Skip to content
Linkedin-in Envelope Map-marker-alt
×
  • Italiano
  • Inglese
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti

Categoria: AI

  1. Home
  2. AI

ChatGPT Deep Research Targeted in Server-Side Data Theft Attack

chatgpt-deep-research-targeted-in-server-side-data-theft-attack

OpenAI has fixed this zero-click attack method called by researchers ShadowLeak.

The post ChatGPT Deep Research Targeted in Server-Side Data Theft Attack appeared first on SecurityWeek.

Irregular Raises $80 Million for AI Security Testing Lab

irregular-raises-$80-million-for-ai-security-testing-lab

Irregular is testing the cybersecurity capabilities of AI models, including Anthropic’s Claude and OpenAI’s ChatGPT.

The post Irregular Raises $80 Million for AI Security Testing Lab appeared first on SecurityWeek.

Scalekit Raises $5.5 Million to Secure AI Agent Authentication

scalekit-raises-$5.5-million-to-secure-ai-agent-authentication

The startup provides an authentication stack that secures both incoming authentication and outgoing agent actions.

The post Scalekit Raises $5.5 Million to Secure AI Agent Authentication appeared first on SecurityWeek.

CrowdStrike to Acquire Pangea to Launch AI Detection and Response (AIDR)

crowdstrike-to-acquire-pangea-to-launch-ai-detection-and-response-(aidr)

Acquisition extends CrowdStrike’s Falcon platform into AI security, introducing AI Detection and Response (AIDR) to protect enterprise models, agents, and applications across the full AI lifecycle.

The post CrowdStrike to Acquire Pangea to Launch AI Detection and Response (AIDR) appeared first on SecurityWeek.

Check Point to Acquire AI Security Firm Lakera

check-point-to-acquire-ai-security-firm-lakera

Move highlights rising demand for AI-native security as enterprises face new risks from generative models and autonomous agents

The post Check Point to Acquire AI Security Firm Lakera appeared first on SecurityWeek.

ChatGPT’s Calendar Integration Can Be Exploited to Steal Emails

chatgpt’s-calendar-integration-can-be-exploited-to-steal-emails

Researchers show how a crafted calendar invite can trigger ChatGPT to exfiltrate sensitive emails.

The post ChatGPT’s Calendar Integration Can Be Exploited to Steal Emails appeared first on SecurityWeek.

F5 to Acquire CalypsoAI for $180 Million

F5 is buying CalypsoAI for its adaptive AI inference security solutions, which will be integrated into its Application Delivery and Security Platform.

The post F5 to Acquire CalypsoAI for $180 Million appeared first on SecurityWeek.

AI Emerges as the Hope—and Risk—for Overloaded SOCs

With security teams drowning in alerts, many suppress detection rules and accept hidden risks. AI promises relief through automation and triage—but without human oversight, it risks becoming part of the problem.

The post AI Emerges as the Hope—and Risk—for Overloaded SOCs appeared first on SecurityWeek.

PromptLock Only PoC, but AI-Powered Ransomware Is Real

PromptLock is only a prototype of LLM-orchestrated ransomware, but hackers already use AI in file encryption and extortion attacks.

The post PromptLock Only PoC, but AI-Powered Ransomware Is Real appeared first on SecurityWeek.

How to Close the AI Governance Gap in Software Development

Widespread adoption of AI coding tools accelerates development—but also introduces critical vulnerabilities that demand stronger governance and oversight.

The post How to Close the AI Governance Gap in Software Development appeared first on SecurityWeek.

  • Previous
  • 1
  • ...
  • 4
  • 5
  • 6
  • ...
  • 27
  • Next
SecurityIT | Consulenza Sulla Sicurezza Informatica
Linkedin-in Envelope Map-marker-alt

Il gruppo

  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission
×
  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission

Servizi

  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
×
  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
© show.it | Tutti i diritti riservati | P.Iva 06984320017 | Privacy Policy | Cookie Policy | Realizzato da incio.it