cyber attacks
Latitude Financial's data policies questioned after more than 14 million records stolen![A close up shot of someone pressing a keyboard key on a laptop covered in blue and red lighting](data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=)
![A close up shot of someone pressing a keyboard key on a laptop covered in blue and red lighting](https://webcf.waybackmachine.org/web/20230330073938/https://media.itpro.co.uk//image/upload/f_auto,t_card-mobile@1/v1649150817/itpro/typing_laptop_GettyImages-1175885065.jpg)
Latitude Financial's data policies questioned after more than 14 million records stolen
Some of the data is from at least 2005 and includes customers’ name, address, and date of birth
27 Mar 2023
What is cloud ransomware and how can you avoid attacks?![Serverless cloud](data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=)
![Serverless cloud](https://webcf.waybackmachine.org/web/20230330073938/https://media.itpro.co.uk/image/upload/f_auto,t_card-mobile@1/v1570816525/itpro/2019/04/serverless_cloud_shutterstock_1260247069.jpg)
What is cloud ransomware and how can you avoid attacks?
With ransomware increasingly targeting cloud applications and data, as well as cloud-based companies, we explain how you can protect your business
24 Mar 2023
Pension Protection Fund confirms employee data exposed in GoAnywhere breach![Visual representation of ransomware by showing encrypted files on a display](data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=)
![Visual representation of ransomware by showing encrypted files on a display](https://webcf.waybackmachine.org/web/20230330073938/https://media.itpro.co.uk/image/upload/f_auto,t_card-mobile@1/v1570816532/itpro/2019/05/ransomwareshutterstock_668257165.jpg)
Pension Protection Fund confirms employee data exposed in GoAnywhere breach
The fund is the latest in a growing list of organisations affected by the breach
24 Mar 2023
North Korean hackers plot Gmail theft attacks via Chrome extension![Abstract image showing a cyber criminal silhouetted against a North Korean flag](data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=)
![Abstract image showing a cyber criminal silhouetted against a North Korean flag](https://webcf.waybackmachine.org/web/20230330073938/https://media.itpro.co.uk/image/upload/f_auto,t_card-mobile@1/v1570816704/itpro/2018/10/north_korea_shutterstock_498172096.jpg)
North Korean hackers plot Gmail theft attacks via Chrome extension
Targeting expert researchers on the Korean Peninsula, the hacking group is also known for deploying malware that can track victim locations, keystroke…
23 Mar 2023
NCSC launches free in-browser security threat checks for SMBs![Office workers in a well-lit office space](data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=)
![Office workers in a well-lit office space](https://webcf.waybackmachine.org/web/20230330073938/https://media.itpro.co.uk//image/upload/f_auto,t_card-mobile@1/v1654600022/itpro/2022/June/GettyImages-people_in_offices.jpg)
NCSC launches free in-browser security threat checks for SMBs
The new cyber toolkits will help SMBs assess their cyber readiness in a matter of minutes
21 Mar 2023
Greek intelligence allegedly uses Predator spyware on Facebook staffer![An eye overlaid with sharp-angled graphics and different colours like pink white and blue, all denoting a cyber element of surveillance such as spyware](data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=)
![An eye overlaid with sharp-angled graphics and different colours like pink white and blue, all denoting a cyber element of surveillance such as spyware](https://webcf.waybackmachine.org/web/20230330073938/https://media.itpro.co.uk//image/upload/f_auto,t_card-mobile@1/v1679400578/itpro/spyware_GettyImages-1387273775.jpg)
Greek intelligence allegedly uses Predator spyware on Facebook staffer
The employee’s device was infected through a link pretending to confirm a vaccination appointment
21 Mar 2023
Latitude hack leaves customers unable to protect their accounts![A person on a laptop to depict hacking](data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=)
![A person on a laptop to depict hacking](https://webcf.waybackmachine.org/web/20230330073938/https://media.itpro.co.uk/image/upload/f_auto,t_card-mobile@1/v1570817126/itpro/2019/02/breachshutterstock_571667695.jpg)
