Skip to content
Linkedin-in Envelope Map-marker-alt
×
  • Italiano
  • Inglese
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti

Categoria: Cloud Security

  1. Home
  2. Cloud Security

re:Invent 2025: AWS and Security Vendors Unveil New Products and Capabilities 

AWS and cybersecurity vendors have made several announcements at the cloud giant’s re:Invent 2025 event. 

The post re:Invent 2025: AWS and Security Vendors Unveil New Products and Capabilities  appeared first on SecurityWeek.

Fluent Bit Vulnerabilities Expose Cloud Services to Takeover

Five flaws in the open source tool may lead to path traversal attacks, remote code execution, denial-of-service, and tag manipulation.

The post Fluent Bit Vulnerabilities Expose Cloud Services to Takeover appeared first on SecurityWeek.

Sweet Security Raises $75 Million for Cloud and AI Security

The cybersecurity startup will use the investment to accelerate global expansion and product innovation.

The post Sweet Security Raises $75 Million for Cloud and AI Security appeared first on SecurityWeek.

DOJ Antitrust Review Clears Google’s $32 Billion Acquisition of Wiz

Google’s acquisition of Wiz is expected to close in 2026, but there are other reviews that need to be cleared.

The post DOJ Antitrust Review Clears Google’s $32 Billion Acquisition of Wiz appeared first on SecurityWeek.

New Attack Targets DDR5 Memory to Steal Keys From Intel and AMD TEEs 

Intel and AMD have published advisories after academics disclosed details of the new TEE.fail attack method.

The post New Attack Targets DDR5 Memory to Steal Keys From Intel and AMD TEEs  appeared first on SecurityWeek.

RMPocalypse: New Attack Breaks AMD Confidential Computing

A vulnerability in RMP initialization allows the AMD processor’s x86 cores to maliciously control parts of the initial RMP state.

The post RMPocalypse: New Attack Breaks AMD Confidential Computing appeared first on SecurityWeek.

Critical Vulnerability Puts 60,000 Redis Servers at Risk of Exploitation

critical-vulnerability-puts-60,000-redis-servers-at-risk-of-exploitation

Authenticated attackers can exploit the security flaw to trigger a use-after-free and potentially execute arbitrary code.

The post Critical Vulnerability Puts 60,000 Redis Servers at Risk of Exploitation appeared first on SecurityWeek.

$4.5 Million Offered in New Cloud Hacking Competition

$4.5-million-offered-in-new-cloud-hacking-competition

Wiz has teamed up with Microsoft, Google and AWS and is inviting cloud security researchers to its Zeroday.Cloud competition.

The post $4.5 Million Offered in New Cloud Hacking Competition appeared first on SecurityWeek.

Battering RAM Attack Breaks Intel and AMD Security Tech With $50 Device

battering-ram-attack-breaks-intel-and-amd-security-tech-with-$50-device

Intel and AMD say the research is not in scope of their threat model because the attack requires physical access to a device.

The post Battering RAM Attack Breaks Intel and AMD Security Tech With $50 Device appeared first on SecurityWeek.

CSA Unveils SaaS Security Controls Framework to Ease Complexity

csa-unveils-saas-security-controls-framework-to-ease-complexity

New framework from the Cloud Security Alliance helps SaaS customers navigate the shared responsibility model with confidence.

The post CSA Unveils SaaS Security Controls Framework to Ease Complexity appeared first on SecurityWeek.

  • 1
  • 2
  • 3
  • ...
  • 56
  • Next
SecurityIT | Consulenza Sulla Sicurezza Informatica
Linkedin-in Envelope Map-marker-alt

Il gruppo

  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission
×
  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission

Servizi

  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
×
  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
© show.it | Tutti i diritti riservati | P.Iva 06984320017 | Privacy Policy | Cookie Policy | Realizzato da incio.it