Skip to content
Linkedin-in Envelope Map-marker-alt
×
  • Italiano
  • Inglese
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti

Categoria: disruption

  1. Home
  2. disruption

MedTech Giant Stryker Crippled by Iran-Linked Hacker Attack

Stryker was targeted by the Handala group, which claims to have wiped more than 200,000 of the company’s devices.

The post MedTech Giant Stryker Crippled by Iran-Linked Hacker Attack appeared first on SecurityWeek.

New Reports Reinforce Cyberattack’s Role in Maduro Capture Blackout

US officials told The New York Times that cyberattacks were used to turn off the lights in Caracas and disrupt air defense radars.

The post New Reports Reinforce Cyberattack’s Role in Maduro Capture Blackout appeared first on SecurityWeek.

Cyberattack Disrupts France’s Postal Service and Banking During Christmas Rush

A cyberattack knocked France’s national postal service offline, blocking and delaying package deliveries and online payments.

The post Cyberattack Disrupts France’s Postal Service and Banking During Christmas Rush appeared first on SecurityWeek.

Cloudflare Outage Not Caused by Cyberattack

Major online services such as ChatGPT, X, and Shopify were disrupted in a, as well as transit and city services. 

The post Cloudflare Outage Not Caused by Cyberattack appeared first on SecurityWeek.

Cyberattack on Beer Giant Asahi Disrupts Production 

cyberattack-on-beer-giant-asahi-disrupts-production 

The incident has resulted in a system failure that impacted orders and shipments in Japan, and call center operations.

The post Cyberattack on Beer Giant Asahi Disrupts Production  appeared first on SecurityWeek.

Cyberattack on JLR Prompts £1.5 Billion UK Government Intervention

cyberattack-on-jlr-prompts-1.5-billion-uk-government-intervention

The government has announced a support package, but a cybersecurity expert has raised some concerns.

The post Cyberattack on JLR Prompts £1.5 Billion UK Government Intervention appeared first on SecurityWeek.

European Airport Disruptions Caused by Ransomware Attack

european-airport-disruptions-caused-by-ransomware-attack

Collins Aerospace is reportedly having difficulties recovering from the ransomware attack.

The post European Airport Disruptions Caused by Ransomware Attack appeared first on SecurityWeek.

RaccoonO365 Phishing Service Disrupted, Leader Identified

raccoono365-phishing-service-disrupted,-leader-identified

Microsoft and Cloudflare have teamed up to take down the infrastructure used by RaccoonO365.

The post RaccoonO365 Phishing Service Disrupted, Leader Identified appeared first on SecurityWeek.

Arch Linux Project Responding to Week-Long DDoS Attack

The Arch Linux Project has been targeted in a DDoS attack that disrupted its website, repository, and forums.

The post Arch Linux Project Responding to Week-Long DDoS Attack appeared first on SecurityWeek.

Ingram Micro Restores Systems Impacted by Ransomware

Ingram Micro has restored operations across all countries and regions after disconnecting systems to contain a ransomware attack.

The post Ingram Micro Restores Systems Impacted by Ransomware appeared first on SecurityWeek.

  • 1
  • 2
  • Next
SecurityIT | Consulenza Sulla Sicurezza Informatica
Linkedin-in Envelope Map-marker-alt

Il gruppo

  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission
×
  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission

Servizi

  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
×
  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
© show.it | Tutti i diritti riservati | P.Iva 06984320017 | Privacy Policy | Cookie Policy | Realizzato da incio.it