Latitude hack leaves customers unable to protect their accounts
The cyber attack has affected around 330,000 customers, although the company has said this is likely to increase
20 Mar 2023
Free decryptor released for Conti ransomware variant infecting hundreds of organisations![Abstract image showing a red circuit board containing a square chip with a glowing skull etched into it](data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=)
![Abstract image showing a red circuit board containing a square chip with a glowing skull etched into it](https://webcf.waybackmachine.org/web/20230330073938/https://media.itpro.co.uk//image/upload/f_auto,t_card-mobile@1/v1654085303/itpro/ransomware_GettyImages-1331944718.jpg)
Free decryptor released for Conti ransomware variant infecting hundreds of organisations
Hundreds of organisations and state institutions are believed to have been impacted by the strain
17 Mar 2023
SOC modernisation and and the role of XDR
SOC modernisation and and the role of XDR
Security operations remain challenging
16 Mar 2023
Analysing the economic benefits of Trend Micro Vision One
Analysing the economic benefits of Trend Micro Vision One
Trend Micro Vision One as a solution to cyber risks
16 Mar 2023
Rubrik confirms data breach but evades Cl0p ransomware allegations![An image of a digital padlock with code around it](data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=)
![An image of a digital padlock with code around it](https://webcf.waybackmachine.org/web/20230330073938/https://media.itpro.co.uk/image/upload/f_auto,t_card-mobile@1/v1570816635/itpro/2019/02/cyber_insurance_shutterstock_1051275365.jpg)
Rubrik confirms data breach but evades Cl0p ransomware allegations
It admitted some data was stolen through the exploitation of a zero day in a third-party platform, but has declined to comment on rumours of Cl0p's in…
15 Mar 2023
Meet the charity shaping Australia and New Zealand's data breach response![Members of staff at IDCARE at work](data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=)
![Members of staff at IDCARE at work](https://webcf.waybackmachine.org/web/20230330073938/https://media.itpro.co.uk//image/upload/f_auto,t_card-mobile@1/v1678382904/itpro/2023/March/IDCARE-members%20of%20staff%20at%20work.jpg)
Meet the charity shaping Australia and New Zealand's data breach response
IDCARE is recruiting a reserve army to turbocharge the fightback against cyber crime not just in the region, but in the interests of victims all over …
15 Mar 2023
Ring denies ALPHV ransomware attack![A ring doorbell fixed next to a door on the wall](data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=)
![A ring doorbell fixed next to a door on the wall](https://webcf.waybackmachine.org/web/20230330073938/https://media.itpro.co.uk//image/upload/f_auto,t_card-mobile@1/v1657792586/itpro/2022/July/Amazon_Ring_doorbell_GettyImages-1170779505.jpg)
Ring denies ALPHV ransomware attack
The ransomware group has claimed to be in possession of stolen Ring data, but provided no evidence
14 Mar 2023
Four-year-old iframe flaw allows hackers to steal Bitwarden passwords![A close up shot of someone pressing a keyboard key on a laptop covered in blue and red lighting](data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=)
![A close up shot of someone pressing a keyboard key on a laptop covered in blue and red lighting](https://webcf.waybackmachine.org/web/20230330073938/https://media.itpro.co.uk//image/upload/f_auto,t_card-mobile@1/v1649150817/itpro/typing_laptop_GettyImages-1175885065.jpg)
Four-year-old iframe flaw allows hackers to steal Bitwarden passwords
The password manager has known about the issue since 2018, publicising it in a report in 2018
9 Mar 2023
An in-depth analysis of the Microsoft 365 threat landscape
An in-depth analysis of the Microsoft 365 threat landscape
Cyber security report 2023
8 Mar 2023
Does LastPass really deserve a last chance?![The LastPass logo on a smartphone lying next to some bluetooth earphones](data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=)
![The LastPass logo on a smartphone lying next to some bluetooth earphones](https://webcf.waybackmachine.org/web/20230330073938/https://media.itpro.co.uk//image/upload/f_auto,t_card-mobile@1/v1661504345/itpro/2022/August/LastPass_password_logo_manager_GettyImages-1238142898.jpg)
Does LastPass really deserve a last chance?
