Skip to content
Linkedin-in Envelope Map-marker-alt
×
  • Italiano
  • Inglese
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti

Categoria: OT

  1. Home
  2. OT

Indurex Emerges From Stealth to Close Security Gap in Cyber-Physical Systems

Indurex was founded by Jalal Bouhdada, who previously led industrial cybersecurity company Applied Risk.

The post Indurex Emerges From Stealth to Close Security Gap in Cyber-Physical Systems appeared first on SecurityWeek.

Access System Flaws Enabled Hackers to Unlock Doors at Major European Firms

More than 20 vulnerabilities were found and patched in Dormakaba physical access control systems.

The post Access System Flaws Enabled Hackers to Unlock Doors at Major European Firms appeared first on SecurityWeek.

Claroty Raises $150 Million in Series F Funding

Claroty has raised a total of roughly $900 million and its valuation has reportedly reached $3 billion.

The post Claroty Raises $150 Million in Series F Funding appeared first on SecurityWeek.

CISA Warns of ScadaBR Vulnerability After Hacktivist ICS Attack

CISA has added CVE-2021-26829 to its Known Exploited Vulnerabilities (KEV) catalog.

The post CISA Warns of ScadaBR Vulnerability After Hacktivist ICS Attack appeared first on SecurityWeek.

Japan Issues OT Security Guidance for Semiconductor Factories

The 130-page document covers several important aspects and it’s available in both Japanese and English.

The post Japan Issues OT Security Guidance for Semiconductor Factories appeared first on SecurityWeek.

CISA Warns of Exploited DELMIA Factory Software Vulnerabilities

Two DELMIA Apriso flaws can be chained together to gain privileged access to the application and execute arbitrary code remotely.

The post CISA Warns of Exploited DELMIA Factory Software Vulnerabilities appeared first on SecurityWeek.

Many Attacks Aimed at EU Targeted OT, Says Cybersecurity Agency

many-attacks-aimed-at-eu-targeted-ot,-says-cybersecurity-agency

ENISA has published its 2025 Threat Landscape report, highlighting some of the attacks aimed at OT systems.

The post Many Attacks Aimed at EU Targeted OT, Says Cybersecurity Agency appeared first on SecurityWeek.

NIST Publishes Guide for Protecting ICS Against USB-Borne Threats

nist-publishes-guide-for-protecting-ics-against-usb-borne-threats

NIST Special Publication 1334 focuses on reducing cybersecurity risks associated with the use of removable media devices in OT environments.

The post NIST Publishes Guide for Protecting ICS Against USB-Borne Threats appeared first on SecurityWeek.

New Guidance Calls on OT Operators to Create Continually Updated System Inventory

new-guidance-calls-on-ot-operators-to-create-continually-updated-system-inventory

Agencies in several countries have created guidance titled ‘Creating and Maintaining a Definitive View of Your OT Architecture’.

The post New Guidance Calls on OT Operators to Create Continually Updated System Inventory appeared first on SecurityWeek.

Unpatched Vulnerabilities Expose Novakon HMIs to Remote Hacking

unpatched-vulnerabilities-expose-novakon-hmis-to-remote-hacking

Novakon HMIs are affected by remote code execution and information exposure vulnerabilities. 

The post Unpatched Vulnerabilities Expose Novakon HMIs to Remote Hacking appeared first on SecurityWeek.

  • 1
  • 2
  • 3
  • ...
  • 7
  • Next
SecurityIT | Consulenza Sulla Sicurezza Informatica
Linkedin-in Envelope Map-marker-alt

Il gruppo

  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission
×
  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission

Servizi

  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
×
  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
© show.it | Tutti i diritti riservati | P.Iva 06984320017 | Privacy Policy | Cookie Policy | Realizzato da incio.it