Skip to content
Linkedin-in Envelope Map-marker-alt
×
  • Italiano
  • Inglese
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di Cyber Security
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di Cyber Security
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di Cyber Security
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di Cyber Security
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti

Categoria: China

  1. Home
  2. China

China’s Offensive Cyber Operations in Africa Support Soft Power Efforts

china’s-offensive-cyber-operations-in-africa-support-soft-power-efforts

Chinese state-sponsored threat groups have targeted telecoms, financial and government organizations in Africa as part of soft power efforts.

The post China’s Offensive Cyber Operations in Africa Support Soft Power Efforts appeared first on SecurityWeek.

China Says No Law Banning iPhone Use in Govt Agencies

china-says-no-law-banning-iphone-use-in-govt-agencies

China said it was following media reports about suspected security issues with iPhones but insisted there was no ban on its officials using the devices

The post China Says No Law Banning iPhone Use in Govt Agencies appeared first on SecurityWeek.

China-Linked ‘Redfly’ Group Targeted Power Grid

china-linked-‘redfly’-group-targeted-power-grid

Symantec warns that the Redfly APT appears to be focusing exclusively on targeting critical national infrastructure organizations.

The post China-Linked ‘Redfly’ Group Targeted Power Grid appeared first on SecurityWeek.

Crash Dump Error: How a Chinese Espionage Group Exploited Microsoft’s Mistakes

crash-dump-error:-how-a-chinese-espionage-group-exploited-microsoft’s-mistakes

Microsoft reveals how a crash dump from 2021 inadvertently exposed a key that Chinese cyberspies later leveraged to hack US government emails.

The post Crash Dump Error: How a Chinese Espionage Group Exploited Microsoft’s Mistakes appeared first on SecurityWeek.

‘Earth Estries’ Cyberespionage Group Targets Government, Tech Sectors

‘earth-estries’-cyberespionage-group-targets-government,-tech-sectors

Earth Estries, a cyberspy group possibly linked to China, has targeted governments and tech firms in the US, Germany, South Africa and Asia. 

The post ‘Earth Estries’ Cyberespionage Group Targets Government, Tech Sectors appeared first on SecurityWeek.

Chinese APT Was Prepared for Remediation Efforts in Barracuda ESG Zero-Day Attack

chinese-apt-was-prepared-for-remediation-efforts-in-barracuda-esg-zero-day-attack

Chinese threat actor exploiting Barracuda ESG appliances deployed persistence mechanisms in preparation for remediation efforts.

The post Chinese APT Was Prepared for Remediation Efforts in Barracuda ESG Zero-Day Attack appeared first on SecurityWeek.

Chinese-backed APT ‘Flax Typhoon’ Hacks Taiwan with Minimal Malware Footprint

chinese-backed-apt-‘flax-typhoon’-hacks-taiwan-with-minimal-malware-footprint

Microsoft warns that Chinese spies are hacking into Taiwanese organizations with minimal use of malware and by abusing legitimate software.

The post Chinese-backed APT ‘Flax Typhoon’ Hacks Taiwan with Minimal Malware Footprint appeared first on SecurityWeek.

New ‘Carderbee’ APT Targeted Chinese Security Software in Supply Chain Attack

new-‘carderbee’-apt-targeted-chinese-security-software-in-supply-chain-attack

A new APT group called Carderbee has been observed deploying the PlugX backdoor via a supply chain attack targeting organizations in Hong Kong.

The post New ‘Carderbee’ APT Targeted Chinese Security Software in Supply Chain Attack appeared first on SecurityWeek.

Possible Chinese Malware in US Systems a ‘Ticking Time Bomb’: Report

possible-chinese-malware-in-us-systems-a-‘ticking-time-bomb’:-report

China has implanted malware in key US power and communications networks in a “ticking time bomb” that could disrupt the military in event of a conflict

The post Possible Chinese Malware in US Systems a ‘Ticking Time Bomb’: Report appeared first on SecurityWeek.

Microsoft Revokes Many Signed Drivers Used by Chinese Cybercriminals

microsoft-revokes-many-signed-drivers-used-by-chinese-cybercriminals

Microsoft has revoked signed drivers used for post-exploitation activity, in many cases by Chinese cybercriminals.

The post Microsoft Revokes Many Signed Drivers Used by Chinese Cybercriminals appeared first on SecurityWeek.

  • 1
  • 2
  • 3
  • Next
SecurityIT | Consulenza Sulla Sicurezza Informatica
Linkedin-in Envelope Map-marker-alt

Il gruppo

  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission
×
  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission

Servizi

  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di Threat Intelligence e Cyber Intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
×
  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di Threat Intelligence e Cyber Intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
© show.it | Tutti i diritti riservati | P.Iva 06984320017 | Privacy Policy | Cookie Policy | Realizzato da incio.it