Skip to content
Linkedin-in Envelope Map-marker-alt
×
  • Italiano
  • Inglese
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti

Categoria: AI

  1. Home
  2. AI

AI Security Firm Straiker Emerges From Stealth With $21M in Funding

Straiker has emerged from stealth mode with a solution designed to help enterprises secure AI agents and applications.

The post AI Security Firm Straiker Emerges From Stealth With $21M in Funding appeared first on SecurityWeek.

SplxAI Raises $7 Million for AI Security Platform

SplxAI has raised $7 million in a seed funding round led by LAUNCHub Ventures to secure agentic AI systems.

The post SplxAI Raises $7 Million for AI Security Platform appeared first on SecurityWeek.

New Jailbreak Technique Uses Fictional World to Manipulate AI

Cato Networks discovers a new LLM jailbreak technique that relies on creating a fictional world to bypass a model’s security controls.

The post New Jailbreak Technique Uses Fictional World to Manipulate AI appeared first on SecurityWeek.

Browser Security Under Siege: The Alarming Rise of AI-Powered Phishing

Analysis reveals a 140% increase in browser phishing, including a 130% increase in zero-hour phishing attacks.

The post Browser Security Under Siege: The Alarming Rise of AI-Powered Phishing appeared first on SecurityWeek.

AI Is Turbocharging Organized Crime, EU Police Agency Warns

AI and other technologies “are a catalyst for crime, and drive criminal operations’ efficiency by amplifying their speed, reach, and sophistication,” the report said.

The post AI Is Turbocharging Organized Crime, EU Police Agency Warns appeared first on SecurityWeek.

Nvidia Riva Vulnerabilities Allow Unauthorized Use of AI Services

Vulnerabilities in Nvidia Riva could allow hackers to abuse speech and translation AI services that are typically expensive. 

The post Nvidia Riva Vulnerabilities Allow Unauthorized Use of AI Services appeared first on SecurityWeek.

New CCA Jailbreak Method Works Against Most AI Models

Two Microsoft researchers have devised a new jailbreak method that bypasses the safety mechanisms of most AI systems.

The post New CCA Jailbreak Method Works Against Most AI Models appeared first on SecurityWeek.

DeepSeek’s Malware-Generation Capabilities Put to Test

Researchers have analyzed the ability of the Chinese gen-AI DeepSeek to create malware such as ransomware and keyloggers.

The post DeepSeek’s Malware-Generation Capabilities Put to Test appeared first on SecurityWeek.

Beware of DeepSeek Hype: It’s a Breeding Ground for Scammers

Exploiting trust in the DeepSeek brand, scammers attempt to harvest personal information or steal user credentials.

The post Beware of DeepSeek Hype: It’s a Breeding Ground for Scammers appeared first on SecurityWeek.

New AI Protection from Google Cloud Tackles AI Risks, Threats, and Compliance

Google Cloud’s AI Protection helps discover AI inventory, secure AI assets, and manage threats with detect, investigate, and respond capabilities.

The post New AI Protection from Google Cloud Tackles AI Risks, Threats, and Compliance appeared first on SecurityWeek.

  • Previous
  • 1
  • ...
  • 11
  • 12
  • 13
  • ...
  • 27
  • Next
SecurityIT | Consulenza Sulla Sicurezza Informatica
Linkedin-in Envelope Map-marker-alt

Il gruppo

  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission
×
  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission

Servizi

  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
×
  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
© show.it | Tutti i diritti riservati | P.Iva 06984320017 | Privacy Policy | Cookie Policy | Realizzato da incio.it