Skip to content

INFORMATION TECHNOLOGY

show.it provides services in information technology since 1995, acting on the whole national territory. The company specializes in providing services and products

SAFETY TRAINING

The courses are taught at the customer and arranged to suit individual needs. On request you can be customized content or made courses on specific topics in security

ADVICE ON SECURITY

show.it is specializes in helping the customer in addressing security problems in the organizational, process and technology. The customer can make use of

Cyber security News

Coinbase Says Rogue Contractor Data Breach Affects 69,461 Users

A mandatory filing to the Maine Attorney General says 69,461 customers nationwide were affected and dates the breach back to…

US Student to Plead Guilty Over PowerSchool Hack

Matthew Lane allegedly hacked PowerSchool using stolen credentials and admitted to extorting a telecoms provider. The post US Student to…

Cellcom Service Disruption Caused by Cyberattack

Wireless carrier Cellcom has confirmed that a week-long widespread service outage is the result of a cyberattack. The post Cellcom…

Google DeepMind Unveils Defense Against Indirect Prompt Injection Attacks

Google DeepMind has developed an ongoing process to counter the continuously evolving threatIndirect prompt injection (IPI) attacks. The post Google…

Wiz Warns of Ongoing Exploitation of Recent Ivanti Vulnerabilities

Wiz warns that threat actors are chaining two recent Ivanti…

Virtual Event Today: Threat Detection & Incident Response (TDIR) Summit

SecurityWeek’s 2025 Threat Detection & Incident Response (TDIR) Summit takes…

Up to 25% of Internet-Exposed ICS Are Honeypots: Researchers

Many of the industrial control system (ICS) instances seen in…

Ransomware Attack Forces Kettering Health to Cancel Procedures

Kettering Health has canceled inpatient and outpatient procedures as it…

Critical OpenPGP.js Vulnerability Allows Spoofing

An OpenPGP.js vulnerability tracked as CVE-2025-47934 allows message signature verification…

NATO-Flagged Vulnerability Tops Latest VMware Security Patch Batch

VMware patches flaws that expose users to data leakage, command…

Vulnerability Exploitation Probability Metric Proposed by NIST, CISA Researchers 

The Likely Exploited Vulnerabilities (LEV) equations can help augment KEV-…

Event Preview: 2025 Threat Detection & Incident Response (Virtual) Summit

SecurityWeek’s 2025 Threat Detection & Incident Response (TDIR) Summit takes…

I nostri partner