Skip to content
Linkedin-in Envelope Map-marker-alt
×
  • Italian
  • English
SecurityIT | Cyber Security Consulting
 
  • Home
  • Company
    • About Us
    • Culture and values
    • Il team
    • ISO certified company
    • Mission
  • Training
    • List of courses
  • Cyber security
    • Penetration test
    • ADVICE ISO / IEC 27001
    • Consulenza informatica in ambito privacy
    • Vulnerability assessment consulting
    • Payment card industry data security standard
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Services of cyber threat intelligence
    • Forensic analysis and investigation
    • Social media Security
  • Integration Systems IT
    • Solutions
  • News
  • Contacts
×
  • Home
  • Company
    • About Us
    • Culture and values
    • Il team
    • ISO certified company
    • Mission
  • Training
    • List of courses
  • Cyber security
    • Penetration test
    • ADVICE ISO / IEC 27001
    • Consulenza informatica in ambito privacy
    • Vulnerability assessment consulting
    • Payment card industry data security standard
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Services of cyber threat intelligence
    • Forensic analysis and investigation
    • Social media Security
  • Integration Systems IT
    • Solutions
  • News
  • Contacts
SecurityIT | Cyber Security Consulting
 
  • Home
  • Company
    • About Us
    • Culture and values
    • Il team
    • ISO certified company
    • Mission
  • Training
    • List of courses
  • Cyber security
    • Penetration test
    • ADVICE ISO / IEC 27001
    • Consulenza informatica in ambito privacy
    • Vulnerability assessment consulting
    • Payment card industry data security standard
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Services of cyber threat intelligence
    • Forensic analysis and investigation
    • Social media Security
  • Integration Systems IT
    • Solutions
  • News
  • Contacts
×
  • Home
  • Company
    • About Us
    • Culture and values
    • Il team
    • ISO certified company
    • Mission
  • Training
    • List of courses
  • Cyber security
    • Penetration test
    • ADVICE ISO / IEC 27001
    • Consulenza informatica in ambito privacy
    • Vulnerability assessment consulting
    • Payment card industry data security standard
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Services of cyber threat intelligence
    • Forensic analysis and investigation
    • Social media Security
  • Integration Systems IT
    • Solutions
  • News
  • Contacts

Category: Phishing

  1. Home
  2. Phishing

AI Is Supercharging Phishing: Here’s How to Fight Back

AI has given cybercriminals the ability to operate like Fortune‑500‑scale marketing departments—except their product is account takeover, data theft, and identity fraud.

The post AI Is Supercharging Phishing: Here’s How to Fight Back appeared first on SecurityWeek.

Google Says Chinese ‘Lighthouse’ Phishing Kit Disrupted Following Lawsuit  

The cybercriminals informed customers that their cloud server was shut down due to complaints.

The post Google Says Chinese ‘Lighthouse’ Phishing Kit Disrupted Following Lawsuit   appeared first on SecurityWeek.

Google Sues Chinese Cybercriminals Behind ‘Lighthouse’ Phishing Kit

Google is targeting the threat group known as Smishing Triad, which used over 194,000 malicious domains in a campaign. 

The post Google Sues Chinese Cybercriminals Behind ‘Lighthouse’ Phishing Kit appeared first on SecurityWeek.

Massive China-Linked Smishing Campaign Leveraged 194,000 Domains

The malicious Smishing Triad domains were used to collect sensitive information, including Social Security numbers.

The post Massive China-Linked Smishing Campaign Leveraged 194,000 Domains appeared first on SecurityWeek.

Malicious Code on Unity Website Skims Information From Hundreds of Customers

The video game software development company says the incident impacted users of its SpeedTree website.

The post Malicious Code on Unity Website Skims Information From Hundreds of Customers appeared first on SecurityWeek.

NPM Infrastructure Abused in Phishing Campaign Aimed at Industrial and Electronics Firms

Threat actors used automation to create over 175 malicious NPM packages targeting more than 135 organizations.

The post NPM Infrastructure Abused in Phishing Campaign Aimed at Industrial and Electronics Firms appeared first on SecurityWeek.

PyPI Warns Users of Fresh Phishing Campaign

pypi-warns-users-of-fresh-phishing-campaign

Threat actors impersonating PyPI ask users to verify their email for security purposes, directing them to fake websites.

The post PyPI Warns Users of Fresh Phishing Campaign appeared first on SecurityWeek.

FBI Warns of Spoofed IC3 Website

fbi-warns-of-spoofed-ic3-website

Threat actors likely spoofed the official government website for personal information theft and monetary fraudulent activity.

The post FBI Warns of Spoofed IC3 Website appeared first on SecurityWeek.

RaccoonO365 Phishing Service Disrupted, Leader Identified

raccoono365-phishing-service-disrupted,-leader-identified

Microsoft and Cloudflare have teamed up to take down the infrastructure used by RaccoonO365.

The post RaccoonO365 Phishing Service Disrupted, Leader Identified appeared first on SecurityWeek.

Ransomware Losses Climb as AI Pushes Phishing to New Heights

Based on real-world insurance claims, Resilience’s midyear report shows vendor risk is declining but costly, ransomware is evolving with triple extortion, and social engineering attacks are accelerating through AI.

The post Ransomware Losses Climb as AI Pushes Phishing to New Heights appeared first on SecurityWeek.

  • 1
  • 2
  • 3
  • ...
  • 38
  • Next
SecurityIT | Cyber Security Consulting
Linkedin-in Envelope Map-marker-alt

The group

  • Company
  • ISO certified company
  • About Us
  • Team
  • Culture and values
  • Mission
×
  • Company
  • ISO certified company
  • About Us
  • Team
  • Culture and values
  • Mission

Services

  • Computer consulting services
  • Social media Security
  • Forensic analysis and investigation
  • Services of cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Vulnerability assessment consulting
  • Consulenza informatica in ambito privacy
  • ADVICE ISO / IEC 27001
  • Penetration test
×
  • Computer consulting services
  • Social media Security
  • Forensic analysis and investigation
  • Services of cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Vulnerability assessment consulting
  • Consulenza informatica in ambito privacy
  • ADVICE ISO / IEC 27001
  • Penetration test
© show.it | All Rights Reserved | VAT 06984320017 | Privacy Policy | Cookie Policy | Made by incio.it