Skip to content
Linkedin-in Envelope Map-marker-alt
×
  • Italian
  • English
SecurityIT | Cyber Security Consulting
 
  • Home
  • Company
    • About Us
    • Culture and values
    • Il team
    • ISO certified company
    • Mission
  • Training
    • List of courses
  • Cyber security
    • Penetration test
    • ADVICE ISO / IEC 27001
    • Consulenza informatica in ambito privacy
    • Vulnerability assessment consulting
    • Payment card industry data security standard
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Services of cyber threat intelligence
    • Forensic analysis and investigation
    • Social media Security
  • Integration Systems IT
    • Solutions
  • News
  • Contacts
×
  • Home
  • Company
    • About Us
    • Culture and values
    • Il team
    • ISO certified company
    • Mission
  • Training
    • List of courses
  • Cyber security
    • Penetration test
    • ADVICE ISO / IEC 27001
    • Consulenza informatica in ambito privacy
    • Vulnerability assessment consulting
    • Payment card industry data security standard
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Services of cyber threat intelligence
    • Forensic analysis and investigation
    • Social media Security
  • Integration Systems IT
    • Solutions
  • News
  • Contacts
SecurityIT | Cyber Security Consulting
 
  • Home
  • Company
    • About Us
    • Culture and values
    • Il team
    • ISO certified company
    • Mission
  • Training
    • List of courses
  • Cyber security
    • Penetration test
    • ADVICE ISO / IEC 27001
    • Consulenza informatica in ambito privacy
    • Vulnerability assessment consulting
    • Payment card industry data security standard
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Services of cyber threat intelligence
    • Forensic analysis and investigation
    • Social media Security
  • Integration Systems IT
    • Solutions
  • News
  • Contacts
×
  • Home
  • Company
    • About Us
    • Culture and values
    • Il team
    • ISO certified company
    • Mission
  • Training
    • List of courses
  • Cyber security
    • Penetration test
    • ADVICE ISO / IEC 27001
    • Consulenza informatica in ambito privacy
    • Vulnerability assessment consulting
    • Payment card industry data security standard
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Services of cyber threat intelligence
    • Forensic analysis and investigation
    • Social media Security
  • Integration Systems IT
    • Solutions
  • News
  • Contacts

Category: ransomware

  1. Home
  2. ransomware

Russian Ransomware Operator Pleads Guilty in US

Evgenii Ptitsyn was extradited to the United States from South Korea in November 2024.

The post Russian Ransomware Operator Pleads Guilty in US appeared first on SecurityWeek.

Medical Device Maker UFP Technologies Hit by Cyberattack

UFP Technologies appears to have been targeted in a ransomware attack that involved data theft and file-encrypting malware.

The post Medical Device Maker UFP Technologies Hit by Cyberattack appeared first on SecurityWeek.

US Healthcare Diagnostic Firm Says 140,000 Affected by Data Breach

The Everest ransomware group has taken credit for a hacker attack on Vikor Scientific, now called Vanta Diagnostics.

The post US Healthcare Diagnostic Firm Says 140,000 Affected by Data Breach appeared first on SecurityWeek.

Mississippi Hospital System Closes All Clinics After Ransomware Attack

A ransomware attack forced the University of Mississippi Medical Center to close all of its roughly three dozen clinics around the state and cancel elective procedures.

The post Mississippi Hospital System Closes All Clinics After Ransomware Attack appeared first on SecurityWeek.

BeyondTrust Vulnerability Exploited in Ransomware Attacks

CISA has updated its KEV entry for CVE-2026-1731 to alert organizations of exploitation in ransomware attacks.

The post BeyondTrust Vulnerability Exploited in Ransomware Attacks appeared first on SecurityWeek.

Chip Testing Giant Advantest Hit by Ransomware

The company is investigating whether any customer or employee data was stolen by hackers.

The post Chip Testing Giant Advantest Hit by Ransomware appeared first on SecurityWeek.

Man Linked to Phobos Ransomware Arrested in Poland

Polish police said they found evidence of cybercrime on the 47-year-old suspect’s devices.

The post Man Linked to Phobos Ransomware Arrested in Poland appeared first on SecurityWeek.

Ransomware Groups May Pivot Back to Encryption as Data Theft Tactics Falter

As only data exfiltration for extortion no longer delivers ROI, ransomware gangs may increasingly encrypting data for additional leverage.

