IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more
How does a SQL injection attack work?
SQL injection
hacking

How does a SQL injection attack work?

Understanding one of the simplest, yet most effective, methods of cyber attack
10 Jun 2022
Palermo ransomware attack: Vice Society claims responsibility as city details recovery strategy
Photograph taken of an old building in Palermo, Italy, with the sun setting in the background over the hills
ransomware

Palermo ransomware attack: Vice Society claims responsibility as city details recovery strategy

The Italian municipality is attempting to defy attackers by restoring its systems from backups
10 Jun 2022
WithSecure CTO: Industry needs to do a better job of targeting ransomware supply chains
Abstract image showing a red circuit board containing a square chip with a glowing skull etched into it
ransomware

WithSecure CTO: Industry needs to do a better job of targeting ransomware supply chains

The centralisation of services and tools for hackers should represent a point of vulnerability for those fighting cyber crime
1 Jun 2022
Fresh Microsoft Office zero-day executes code on fully patched applications
A magnifying glass hovering over a PC screen with the symbols for Microsoft Office software displayed
zero-day exploit

Fresh Microsoft Office zero-day executes code on fully patched applications

Malicious documents saved in Rich Text Format are especially concerning since they can execute code without even being opened
30 May 2022
What is hacktivism?
Two masked members of Anonymous demonstrating during the Occupy protest on October 15, 2011 in The Hague
hacking

What is hacktivism?

From Anonymous to Omega, here’s everything you need to know about hackers with a conscience
27 May 2022
Linux-based Cheerscrypt ransomware found targeting VMware ESXi servers
A smartphone, lying on its side in front of a data graphic, with the word VMware displayed
ransomware

Linux-based Cheerscrypt ransomware found targeting VMware ESXi servers

Cheerscrypt malware could cause severe disruption to companies using the virtualisation software
26 May 2022
Open source packages with millions of installs hacked to harvest AWS credentials
A screen showing code written in Python
hacking

Open source packages with millions of installs hacked to harvest AWS credentials

Two popular open source packages used by Python and PHP developers have been quietly compromised with successful attacks already being reported
24 May 2022
What is cyber warfare?
A red world map with white pixels
Security

What is cyber warfare?

We explain what cyber warfare is and why you need to pay attention to the threats posed
20 May 2022
Russian hackers declare war on 10 countries after failed Eurovision DDoS attack
Flag of Russia on a computer binary codes falling from the top and fading away
hacking

Russian hackers declare war on 10 countries after failed Eurovision DDoS attack

Italian police thwart cyber attacks on Eurovision's voting systems from the Russian-linked hacker group Killnet after the same group targeted public s…
16 May 2022
The rise of double extortion ransomware
Red computer screen with "RANSOM!" on it
ransomware

The rise of double extortion ransomware

With the use of this tactic increasing, we look at how you can protect your business
13 May 2022
WannaCry's ghost is still wreaking havoc
Abstract image of a ghost on a digital screen
ransomware

WannaCry's ghost is still wreaking havoc

A retooled version of the infamous ransomware strain continues to haunt corporate networks around the world
12 May 2022
IoT privacy and security concerns
A secure network depicted by connected padlocks
Security

IoT privacy and security concerns

We take a look at what's needed to really secure internet-connected devices
6 May 2022
Rental car company Sixt confirms cyber attack, leaves scores of UK customers in the dark
Sixt rental car company signs affixed to a ceiling
cyber attacks

Rental car company Sixt confirms cyber attack, leaves scores of UK customers in the dark

The rental car giant announced a cyber attack on Sunday and has been largely uncontactable for days, but insists disruption is temporary and minimal
3 May 2022
How do you become an ethical hacker?
Ethical hacker silhouette walking through a keyhole, symbolising physical security and penetration testing
ethical hacking

How do you become an ethical hacker?

We examine what certifications do you need, what jobs are available and how much you can expect to be paid
29 Apr 2022
DDoS attacks surge to record numbers in 2022 as a result of Russia-Ukraine war
Mockup depicting crumbled relationship between Ukraine and Russia
distributed denial of service (DDOS)

DDoS attacks surge to record numbers in 2022 as a result of Russia-Ukraine war

Cases this year saw some of the longest-lasting DDoS attacks ever seen as hacktivists assembled to take on their enemies in the ongoing cyber war betw…
26 Apr 2022
Russian-affiliates believed to be behind cyber attacks on wind turbines firms
Wind turbine from Vestas Wind Systems
cyber attacks

Russian-affiliates believed to be behind cyber attacks on wind turbines firms

Three German-based renewable energy companies attacked as country attempts to wean itself off Russian oil
26 Apr 2022
What is the LAPSUS$ group and who is behind the criminal operation?
An image of a digital padlock with code around it
cyber attacks

What is the LAPSUS$ group and who is behind the criminal operation?

The most prolific cyber criminals of 2022 have largely evaded identification for months despite being anything but secretive in the way they work
26 Apr 2022
LAPSUS$ breached T-Mobile systems, stole source code
A pink T-Mobile logo on a storefront in Aachen, Germany
data breaches

LAPSUS$ breached T-Mobile systems, stole source code

T-Mobile has denied that the hackers obtained customer or government information
25 Apr 2022
Five Eyes nations warn against impending Russian cyber attacks
Russian hacking on a laptop mockup with code sprawling over the screen
cyber warfare

Five Eyes nations warn against impending Russian cyber attacks

Eight hacking groups have reportedly pledged allegiance to the Russian government, according to latest findings from the US, Australian, Canadian, New…
21 Apr 2022
Authorities finally confirm leading hacker platform RaidForums has been seized
A man in handcuffs standing in front of computer equipment in a darkened room
hacking

Authorities finally confirm leading hacker platform RaidForums has been seized

A 21-year-old was arrested in the UK in connection with the prolific hacker platform
13 Apr 2022
T-Mobile allegedly tried to buy leaked data from a hacker forum for $200k
Padlocks on a dollar to represent the cost of cyber crime
hacking

T-Mobile allegedly tried to buy leaked data from a hacker forum for $200k

The stolen information was still up for sale long after payment, court papers suggest
13 Apr 2022
Certified ethical hacker and IT manager steals $575,000 in cryptocurrency from elderly person
Ethical hacker silhouette walking through a keyhole, symbolising physical security and penetration testing
hacking

Certified ethical hacker and IT manager steals $575,000 in cryptocurrency from elderly person

The practising IT manager stole the huge sum from an elderly person after being hired to fit a home security system
12 Apr 2022
Microsoft uses sinkhole to thwart Russian state-backed Fancy Bear attacks
Fancy Bear Hacker sitting in front of laptop
cyber attacks

Microsoft uses sinkhole to thwart Russian state-backed Fancy Bear attacks

Also known as APT28 or Strontium, Fancy Bear is one of the most active APT groups in the world
8 Apr 2022