Stay informed with the latest news, video, live updates and expert analysis about Cyber-attacks from across the BBC.
Learn what a DDoS attack is, how it works, and how cybersecurity tools like botnets detection, rate limiting, and cloud ...
Artificial intelligence is speeding up timelines for cyber attacks, a new report has found, creating what the authors call a widening “cybersecurity speed gap” between bad actors and defense efforts.
Modern cyber incidents are providing powerful, real-world examples of how a cyberattack can cause a domino effect across a company's entire supply chain. For example, what started as a detected ...
Programmable logic controllers (PLCs) are essentially specialized industrial computers that read data from sensors and use that data to automate the control of electromechanical processes, such as the ...
NEW BRITAIN, CT (WFSB) - A ransomware attack has disrupted New Britain’s city network systems for more than 48 hours, forcing departments to operate with pen and paper while federal authorities ...
Over the past weekend, the U.S. artificial intelligence (AI) lab Anthropic published a report about its discovery of the “first reported AI-orchestrated cyber espionage campaign.” The company says a ...
Over the four-day Easter weekend of 18 to 21 April 2025, customers of British high street fixture Marks & Spencer (M&S) took to social media in droves to lament an apparent outage that was causing ...
The United Kingdom's National Cyber Security Centre (NCSC) alerted British organizations to a heightened risk of Iranian cyberattacks amid the ongoing conflict in the Middle East. While there is no ...
Forbes contributors publish independent expert analyses and insights. Serial technology CEO covering all things IT & Tech. This voice experience is generated by AI. Learn more. This voice experience ...
Anthropic is investigating a claim that a small group of people gained access to its Claude Mythos model - the cyber-security tool which the AI firm says is too powerful to release to the public.
The criminals of today are still exploiting basic security failures.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results