Security
Latest about Security

Iranian MuddyWater hackers use compromised mailboxes for global phishing scams
By Sead Fadilpašić published
Hackers are still trying to infect victims via Word macros, despite the technique dying years ago.

Hundreds of Adobe Magento stores hit after critical security flaw found - here's what we know
By Sead Fadilpašić published
Adobe patches a deserialization vulnerability in Magento and Commerce.

TP-Link reveals more hardware security issues, so patch now or be at risk
By Sead Fadilpašić published
TP-Link patches four important bugs, including two critical severity ones.

One in five security breaches now thought to be caused by AI-written code
By Craig Hale published
Nearly a quarter of production code globally is now AI-generated, and yet 69% admit to finding vulnerabilities, report finds.

CISA warns high-severity Windows SMB flaw now exploited in attacks, so update now
By Craig Hale published
Windows 10, 11 and Server users should update to protect against this SMB vulnerability.

Hackers are exploiting OAuth loophole for persistent access - and resetting your password won't save you
By Ellen Jennings-Trace published
These fully automated attacks let hackers retain serious access to OAuth apps.

Jaguar Land Rover cyberattack could be the costliest in UK history
By Craig Hale published
JLR’s cyberattack cost an estimated £1.9 billion, with the UK government pledging £1.5 billion in loan support.

Muji halts online sales after ransomware attack on supplier
By Ellen Jennings-Trace published
Yet another top retailer falls victim to ransomware by proxy.

Notorious Chinese hacking group Salt Typhoon found lurking in European comms networks
By Ellen Jennings-Trace published
Salt Typhoon has its sights set on European Telecoms firm.

Microsoft's branding power is being used by criminals to funnel victims to tech support scam centers - here's what you need to know
By Efosa Udinmwen published
Criminals are exploiting Microsoft’s trusted branding to run tech support scams that manipulate fear, steal credentials, and compromise systems.
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!