Skip to content
Linkedin-in Envelope Map-marker-alt
×
  • Italiano
  • Inglese
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di Cyber Security
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di Cyber Security
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di Cyber Security
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di Cyber Security
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti

Categoria: Russia

  1. Home
  2. Russia

Russia’s LitterDrifter USB Worm Spreads Beyond Ukraine

russia’s-litterdrifter-usb-worm-spreads-beyond-ukraine

Gamaredon’s self-propagating LitterDrifter USB worm spreads from Ukraine to the US and other countries.

The post Russia’s LitterDrifter USB Worm Spreads Beyond Ukraine appeared first on SecurityWeek.

Russian Hackers Used OT Attack to Disrupt Power in Ukraine Amid Mass Missile Strikes

russian-hackers-used-ot-attack-to-disrupt-power-in-ukraine-amid-mass-missile-strikes

Mandiant says Russia’s Sandworm hackers used a novel OT attack to cause power outages that coincided with mass missile strikes on critical infrastructure across Ukraine.

The post Russian Hackers Used OT Attack to Disrupt Power in Ukraine Amid Mass Missile Strikes appeared first on SecurityWeek.

Russian Hackers Used Novel OT Attack to Disrupt Ukrainian Power Amid Mass Missile Strikes

russian-hackers-used-novel-ot-attack-to-disrupt-ukrainian-power-amid-mass-missile-strikes

Mandiant says Russia’s Sandworm hackers used a novel OT attack to cause power outages that coincided with mass missile strikes on critical infrastructure across Ukraine.

The post Russian Hackers Used Novel OT Attack to Disrupt Ukrainian Power Amid Mass Missile Strikes appeared first on SecurityWeek.

Russian Hackers Caught Exploiting Roundcube Webmail Zero-Day

russian-hackers-caught-exploiting-roundcube-webmail-zero-day

Russian APT Winter Vivern exploits a zero-day in the Roundcube webmail server in attacks targeting European governments.

The post Russian Hackers Caught Exploiting Roundcube Webmail Zero-Day appeared first on SecurityWeek.

Three Months After Patch, Gov-Backed Actors Exploiting WinRAR Flaw

three-months-after-patch,-gov-backed-actors-exploiting-winrar-flaw

Google says it is still catching government-backed groups linked to China and Russia launching WinRAR exploits in targeted attacks.

The post Three Months After Patch, Gov-Backed Actors Exploiting WinRAR Flaw appeared first on SecurityWeek.

US, UK Sanction More Members of Trickbot Russian Cybercrime Group 

us,-uk-sanction-more-members-of-trickbot-russian-cybercrime-group 

The US and UK have announced sanctions against 11 more alleged members of the Russian cybercrime group Trickbot. 

The post US, UK Sanction More Members of Trickbot Russian Cybercrime Group  appeared first on SecurityWeek.

Five Eyes Report: New Russian Malware Targeting Ukrainian Military Android Devices

five-eyes-report:-new-russian-malware-targeting-ukrainian-military-android-devices

Five Eyes report details ‘Infamous Chisel’ malware used by Russian state-sponsored hackers to target the Ukrainian military’s Android devices. 

The post Five Eyes Report: New Russian Malware Targeting Ukrainian Military Android Devices appeared first on SecurityWeek.

North Korean Hackers Targeted Russian Missile Developer

north-korean-hackers-targeted-russian-missile-developer

A sanctioned Russian missile maker appears to have been targeted by two important North Korean hacking groups.

The post North Korean Hackers Targeted Russian Missile Developer appeared first on SecurityWeek.

Russian Cybersecurity Firm Founder Jailed for 14 Years

russian-cybersecurity-firm-founder-jailed-for-14-years

Russia has sentenced Ilya Sachkov, co-founder of the Group-IB cybersecurity firm, to 14 years in prison on treason charges.

The post Russian Cybersecurity Firm Founder Jailed for 14 Years appeared first on SecurityWeek.

A Cybersecurity Wish List Ahead of NATO Summit

a-cybersecurity-wish-list-ahead-of-nato-summit

Assuming NATO can play a greater part in the cybersecurity of its members, possibly through a more formal NATO Cyber Command, the question then becomes ‘what should we hope for?’

The post A Cybersecurity Wish List Ahead of NATO Summit appeared first on SecurityWeek.

  • 1
  • 2
  • 3
  • 4
  • Next
SecurityIT | Consulenza Sulla Sicurezza Informatica
Linkedin-in Envelope Map-marker-alt

Il gruppo

  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission
×
  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission

Servizi

  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di Threat Intelligence e Cyber Intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
×
  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di Threat Intelligence e Cyber Intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
© show.it | Tutti i diritti riservati | P.Iva 06984320017 | Privacy Policy | Cookie Policy | Realizzato da incio.it