Skip to content
Linkedin-in Envelope Map-marker-alt
×
  • Italiano
  • Inglese
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti

Categoria: takedown

  1. Home
  2. takedown

Counter Antivirus Service AVCheck Shut Down by Law Enforcement

Counter antivirus services such as AVCheck allow cybercriminals to test whether their malware is detected by antivirus products.

The post Counter Antivirus Service AVCheck Shut Down by Law Enforcement appeared first on SecurityWeek.

DanaBot Botnet Disrupted, 16 Suspects Charged

The DanaBot botnet ensnared over 300,000 devices and caused more than $50 million in damages before being disrupted.

The post DanaBot Botnet Disrupted, 16 Suspects Charged appeared first on SecurityWeek.

German Authorities Take Down Crypto Swapping Service eXch

German authorities seized the servers of crypto-swapping service eXch for laundering approximately $1.9 billion in fraudulent assets.

The post German Authorities Take Down Crypto Swapping Service eXch appeared first on SecurityWeek.

US Announces Botnet Takedown, Charges Against Russian Administrators

Anyproxy and 5socks, websites offering proxy services through devices ensnared by a botnet, have been disrupted in a law enforcement operation.

The post US Announces Botnet Takedown, Charges Against Russian Administrators appeared first on SecurityWeek.

Europol Announces More DDoS Service Takedowns, Arrests

Four people have been arrested in Poland and several websites associated with DDoS-for-hire services have been shut down.

The post Europol Announces More DDoS Service Takedowns, Arrests appeared first on SecurityWeek.

BadBox Botnet Powered by 1 Million Android Devices Disrupted

A second iteration of the BadBox botnet that affected over one million Android devices has been partially disrupted.

The post BadBox Botnet Powered by 1 Million Android Devices Disrupted appeared first on SecurityWeek.

US, Dutch Authorities Disrupt Pakistani Hacking Shop Network

US and Dutch authorities seized 39 domains to disrupt a network of hacking and fraud marketplaces operated by Saim Raza.

The post US, Dutch Authorities Disrupt Pakistani Hacking Shop Network appeared first on SecurityWeek.

2 Arrested in Takedown of Nulled, Cracked Hacking Forums

Two individuals have been arrested and one alleged admin has been charged in the takedown of the Nulled and Cracked cybercrime forums.

The post 2 Arrested in Takedown of Nulled, Cracked Hacking Forums appeared first on SecurityWeek.

Law Enforcement Dismantles Phishing Platform Used for Unlocking Stolen Phones

The iServer phishing-as-a-service platform was used by Spanish-speaking criminals to harvest credentials and unlock stolen and lost phones.

The post Law Enforcement Dismantles Phishing Platform Used for Unlocking Stolen Phones appeared first on SecurityWeek.

US Disrupts ‘Raptor Train’ Botnet of Chinese APT Flax Typhoon

The US government has announced the disruption of Raptor Train, a Flax Typhoon botnet powered by hacked consumer devices.

The post US Disrupts ‘Raptor Train’ Botnet of Chinese APT Flax Typhoon appeared first on SecurityWeek.

  • Previous
  • 1
  • 2
  • 3
  • ...
  • 5
  • Next
SecurityIT | Consulenza Sulla Sicurezza Informatica
Linkedin-in Envelope Map-marker-alt

Il gruppo

  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission
×
  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission

Servizi

  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
×
  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
© show.it | Tutti i diritti riservati | P.Iva 06984320017 | Privacy Policy | Cookie Policy | Realizzato da incio.it