Skip to content
Linkedin-in Envelope Map-marker-alt
×
  • Italian
  • English
SecurityIT | Cyber Security Consulting
 
  • Home
  • Company
    • About Us
    • Culture and values
    • Il team
    • ISO certified company
    • Mission
  • Training
    • List of courses
  • Cyber security
    • Penetration test
    • ADVICE ISO / IEC 27001
    • Consulenza informatica in ambito privacy
    • Vulnerability assessment consulting
    • Payment card industry data security standard
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Services of cyber threat intelligence
    • Forensic analysis and investigation
    • Social media Security
  • Integration Systems IT
    • Solutions
  • News
  • Contacts
×
  • Home
  • Company
    • About Us
    • Culture and values
    • Il team
    • ISO certified company
    • Mission
  • Training
    • List of courses
  • Cyber security
    • Penetration test
    • ADVICE ISO / IEC 27001
    • Consulenza informatica in ambito privacy
    • Vulnerability assessment consulting
    • Payment card industry data security standard
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Services of cyber threat intelligence
    • Forensic analysis and investigation
    • Social media Security
  • Integration Systems IT
    • Solutions
  • News
  • Contacts
SecurityIT | Cyber Security Consulting
 
  • Home
  • Company
    • About Us
    • Culture and values
    • Il team
    • ISO certified company
    • Mission
  • Training
    • List of courses
  • Cyber security
    • Penetration test
    • ADVICE ISO / IEC 27001
    • Consulenza informatica in ambito privacy
    • Vulnerability assessment consulting
    • Payment card industry data security standard
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Services of cyber threat intelligence
    • Forensic analysis and investigation
    • Social media Security
  • Integration Systems IT
    • Solutions
  • News
  • Contacts
×
  • Home
  • Company
    • About Us
    • Culture and values
    • Il team
    • ISO certified company
    • Mission
  • Training
    • List of courses
  • Cyber security
    • Penetration test
    • ADVICE ISO / IEC 27001
    • Consulenza informatica in ambito privacy
    • Vulnerability assessment consulting
    • Payment card industry data security standard
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Services of cyber threat intelligence
    • Forensic analysis and investigation
    • Social media Security
  • Integration Systems IT
    • Solutions
  • News
  • Contacts

Month: May 2026

  1. Home
  2. Archives: May 2026

Akamai to Acquire AI and Browser Security Firm LayerX for $205 Million

The acquisition enables Akamai to expand its Zero Trust portfolio to add protection directly into the browser.

The post Akamai to Acquire AI and Browser Security Firm LayerX for $205 Million appeared first on SecurityWeek.

Chinese APTs Expand Targets, Update Backdoors in Recent Campaigns

Salt Typhoon has hit an energy entity in Azerbaijan. Twill Typhoon has targeted Asian entities with an updated RAT.

The post Chinese APTs Expand Targets, Update Backdoors in Recent Campaigns appeared first on SecurityWeek.

G7 Countries Release AI SBOM Guidance

The goal of the guidance, which outlines minimum elements, is to help organizations enhance transparency in AI systems and supply chains. 

The post G7 Countries Release AI SBOM Guidance appeared first on SecurityWeek.

F5 Patches Over 50 Vulnerabilities

The company’s latest quarterly advisory describes high and medium-severity issues in BIG-IP, BIG-IQ, and NGINX.

The post F5 Patches Over 50 Vulnerabilities appeared first on SecurityWeek.

Hackers Targeted PraisonAI Vulnerability Hours After Disclosure

The first exploitation attempts were observed less than four hours after the authentication bypass was publicly disclosed.

The post Hackers Targeted PraisonAI Vulnerability Hours After Disclosure appeared first on SecurityWeek.

High-Severity Vulnerability Patched in VMware Fusion

The patch was announced as Broadcom is attending the Pwn2Own hacking competition in Berlin this week.

The post High-Severity Vulnerability Patched in VMware Fusion appeared first on SecurityWeek.

Researcher Drops YellowKey, GreenPlasma Windows Zero-Days

YellowKey is a BitLocker bypass that requires physical access. GreenPlasma enables elevation of privileges to System.