After several disastrous security incidents and a communications breakdown, it’s time to leave LastPass for pastures new
8 Mar 2023
BlackLotus UEFI bootkit can break into fully patched Windows 11 PCs![Digital generated image of electronic circuit security padlock made out of numbers on black background.](data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=)
![Digital generated image of electronic circuit security padlock made out of numbers on black background.](https://webcf.waybackmachine.org/web/20230330073938/https://media.itpro.co.uk//image/upload/f_auto,t_card-mobile@1/v1641895707/Cyber-attack-GettyImages-1296451458.jpg)
BlackLotus UEFI bootkit can break into fully patched Windows 11 PCs
First noticed in October and priced at £4,000, it's the first bootkit of its kind capable of bypassing UEFI Secure Boot
3 Mar 2023
WH Smith hit by cyber attack, current and former staff data accessed![The front of a WH Smith shop](data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=)
![The front of a WH Smith shop](https://webcf.waybackmachine.org/web/20230330073938/https://media.itpro.co.uk//image/upload/f_auto,t_card-mobile@1/v1677754996/itpro/2023/March/WHsmith_GettyImages-1152691667.jpg)
WH Smith hit by cyber attack, current and former staff data accessed
The company stated that it is notifying staff members who have been affected
2 Mar 2023
CISA: Tech industry 'shouldn't tolerate' Patch Tuesday![CISA director Jen Easterly speaking at a House Committee hearing](data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=)
![CISA director Jen Easterly speaking at a House Committee hearing](https://webcf.waybackmachine.org/web/20230330073938/https://media.itpro.co.uk//image/upload/f_auto,t_card-mobile@1/v1677671128/itpro/jen_easterly_cisa_GettyImages-1394261351.jpg)
CISA: Tech industry 'shouldn't tolerate' Patch Tuesday
CISA director Jen Easterly said the tech industry has allowed the widespread acceptance of "deviant behaviours" to make a mockery of cyber security
1 Mar 2023
State-sponsored hackers are diversifying tactics, targeting small businesses![Somebody typing at their computer with a digital padlock and other illustrations](data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=)
![Somebody typing at their computer with a digital padlock and other illustrations](https://webcf.waybackmachine.org/web/20230330073938/https://media.itpro.co.uk//image/upload/f_auto,t_card-mobile@1/v1625750655/shutterstock_cyber_security.jpg)
State-sponsored hackers are diversifying tactics, targeting small businesses
Research has warned that state-sponsored threat actors will increasingly target smaller enterprises in 2023
28 Feb 2023
News Corp admits China-linked hackers breached company for two years![Main entrance to News Corporation / Fox News headquarters in New York.](data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=)
![Main entrance to News Corporation / Fox News headquarters in New York.](https://webcf.waybackmachine.org/web/20230330073938/https://media.itpro.co.uk//image/upload/f_auto,t_card-mobile@1/v1677495445/itpro/News_Corp_GettyImages-1233623854.jpg)
News Corp admits China-linked hackers breached company for two years
The News Corp breach follows recent news that threat actors had access to GoDaddy systems for three years
27 Feb 2023
Australia commits to establishing second national cyber security agency![Australia prime minister Anthony Albanese gives a speech](data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=)
![Australia prime minister Anthony Albanese gives a speech](https://webcf.waybackmachine.org/web/20230330073938/https://media.itpro.co.uk//image/upload/f_auto,t_card-mobile@1/v1677497286/itpro/2023/January/Albanese_Australia_PM_prime_minister_GettyImages-1247367140.jpg)
Australia commits to establishing second national cyber security agency
The country is still aiming to be the most cyber-secure country in the world by 2030
27 Feb 2023
Paying ransomware gangs could fund up to ten additional attacks![A 2D mockup image of a business paying a cyber criminal for a ransom](data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=)
![A 2D mockup image of a business paying a cyber criminal for a ransom](https://webcf.waybackmachine.org/web/20230330073938/https://media.itpro.co.uk//image/upload/f_auto,t_card-mobile@1/v1602069637/itpro/shutterstock_ransomware.jpg)
Paying ransomware gangs could fund up to ten additional attacks
The research from Trend Micro highlights the potential domino effect of paying ransoms
24 Feb 2023