Skip to content
Linkedin-in Envelope Map-marker-alt
×
  • Italian
  • English
SecurityIT | Cyber Security Consulting
 
  • Home
  • Company
    • About Us
    • Culture and values
    • Il team
    • ISO certified company
    • Mission
  • Training
    • List of courses
  • Cyber security
    • Penetration test
    • ADVICE ISO / IEC 27001
    • Consulenza informatica in ambito privacy
    • Vulnerability assessment consulting
    • Payment card industry data security standard
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Services of Threat Intelligence e Cyber Intelligence
    • Forensic analysis and investigation
    • Social media Security
  • Integration Systems IT
    • Solutions
  • News
  • Contacts
×
  • Home
  • Company
    • About Us
    • Culture and values
    • Il team
    • ISO certified company
    • Mission
  • Training
    • List of courses
  • Cyber security
    • Penetration test
    • ADVICE ISO / IEC 27001
    • Consulenza informatica in ambito privacy
    • Vulnerability assessment consulting
    • Payment card industry data security standard
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Services of Threat Intelligence e Cyber Intelligence
    • Forensic analysis and investigation
    • Social media Security
  • Integration Systems IT
    • Solutions
  • News
  • Contacts
SecurityIT | Cyber Security Consulting
 
  • Home
  • Company
    • About Us
    • Culture and values
    • Il team
    • ISO certified company
    • Mission
  • Training
    • List of courses
  • Cyber security
    • Penetration test
    • ADVICE ISO / IEC 27001
    • Consulenza informatica in ambito privacy
    • Vulnerability assessment consulting
    • Payment card industry data security standard
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Services of Threat Intelligence e Cyber Intelligence
    • Forensic analysis and investigation
    • Social media Security
  • Integration Systems IT
    • Solutions
  • News
  • Contacts
×
  • Home
  • Company
    • About Us
    • Culture and values
    • Il team
    • ISO certified company
    • Mission
  • Training
    • List of courses
  • Cyber security
    • Penetration test
    • ADVICE ISO / IEC 27001
    • Consulenza informatica in ambito privacy
    • Vulnerability assessment consulting
    • Payment card industry data security standard
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Services of Threat Intelligence e Cyber Intelligence
    • Forensic analysis and investigation
    • Social media Security
  • Integration Systems IT
    • Solutions
  • News
  • Contacts

Category: White Papers

  1. Home
  2. White Papers

Drupal Patches ‘High-Risk’ Third-Party Library Flaws

drupal-patches-‘high-risk’-third-party-library-flaws

The Drupal security team has released a “moderately critical” advisory to call attention to serious vulnerabilities in a third-party library and warned that hackers can exploit the bugs to remotely hijack Drupal-powered websites.

read more

Microsoft Finds Major Security Flaws in Pre-Installed Android Apps

microsoft-finds-major-security-flaws-in-pre-installed-android-apps

Bug hunters at Microsoft are calling attention to several high-severity vulnerabilities in a mobile framework used in pre-installed Android System apps, warning that exploitation could have allowed the implantation of a persistent backdoor on Android devices.

read more

Google Sees More APTs Using Ukraine War-Related Themes

google-sees-more-apts-using-ukraine-war-related-themes

Researchers at Google’s Threat Analysis Group (TAG) say the number of advanced threat actors using Ukraine war-related themes in cyberattacks went up in April with a surge in malware attacks targeting critical infrastructure.

read more

Cyberespionage Group Targeting M&A, Corporate Transactions Personnel

cyberespionage-group-targeting-m&a,-corporate-transactions-personnel

Security researchers at Mandiant are documenting the discovery of a new hacking group focused on cyberespionage targeting employees responsible for corporate development, large corporate transactions, and mergers and acquisitions.

read more

Firmware Flaws Allow Disabling Secure Boot on Lenovo Laptops

firmware-flaws-allow-disabling-secure-boot-on-lenovo-laptops

Computer maker Lenovo has started pushing security patches to address three vulnerabilities impacting the UEFI firmware of more than 110 laptop models.

read more

Adobe Patches ‘Critical’ Security Flaws in Illustrator, After Effects

adobe-patches-‘critical’-security-flaws-in-illustrator,-after-effects

Software maker Adobe on Tuesday shipped urgent security updates to fix code execution vulnerabilities in the widely deployed Illustrator and After Effects products.

read more

Researchers Devise Method to Decrypt Hive Ransomware-Encrypted Data

researchers-devise-method-to-decrypt-hive-ransomware-encrypted-data

A group of academic researchers has found a way to exploit a security flaw in the encryption algorithm used by the Hive ransomware to recover hijacked and encrypted data.

read more

FCC Chair Proposes New Policies for Carrier Data Breach Reporting

fcc-chair-proposes-new-policies-for-carrier-data-breach-reporting

Federal Communications Commission (FCC) chairwoman Jessica Rosenworcel this week proposed updated policies around telecom providers’ reporting of data breaches.

read more

Microsoft Spots Multiple Nation-State APTs Exploiting Log4j Flaw

microsoft-spots-multiple-nation-state-apts-exploiting-log4j-flaw

If defenders needed any more urgency to patch and mitigate the explosive Log4j zero-day, along comes word that APT actors linked to China, Iran, North Korea and Turkey have already pounced and are actively exploiting the CVSS 10.0 vulnerability.

read more

Google Says NSO Pegasus Zero-Click ‘Most Technically Sophisticated Exploit Ever Seen’

google-says-nso-pegasus-zero-click-‘most-technically-sophisticated-exploit-ever-seen’

Security researchers at Google’s Project Zero have picked apart one of the most notorious in-the-wild iPhone exploits and found a never-before-seen hacking roadmap that included a PDF file pretending to be a GIF image with a custom-coded virtual CPU built out of boolean pixel operations.

read more

  • 1
  • 2
  • Next
SecurityIT | Cyber Security Consulting
Linkedin-in Envelope Map-marker-alt
Facebook Twitter Instagram

The group

  • Company
  • ISO certified company
  • About Us
  • Team
  • Culture and values
  • Mission
×
  • Company
  • ISO certified company
  • About Us
  • Team
  • Culture and values
  • Mission

Services

  • Computer consulting services
  • Social media Security
  • Forensic analysis and investigation
  • Services of Threat Intelligence e Cyber Intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Vulnerability assessment consulting
  • Consulenza informatica in ambito privacy
  • ADVICE ISO / IEC 27001
  • Penetration test
×
  • Computer consulting services
  • Social media Security
  • Forensic analysis and investigation
  • Services of Threat Intelligence e Cyber Intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Vulnerability assessment consulting
  • Consulenza informatica in ambito privacy
  • ADVICE ISO / IEC 27001
  • Penetration test
© show.it | All Rights Reserved | VAT 06984320017 | Privacy Policy | Cookie Policy | Made by incio.it