
INFORMATION TECHNOLOGY
show.it provides services in information technology since 1995, acting on the whole national territory. The company specializes in providing services and products
SAFETY TRAINING
The courses are taught at the customer and arranged to suit individual needs. On request you can be customized content or made courses on specific topics in security
ADVICE ON SECURITY
show.it is specializes in helping the customer in addressing security problems in the organizational, process and technology. The customer can make use of
Cyber security News
Coinbase Says Rogue Contractor Data Breach Affects 69,461 Users
A mandatory filing to the Maine Attorney General says 69,461 customers nationwide were affected and dates the breach back to…
US Student to Plead Guilty Over PowerSchool Hack
Matthew Lane allegedly hacked PowerSchool using stolen credentials and admitted to extorting a telecoms provider. The post US Student to…
Cellcom Service Disruption Caused by Cyberattack
Wireless carrier Cellcom has confirmed that a week-long widespread service outage is the result of a cyberattack. The post Cellcom…
Google DeepMind Unveils Defense Against Indirect Prompt Injection Attacks
Google DeepMind has developed an ongoing process to counter the continuously evolving threatIndirect prompt injection (IPI) attacks. The post Google…
Wiz Warns of Ongoing Exploitation of Recent Ivanti Vulnerabilities
Wiz warns that threat actors are chaining two recent Ivanti…
Virtual Event Today: Threat Detection & Incident Response (TDIR) Summit
SecurityWeek’s 2025 Threat Detection & Incident Response (TDIR) Summit takes…
Up to 25% of Internet-Exposed ICS Are Honeypots: Researchers
Many of the industrial control system (ICS) instances seen in…
Ransomware Attack Forces Kettering Health to Cancel Procedures
Kettering Health has canceled inpatient and outpatient procedures as it…
Critical OpenPGP.js Vulnerability Allows Spoofing
An OpenPGP.js vulnerability tracked as CVE-2025-47934 allows message signature verification…
NATO-Flagged Vulnerability Tops Latest VMware Security Patch Batch
VMware patches flaws that expose users to data leakage, command…
Vulnerability Exploitation Probability Metric Proposed by NIST, CISA Researchers
The Likely Exploited Vulnerabilities (LEV) equations can help augment KEV-…
Event Preview: 2025 Threat Detection & Incident Response (Virtual) Summit
SecurityWeek’s 2025 Threat Detection & Incident Response (TDIR) Summit takes…