IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

cyber crime

Kaspersky finds most effective phishing emails imitate corporate messages, delivery notifications
A fishing hook rests on top of a stack of credit cards, while a padlock sits in the background out of focus
Security

Kaspersky finds most effective phishing emails imitate corporate messages, delivery notifications

Almost one in five employees clicked links in business related emails, but most emails containing threats or promising money were identified as phishi…
27 Jun 2022
What is phishing as a service (Phaas)?
Graphic representing phishing with a hacker stealing data from one computer to anotheri
cyber security

What is phishing as a service (Phaas)?

With phishing as a service attacks surging, we explain what this low-cost, off-the-shelf method of targeting businesses is and why it’s growing in pop…
15 Jun 2022
How rural businesses can overcome their cyber security handicaps
Digital lines imposed onto a rural business in the sun
Security

How rural businesses can overcome their cyber security handicaps

From a false sense of safety to fewer resources, rural organisations face unique cyber security challenges that need to be addressed
13 Jun 2022
Protecting healthcare from cybercrime
Whitepaper cover with title and image of healthcare professionals in white coats and latex gloves looking at a tablet in a labwhitepaper
Whitepaper

Protecting healthcare from cybercrime

Best practices to address evolving cyber security threats
25 May 2022
Why don’t we ever hear about ransomware demands in the tens of millions of dollars?
Stacks and rows of gold bars
ransomware

Why don’t we ever hear about ransomware demands in the tens of millions of dollars?

At a certain level, the alleged perfect security of the dark web becomes amenable to enquiry
21 May 2022
What is cyber warfare?
A red world map with white pixels
Security

What is cyber warfare?

We explain what cyber warfare is and why you need to pay attention to the threats posed
20 May 2022
Lone Russian RAT operator rivals large gangs with £5 "passion project"
Russian hacking on a laptop mockup with code sprawling over the screen
malware

Lone Russian RAT operator rivals large gangs with £5 "passion project"

Researchers say the lone actor's success speaks to the growing complexity of the underground malware market
13 May 2022
WannaCry's ghost is still wreaking havoc
Abstract image of a ghost on a digital screen
ransomware

WannaCry's ghost is still wreaking havoc

A retooled version of the infamous ransomware strain continues to haunt corporate networks around the world
12 May 2022
Landmark amendments to international cyber crime treaty set to be signed next week
Marija Pejcinovic Buric, the Council of Europe Secretary General, speaks at the Council of Europe
cyber crime

Landmark amendments to international cyber crime treaty set to be signed next week

It's only the second amendment to the historically significant Budapest Convention since it was introduced in 2001
6 May 2022
Phishing scam convinces US government to pay $23.5 million to cyber criminals
US Department of Defense badge mounted on a lectern
phishing

Phishing scam convinces US government to pay $23.5 million to cyber criminals

The historic case has finally reached an end with the criminals facing huge fines and jail terms
3 May 2022
What is phishing?
Email sign with a fish hook on blue digital background
phishing

What is phishing?

From banking scams to industrial espionage, we look at why phishing is so lucrative
29 Apr 2022
What is the LAPSUS$ group and who is behind the criminal operation?
An image of a digital padlock with code around it
cyber attacks

What is the LAPSUS$ group and who is behind the criminal operation?

The most prolific cyber criminals of 2022 have largely evaded identification for months despite being anything but secretive in the way they work
26 Apr 2022
The truth about cyber security training
Pair of feet in socks with a chair and plant in the backgroundwhitepaper
Whitepaper

The truth about cyber security training

Stop ticking boxes. Start delivering real change.
25 Apr 2022
The Total Economic Impact™ of Mimecast
Total economic impact of Mimecast - whitepaper from Mimecastwhitepaper
Whitepaper

The Total Economic Impact™ of Mimecast

Cost savings and business benefits enabled by using Mimecast with Microsoft 365
25 Apr 2022
Okta concludes investigation into alleged LAPSUS$ security breach
Okta company logo appearing on a smartphone which is placed upon a Windows laptop's keyboard
cyber attacks

Okta concludes investigation into alleged LAPSUS$ security breach

After security alarm bells rang following an undisclosed months-old breach, Okta's investigation concluded that the impact was less severe than first …
21 Apr 2022
Authorities finally confirm leading hacker platform RaidForums has been seized
A man in handcuffs standing in front of computer equipment in a darkened room
hacking

Authorities finally confirm leading hacker platform RaidForums has been seized

A 21-year-old was arrested in the UK in connection with the prolific hacker platform
13 Apr 2022
'Treasure hunter' dark web marketplace Hydra seized and shuttered by German cyber police
German BKA staff entering a building
cyber crime

'Treasure hunter' dark web marketplace Hydra seized and shuttered by German cyber police

Hydra Market operated on a vastly different model to most other popular marketplaces of its kind and was among the most popular in existence
6 Apr 2022
What is the Computer Misuse Act?
Keyboard with red-glowing keys
Policy & legislation

What is the Computer Misuse Act?

If your computer systems are attacked, is the law effective enough to put those criminals behind bars?
4 Apr 2022
LAPSUS$ returns with Globant breach, leaking trove of data on top global businesses
A symbol of a white padlock inside the outline of a shield on a red microchip
hacking

LAPSUS$ returns with Globant breach, leaking trove of data on top global businesses

Experts analysing the data dump told of the 'immense' damage that could be caused with access to such files
30 Mar 2022
Okta reveals full extent of LAPSUS$ breach as hackers announce hiatus
Okta logo appearing on a smartphone held aloft by a silhouetted hand in front of a blue and purple background
cyber attacks

Okta reveals full extent of LAPSUS$ breach as hackers announce hiatus

Okta's CSO expressed regret over the company's handling of the situation, namely the lengthy delay between identifying the security incident and notif…
23 Mar 2022
Australia launches $89 million cyber crime centre
A cyber security professional at their desk in an office
cyber crime

Australia launches $89 million cyber crime centre

The centre will be led by the police and bolster the nation’s cyber security capabilities
21 Mar 2022
Google exposes 'uniquely personal' access broker behind worst Conti, FIN12 ransomware attacks
The outline of a skull displayed in computer code to represent malware
ransomware

Google exposes 'uniquely personal' access broker behind worst Conti, FIN12 ransomware attacks

Investigation unveils the inner workings of one access broker that helped two of the most-hated ransomware gangs in history
18 Mar 2022
The keys to catching a cyber crook
Graphic showing one office cubicle highlighted in red in a sea of grey cubicles
hacking

The keys to catching a cyber crook

Why greed, carelessness and an itch for glory are highly exploitable chinks in a cyber criminal's armour
17 Mar 2022