Skip to content
Linkedin-in Envelope Map-marker-alt
×
  • Italian
  • English
SecurityIT | Cyber Security Consulting
 
  • Home
  • Company
    • About Us
    • Culture and values
    • Il team
    • ISO certified company
    • Mission
  • Training
    • List of courses
  • Cyber security
    • Penetration test
    • ADVICE ISO / IEC 27001
    • Consulenza informatica in ambito privacy
    • Vulnerability assessment consulting
    • Payment card industry data security standard
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Services of cyber threat intelligence
    • Forensic analysis and investigation
    • Social media Security
  • Integration Systems IT
    • Solutions
  • News
  • Contacts
×
  • Home
  • Company
    • About Us
    • Culture and values
    • Il team
    • ISO certified company
    • Mission
  • Training
    • List of courses
  • Cyber security
    • Penetration test
    • ADVICE ISO / IEC 27001
    • Consulenza informatica in ambito privacy
    • Vulnerability assessment consulting
    • Payment card industry data security standard
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Services of cyber threat intelligence
    • Forensic analysis and investigation
    • Social media Security
  • Integration Systems IT
    • Solutions
  • News
  • Contacts
SecurityIT | Cyber Security Consulting
 
  • Home
  • Company
    • About Us
    • Culture and values
    • Il team
    • ISO certified company
    • Mission
  • Training
    • List of courses
  • Cyber security
    • Penetration test
    • ADVICE ISO / IEC 27001
    • Consulenza informatica in ambito privacy
    • Vulnerability assessment consulting
    • Payment card industry data security standard
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Services of cyber threat intelligence
    • Forensic analysis and investigation
    • Social media Security
  • Integration Systems IT
    • Solutions
  • News
  • Contacts
×
  • Home
  • Company
    • About Us
    • Culture and values
    • Il team
    • ISO certified company
    • Mission
  • Training
    • List of courses
  • Cyber security
    • Penetration test
    • ADVICE ISO / IEC 27001
    • Consulenza informatica in ambito privacy
    • Vulnerability assessment consulting
    • Payment card industry data security standard
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Services of cyber threat intelligence
    • Forensic analysis and investigation
    • Social media Security
  • Integration Systems IT
    • Solutions
  • News
  • Contacts

Category: cryptocurrency

  1. Home
  2. cryptocurrency

$29 Million Worth of Bitcoin Seized in Cryptomixer Takedown

Cryptomixer was targeted by law enforcement in Operation Olympia for facilitating cybercrime and money laundering. 

The post $29 Million Worth of Bitcoin Seized in Cryptomixer Takedown appeared first on SecurityWeek.

XWiki Vulnerability Exploited in Cryptocurrency Mining Operation

Exploits have been available publicly for over half a year, but the bug was previously targeted only for reconnaissance.

The post XWiki Vulnerability Exploited in Cryptocurrency Mining Operation appeared first on SecurityWeek.

US Charges Cambodian Executive in Massive Crypto Scam and Seizes More Than $14 Billion in Bitcoin

In an indictment, federal prosecutors charged Prince Holding Group chairman Chen Zhi with wire fraud conspiracy and money laundering conspiracy.

The post US Charges Cambodian Executive in Massive Crypto Scam and Seizes More Than $14 Billion in Bitcoin appeared first on SecurityWeek.

North Korean Hackers Have Stolen $2 Billion in Cryptocurrency in 2025

north-korean-hackers-have-stolen-$2-billion-in-cryptocurrency-in-2025

The hackers are believed to have stolen over $6 billion for the Pyongyang regime, financing its military programs.

The post North Korean Hackers Have Stolen $2 Billion in Cryptocurrency in 2025 appeared first on SecurityWeek.

Highly Popular NPM Packages Poisoned in New Supply Chain Attack

Designed to intercept cryptocurrency transactions, the malicious code reached 10% of cloud environments.

The post Highly Popular NPM Packages Poisoned in New Supply Chain Attack appeared first on SecurityWeek.

North Korean Hackers Targeted Hundreds in Fake Job Interview Attacks

The hackers were seen actively monitoring cyber threat intelligence to discover and rebuild exposed infrastructure.

The post North Korean Hackers Targeted Hundreds in Fake Job Interview Attacks appeared first on SecurityWeek.

US Seizes $2.8 Million From Zeppelin Ransomware Operator

The US has indicted Zeppelin ransomware operator Ianis Antropenko, seizing over $2.8 million in cryptocurrency from his wallet.

The post US Seizes $2.8 Million From Zeppelin Ransomware Operator appeared first on SecurityWeek.

MITRE Unveils AADAPT Framework to Tackle Cryptocurrency Threats 

The MITRE AADAPT framework provides documentation for identifying, investigating, and responding to weaknesses in digital asset payments.

The post MITRE Unveils AADAPT Framework to Tackle Cryptocurrency Threats  appeared first on SecurityWeek.

Photo-Stealing Spyware Sneaks Into Apple App Store, Google Play

Newly discovered spyware has sneaked into Apple’s App Store and Google Play to steal images from users’ mobile devices.

The post Photo-Stealing Spyware Sneaks Into Apple App Store, Google Play appeared first on SecurityWeek.

North Korean Hackers Take Over Victims’ Systems Using Zoom Meeting

North Korean hackers employ social engineering to trick Zoom Meeting participants into executing system-takeover commands.

The post North Korean Hackers Take Over Victims’ Systems Using Zoom Meeting appeared first on SecurityWeek.

  • 1
  • 2
  • 3
  • ...
  • 5
  • Next
SecurityIT | Cyber Security Consulting
Linkedin-in Envelope Map-marker-alt

The group

  • Company
  • ISO certified company
  • About Us
  • Team
  • Culture and values
  • Mission
×
  • Company
  • ISO certified company
  • About Us
  • Team
  • Culture and values
  • Mission

Services

  • Computer consulting services
  • Social media Security
  • Forensic analysis and investigation
  • Services of cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Vulnerability assessment consulting
  • Consulenza informatica in ambito privacy
  • ADVICE ISO / IEC 27001
  • Penetration test
×
  • Computer consulting services
  • Social media Security
  • Forensic analysis and investigation
  • Services of cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Vulnerability assessment consulting
  • Consulenza informatica in ambito privacy
  • ADVICE ISO / IEC 27001
  • Penetration test
© show.it | All Rights Reserved | VAT 06984320017 | Privacy Policy | Cookie Policy | Made by incio.it