Skip to content
Linkedin-in Envelope Map-marker-alt
×
  • Italian
  • English
SecurityIT | Cyber Security Consulting
 
  • Home
  • Company
    • About Us
    • Culture and values
    • Il team
    • ISO certified company
    • Mission
  • Training
    • List of courses
  • Cyber security
    • Penetration test
    • ADVICE ISO / IEC 27001
    • Consulenza informatica in ambito privacy
    • Vulnerability assessment consulting
    • Payment card industry data security standard
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Services of cyber threat intelligence
    • Forensic analysis and investigation
    • Social media Security
  • Integration Systems IT
    • Solutions
  • News
  • Contacts
×
  • Home
  • Company
    • About Us
    • Culture and values
    • Il team
    • ISO certified company
    • Mission
  • Training
    • List of courses
  • Cyber security
    • Penetration test
    • ADVICE ISO / IEC 27001
    • Consulenza informatica in ambito privacy
    • Vulnerability assessment consulting
    • Payment card industry data security standard
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Services of cyber threat intelligence
    • Forensic analysis and investigation
    • Social media Security
  • Integration Systems IT
    • Solutions
  • News
  • Contacts
SecurityIT | Cyber Security Consulting
 
  • Home
  • Company
    • About Us
    • Culture and values
    • Il team
    • ISO certified company
    • Mission
  • Training
    • List of courses
  • Cyber security
    • Penetration test
    • ADVICE ISO / IEC 27001
    • Consulenza informatica in ambito privacy
    • Vulnerability assessment consulting
    • Payment card industry data security standard
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Services of cyber threat intelligence
    • Forensic analysis and investigation
    • Social media Security
  • Integration Systems IT
    • Solutions
  • News
  • Contacts
×
  • Home
  • Company
    • About Us
    • Culture and values
    • Il team
    • ISO certified company
    • Mission
  • Training
    • List of courses
  • Cyber security
    • Penetration test
    • ADVICE ISO / IEC 27001
    • Consulenza informatica in ambito privacy
    • Vulnerability assessment consulting
    • Payment card industry data security standard
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Services of cyber threat intelligence
    • Forensic analysis and investigation
    • Social media Security
  • Integration Systems IT
    • Solutions
  • News
  • Contacts

Category: social engineering

  1. Home
  2. social engineering

Doppel Raises $70 Million at $600 Million Valuation

The AI-native social engineering defense (SED) platform will accelerate product innovation and expand its offerings.

The post Doppel Raises $70 Million at $600 Million Valuation appeared first on SecurityWeek.

North Korean Cryptocurrency Thieves Caught Hijacking Zoom ‘Remote Control’ Feature

North Korean cryptocurrency thieves abusing Zoom Remote collaboration feature to target cryptocurrency traders with malware.

The post North Korean Cryptocurrency Thieves Caught Hijacking Zoom ‘Remote Control’ Feature appeared first on SecurityWeek.

T-Mobile to Pay Millions to Settle With FCC Over Data Breaches

T-Mobile has agreed to invest $15.75 million in cybersecurity and pay $15.75 million to settle an FCC investigation into four data breaches.

The post T-Mobile to Pay Millions to Settle With FCC Over Data Breaches appeared first on SecurityWeek.

Hacker Conversations: Stephanie ‘Snow’ Carruthers, Chief People Hacker at IBM X-Force Red

The desire to be a hacker is usually innate, and commonly emerges in early life. This did not happen with Snow: she was a married freelance special effects makeup artist when it all began.

The post Hacker Conversations: Stephanie ‘Snow’ Carruthers, Chief People Hacker at IBM X-Force Red appeared first on SecurityWeek.

Okta Says US Customers Targeted in Sophisticated Attacks

okta-says-us-customers-targeted-in-sophisticated-attacks

Okta says some of its US-based customers have been targeted in social engineering attacks whose goal was to disable MFA and obtain high privileges.

The post Okta Says US Customers Targeted in Sophisticated Attacks appeared first on SecurityWeek.

GitHub Warns of North Korean Social Engineering Attacks Targeting Tech Firm Employees

github-warns-of-north-korean-social-engineering-attacks-targeting-tech-firm-employees

North Korean hackers are targeting employees at technology firms with repository invitations and malicious NPM packages.

The post GitHub Warns of North Korean Social Engineering Attacks Targeting Tech Firm Employees appeared first on SecurityWeek.

SecurityIT | Cyber Security Consulting
Linkedin-in Envelope Map-marker-alt

The group

  • Company
  • ISO certified company
  • About Us
  • Team
  • Culture and values
  • Mission
×
  • Company
  • ISO certified company
  • About Us
  • Team
  • Culture and values
  • Mission

Services

  • Computer consulting services
  • Social media Security
  • Forensic analysis and investigation
  • Services of cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Vulnerability assessment consulting
  • Consulenza informatica in ambito privacy
  • ADVICE ISO / IEC 27001
  • Penetration test
×
  • Computer consulting services
  • Social media Security
  • Forensic analysis and investigation
  • Services of cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Vulnerability assessment consulting
  • Consulenza informatica in ambito privacy
  • ADVICE ISO / IEC 27001
  • Penetration test
© show.it | All Rights Reserved | VAT 06984320017 | Privacy Policy | Cookie Policy | Made by incio.it