Pro
Latest about Pro

Russian hackers hitting TP-Link home routers to hijack internet traffic
By Sead Fadilpašić published
SOHO endpoints are being used as gateways into corporate environments, where credentials and sensitive data gets harvested.

How to pick a website template that complements your brand identity
By Ritoban Mukherjee published
Learn how to select website templates that align with your brand identity and customize them effectively to create a unique online presence in 2026.

Project Glasswing wants to use AI to prevent AI cyberattacks
By Craig Hale published
Anthropic and a number of other companies reveal Project Glasswing - which is so powerful, it won't be released publicly.

'They lack the tools to help themselves': IT teams complain minor issues are stopping them from addressing the big problems
By Craig Hale published
Employees are troubling IT workers with minor issues, but IT teams are lacking the tools and resources to focus on bigger issues.

How to write AI website builder prompts like a high-end design agency
By Ritoban Mukherjee published
Learn how to craft AI website builder prompts that produce professional, agency-quality designs by studying elite inspiration sources and mastering effective prompting techniques.

Why 800VDC is the emergent electrical backbone of next-generation data centers
By Sean Burke published
As AI-driven data centers outgrow AC power, 800VDC boosts efficiency, scalability, and cuts costs significantly.

Why Agentic AI demands business process re-engineering
By Jeremiah Stone published
The real challenge with agentic AI isn’t technology, but organizational readiness and business process change.

Microsoft flags China-based hackers using vicious new 'rapid attack' zero-days to launch ransomware at targets across the world
By Sead Fadilpašić published
Microsoft warns the window to patch known flaws is shrinking, while the window to abuse zero-days grows.

New WhatsApp malware campaign uses renamed Windows tools to evade detection
By Efosa Udinmwen published
Microsoft warns WhatsApp users that VBS malware uses cloud services and renamed tools to gain persistent, hidden control over systems.

New $900-per-month malware service enables widespread account hijacking
By Efosa Udinmwen published
Storm infostealer hijacks session cookies, bypassing multi-factor authentication, harvesting credentials, and enabling persistent account access across enterprise and cryptocurrency systems globally.
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!