Skip to content
Linkedin-in Envelope Map-marker-alt
×
  • Italiano
  • Inglese
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di Cyber Security
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di Cyber Security
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di Cyber Security
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di Cyber Security
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti

Categoria: Malware

  1. Home
  2. Malware

Millions of Smartphones Distributed Worldwide With Preinstalled ‘Guerrilla’ Malware

millions-of-smartphones-distributed-worldwide-with-preinstalled-‘guerrilla’-malware

A threat actor tracked as Lemon Group has control over millions of smartphones distributed worldwide thanks to preinstalled Guerrilla malware.

The post Millions of Smartphones Distributed Worldwide With Preinstalled ‘Guerrilla’ Malware appeared first on SecurityWeek.

New ‘Lobshot’ hVNC Malware Used by Russian Cybercriminals

new-‘lobshot’-hvnc-malware-used-by-russian-cybercriminals

Russian cybercrime group TA505 has been observed using new hVNC malware called Lobshot in recent attacks.

The post New ‘Lobshot’ hVNC Malware Used by Russian Cybercriminals appeared first on SecurityWeek.

Takedown of GitHub Repositories Disrupts RedLine Malware Operations

takedown-of-github-repositories-disrupts-redline-malware-operations

Four GitHub repositories used by RedLine stealer control panels were suspended, disrupting the malware’s operations.

The post Takedown of GitHub Repositories Disrupts RedLine Malware Operations appeared first on SecurityWeek.

New ‘Domino’ Malware Linked to FIN7 Group, Ex-Conti Members

new-‘domino’-malware-linked-to-fin7-group,-ex-conti-members

New Domino backdoor brings together former members of the Conti group and the FIN7 threat actors.

The post New ‘Domino’ Malware Linked to FIN7 Group, Ex-Conti Members appeared first on SecurityWeek.

Microsoft Warns Accounting, Tax Return Preparation Firms of Remcos RAT Attacks

microsoft-warns-accounting,-tax-return-preparation-firms-of-remcos-rat-attacks

A new Remcos RAT campaign is targeting US accounting and tax return preparation firms as Tax Day approaches.

The post Microsoft Warns Accounting, Tax Return Preparation Firms of Remcos RAT Attacks appeared first on SecurityWeek.

Mandiant Also Links 3CX Supply Chain Attack to North Korean Hackers

mandiant-also-links-3cx-supply-chain-attack-to-north-korean-hackers

3CX has confirmed previous reports that the recently disclosed supply chain attack was likely conducted by North Korean hackers.

The post Mandiant Also Links 3CX Supply Chain Attack to North Korean Hackers appeared first on SecurityWeek.

Tax Return Filing Service eFile.com Caught Serving Malware

tax-return-filing-service-efile.com-caught-serving-malware

Online tax return filing service eFile.com was injected with malicious JavaScript code serving malware to visitors.

The post Tax Return Filing Service eFile.com Caught Serving Malware appeared first on SecurityWeek.

Adobe Acrobat Sign Abused to Distribute Malware

adobe-acrobat-sign-abused-to-distribute-malware

Cybercriminals are abusing the Adobe Acrobat Sign service in a campaign distributing the RedLine information stealer malware.

The post Adobe Acrobat Sign Abused to Distribute Malware appeared first on SecurityWeek.

New ‘Exfiltrator-22’ Post-Exploitation Framework Linked to Former LockBit Affiliates

new-‘exfiltrator-22’-post-exploitation-framework-linked-to-former-lockbit-affiliates

A recently identified post-exploitation framework ‘Exfiltrator-22’ uses the same C&C infrastructure as the LockBit ransomware.

The post New ‘Exfiltrator-22’ Post-Exploitation Framework Linked to Former LockBit Affiliates appeared first on SecurityWeek.

Chainguard Trains Spotlight on SBOM Quality Problem

chainguard-trains-spotlight-on-sbom-quality-problem

Software engineers tracking the quality of software bill of materials have stumbled on a startling discovery: Barely 1% of all SBOMs being generated today meets the “minimum elements” defined by the U.S. government.

read more

  • 1
  • 2
  • 3
  • ...
  • 52
  • Next
SecurityIT | Consulenza Sulla Sicurezza Informatica
Linkedin-in Envelope Map-marker-alt
Il gruppo
  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission
×
  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission
Servizi
  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di Threat Intelligence e Cyber Intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
×
  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di Threat Intelligence e Cyber Intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
© show.it | Tutti i diritti riservati | P.Iva 06984320017 | Privacy Policy | Cookie Policy | Realizzato da incio.it