavaScript code on a screen
hacking

A quarter of all malicious JavaScript is obfuscated

Hackers using concealed packers to avoid detection
20 Oct 2021
Organizations warned of ransomware risk from smaller operators
Ransomware on a red screen
ransomware

Organizations warned of ransomware risk from smaller operators

They may not have the financial muscle, but small-time cyber crooks can cause havoc for critical systems
19 Oct 2021
Iranian hacking group continues to target US citizens
The Google Play Store application as shown on a smartphone display
hacking

Iranian hacking group continues to target US citizens

APT35 used phishing attacks and uploaded spyware onto Google Play Store
18 Oct 2021
MirrorBlast phishing campaign targets financial companies
phishing hook in water surrounded by "at" symbols
phishing

MirrorBlast phishing campaign targets financial companies

The attack has been linked to a long-standing Russian cyber crime group
15 Oct 2021
Kaspersky exposes MysterySnail zero-day exploit in Windows
A depiction of a bug on a blue binary background
zero-day exploit

Kaspersky exposes MysterySnail zero-day exploit in Windows

Elevation-of-privilege flaw could enable Chinese hackers to mount widespread spying campaign
13 Oct 2021
Supply chain breaches impacted 97% of firms in the past year
Data breach in a circle connected to other circles and images
supply chain management (SCM)

Supply chain breaches impacted 97% of firms in the past year

New BlueVoyand research finds that supply chain security breaches are increasing
12 Oct 2021
The 4 most notorious hackers
Edward Snowden picture
hacking

The 4 most notorious hackers

From Snowden to Mitnick, we trace the lives of those who hack
12 Oct 2021