The post Researcher Drops YellowKey, GreenPlasma Windows Zero-Days appeared first on SecurityWeek.

Foxconn Confirms North American Factories Hit by Cyberattack

The Nitrogen ransomware group claims to have hacked the company’s systems, stealing 8TB of data, including confidential documents.

The post Foxconn Confirms North American Factories Hit by Cyberattack appeared first on SecurityWeek.

Webinar Today: ROI for Cyber-Physical Security Programs

This webinar will help OT security teams and asset owners stop being cost centers and start being resilience drivers.

The post Webinar Today: ROI for Cyber-Physical Security Programs appeared first on SecurityWeek.

Government to Scrutinize Instructure Over Canvas Disruption, Data Breach

The Committee on Homeland Security has requested to be briefed on the incident and Instructure’s remediation steps.

The post Government to Scrutinize Instructure Over Canvas Disruption, Data Breach appeared first on SecurityWeek.

  • Previous
  • 1
  • ...
  • 5
  • 6
  • 7
  • ...
  • 15
  • Next
SecurityIT | Cyber Security Consulting
Linkedin-in Envelope Map-marker-alt

The group

  • Company
  • ISO certified company
  • About Us
  • Team
  • Culture and values
  • Mission
×
  • Company
  • ISO certified company
  • About Us
  • Team
  • Culture and values
  • Mission

Services

  • Computer consulting services
  • Social media Security
  • Forensic analysis and investigation
  • Services of cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Vulnerability assessment consulting
  • Consulenza informatica in ambito privacy
  • ADVICE ISO / IEC 27001
  • Penetration test
×
  • Computer consulting services
  • Social media Security
  • Forensic analysis and investigation
  • Services of cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Vulnerability assessment consulting
  • Consulenza informatica in ambito privacy
  • ADVICE ISO / IEC 27001
  • Penetration test

© show.it | All Rights Reserved | VAT 06984320017 | Privacy Policy | Cookie Policy | Made by incio.it

My Agile Privacy®
✕

This site uses technical and profiling cookies. 

You can accept, reject, or customize the cookies by clicking the desired buttons. 

By closing this notice, you will continue without accepting. 

AcceptRefuseCustomize
Consent

Privacy Settings

This website uses cookies to improve your experience while you navigate through the website.

Google AnalyticsAlways Enabled

Google Analytics is a web analytics service provided by Google Ireland Limited ("Google"). Google uses the collected personal data to track and examine the usage of this website, compile reports on its activities, and share them with other Google services. Google may use your personal data to contextualize and personalize the ads of its advertising network. This integration of Google Analytics anonymizes your IP address. The data sent is collected for the purposes of personalizing the experience and statistical tracking. You can find more information on the "More information on Google's handling of personal information" page.

Place of processing: Ireland - Privacy Policy

Additional consents:

Ad Storage
Ad Storage
Defines whether cookies related to advertising can be read or written by Google.
Ad User Data
Ad User Data
Determines whether user data can be sent to Google for advertising purposes.
Ad Personalization
Ad Personalization
Controls whether personalized advertising (for example, remarketing) can be enabled.
Analytics Storage
Analytics Storage
Defines whether cookies associated with Google Analytics can be read or written.
Cloudflare Web Analytics
Cloudflare Web Analytics

Cloudflare Web Analytics is an anonymized analytics service provided by Cloudflare Inc. that gives the owner insight into the use of this website by users.

Privacy Policy

Google Maps widget
Google Maps widget

Google Maps is a maps visualization service provided by Google Ireland Limited. This service is used to incorporate content of this kind on its pages.

Place of processing: Ireland - Privacy Policy

Google reCAPTCHA
Google reCAPTCHA

Google reCAPTCHA is a SPAM protection service provided by Google Ireland Limited.
The use of reCAPTCHA is subject to the Google privacy policy and terms of use.

Place of processing: Ireland - Privacy Policy

Gravatar
Gravatar

Gravatar is an image visualisation service provided by Automattic Inc. that allows this Website to incorporate content of this kind on its pages.

Place of processing: United States - Privacy Policy

GDPR Cookie Banner by My Agile Privacy®