The post Ransomware Groups May Pivot Back to Encryption as Data Theft Tactics Falter appeared first on SecurityWeek.

SmarterTools Hit by Ransomware via Vulnerability in Its Own Product

SmarterTools says customers were impacted after hackers compromised a data center used for quality control testing.

The post SmarterTools Hit by Ransomware via Vulnerability in Its Own Product appeared first on SecurityWeek.

Concerns Raised Over CISA’s Silent Ransomware Updates in KEV Catalog

CISA updated 59 KEV entries in 2025 to specify that the vulnerabilities have been exploited in ransomware attacks.

The post Concerns Raised Over CISA’s Silent Ransomware Updates in KEV Catalog appeared first on SecurityWeek.

  • Previous
  • 1
  • 2
  • 3
  • ...
  • 61
  • Next
SecurityIT | Cyber Security Consulting
Linkedin-in Envelope Map-marker-alt

The group

  • Company
  • ISO certified company
  • About Us
  • Team
  • Culture and values
  • Mission
×
  • Company
  • ISO certified company
  • About Us
  • Team
  • Culture and values
  • Mission

Services

  • Computer consulting services
  • Social media Security
  • Forensic analysis and investigation
  • Services of cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Vulnerability assessment consulting
  • Consulenza informatica in ambito privacy
  • ADVICE ISO / IEC 27001
  • Penetration test
×
  • Computer consulting services
  • Social media Security
  • Forensic analysis and investigation
  • Services of cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Vulnerability assessment consulting
  • Consulenza informatica in ambito privacy
  • ADVICE ISO / IEC 27001
  • Penetration test

© show.it | All Rights Reserved | VAT 06984320017 | Privacy Policy | Cookie Policy | Made by incio.it

My Agile Privacy®
✕

This site uses technical and profiling cookies. 

You can accept, reject, or customize the cookies by clicking the desired buttons. 

By closing this notice, you will continue without accepting. 

AcceptRefuseCustomize
Consent

Privacy Settings

This website uses cookies to improve your experience while you navigate through the website.

Google AnalyticsAlways Enabled

Google Analytics è un servizio di analisi web fornito da Google Ireland Limited (“Google”). Google utilizza i dati personali raccolti per tracciare ed esaminare l’uso di questo sito web, compilare report sulle sue attività e condividerli con gli altri servizi sviluppati da Google. Google può utilizzare i tuoi dati personali per contestualizzare e personalizzare gli annunci del proprio network pubblicitario. Questa integrazione di Google Analytics rende anonimo il tuo indirizzo IP. I dati inviati vengono collezionati per gli scopi di personalizzazione dell'esperienza e il tracciamento statistico. Trovi maggiori informazioni alla pagina "Ulteriori informazioni sulla modalità di trattamento delle informazioni personali da parte di Google".

Luogo del trattamento: Irlanda - Privacy Policy

Additional consents:

Ad Storage
Ad Storage
Defines whether cookies related to advertising can be read or written by Google.
Ad User Data
Ad User Data
Determines whether user data can be sent to Google for advertising purposes.
Ad Personalization
Ad Personalization
Controls whether personalized advertising (for example, remarketing) can be enabled.
Analytics Storage
Analytics Storage
Defines whether cookies associated with Google Analytics can be read or written.
Cloudflare Web Analytics
Cloudflare Web Analytics

Cloudflare Web Analytics è un servizio di statistica anonimizzata fornito da Cloudflare Inc. che permette al Titolare di ottenere informazioni sull’utilizzo di questo sito web.

Privacy Policy

Google Maps widget
Google Maps widget

Google Maps è un servizio di visualizzazione di mappe gestito da Google Ireland Limited. Questo servizio serve ad integrare tali contenuti all’interno delle proprie pagine.

Luogo del trattamento: Irlanda - Privacy Policy

Google reCAPTCHA
Google reCAPTCHA

Google reCAPTCHA è un servizio di protezione dallo SPAM fornito da Google Ireland Limited.

L'utilizzo del sistema reCAPTCHA è soggetto alla privacy policy  secondo termini di utilizzo di Google.

Luogo del trattamento: Irlanda - Privacy Policy

Gravatar
Gravatar

Gravatar è un servizio di visualizzazione di immagini gestito da Automattic Inc. che permette a Automattic Inc. di integrare tali contenuti all’interno delle proprie pagine.

Luogo del trattamento: Stati Uniti - Privacy Policy

GDPR Cookie Banner by My Agile Privacy®