ActivityPub Viewer

A small tool to view real-world ActivityPub objects as JSON! Enter a URL or username from Mastodon or a similar service below, and we'll send a request with the right Accept header to the server to view the underlying object.

Open in browser →
{ "@context": [ "https://www.w3.org/ns/activitystreams", { "ostatus": "http://ostatus.org#", "atomUri": "ostatus:atomUri", "inReplyToAtomUri": "ostatus:inReplyToAtomUri", "conversation": "ostatus:conversation", "sensitive": "as:sensitive", "toot": "http://joinmastodon.org/ns#", "votersCount": "toot:votersCount", "blurhash": "toot:blurhash", "focalPoint": { "@container": "@list", "@id": "toot:focalPoint" }, "Hashtag": "as:Hashtag" } ], "id": "https://mastodon.bida.im/users/redhotcyber/outbox?min_id=0&page=true", "type": "OrderedCollectionPage", "next": "https://mastodon.bida.im/users/redhotcyber/outbox?max_id=109298326943320529&page=true", "prev": "https://mastodon.bida.im/users/redhotcyber/outbox?min_id=109313662270377816&page=true", "partOf": "https://mastodon.bida.im/users/redhotcyber/outbox", "orderedItems": [ { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109313662270377816/activity", "type": "Create", "actor": "https://mastodon.bida.im/users/redhotcyber", "published": "2022-11-09T11:41:54Z", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://mastodon.bida.im/users/redhotcyber/followers" ], "object": { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109313662270377816", "type": "Note", "summary": null, "inReplyTo": null, "published": "2022-11-09T11:41:54Z", "url": "https://mastodon.bida.im/@redhotcyber/109313662270377816", "attributedTo": "https://mastodon.bida.im/users/redhotcyber", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://mastodon.bida.im/users/redhotcyber/followers" ], "sensitive": false, "atomUri": "https://mastodon.bida.im/users/redhotcyber/statuses/109313662270377816", "inReplyToAtomUri": null, "conversation": "tag:mastodon.bida.im,2022-11-09:objectId=41665481:objectType=Conversation", "content": "<p>DropBox è stata vittima di un importante attacco informatico</p><p>La società di file hosting <a href=\"https://mastodon.bida.im/tags/Dropbox\" class=\"mention hashtag\" rel=\"tag\">#<span>Dropbox</span></a> ha riferito il 1° novembre di essere stata <a href=\"https://mastodon.bida.im/tags/vittima\" class=\"mention hashtag\" rel=\"tag\">#<span>vittima</span></a> di una <a href=\"https://mastodon.bida.im/tags/campagna\" class=\"mention hashtag\" rel=\"tag\">#<span>campagna</span></a> di <a href=\"https://mastodon.bida.im/tags/phishing\" class=\"mention hashtag\" rel=\"tag\">#<span>phishing</span></a> che ha consentito ad aggressori di ottenere l’accesso non autorizzato a 130 <a href=\"https://mastodon.bida.im/tags/repository\" class=\"mention hashtag\" rel=\"tag\">#<span>repository</span></a> di codice sorgente su <a href=\"https://mastodon.bida.im/tags/GitHub\" class=\"mention hashtag\" rel=\"tag\">#<span>GitHub</span></a>.</p><p>“Questi repository includevano le nostre copie di <a href=\"https://mastodon.bida.im/tags/librerie\" class=\"mention hashtag\" rel=\"tag\">#<span>librerie</span></a> di terze parti leggermente modificate per utilizzare Dropbox, <a href=\"https://mastodon.bida.im/tags/prototipi\" class=\"mention hashtag\" rel=\"tag\">#<span>prototipi</span></a> interni e alcuni degli <a href=\"https://mastodon.bida.im/tags/strumenti\" class=\"mention hashtag\" rel=\"tag\">#<span>strumenti</span></a> e dei file di <a href=\"https://mastodon.bida.im/tags/configurazione\" class=\"mention hashtag\" rel=\"tag\">#<span>configurazione</span></a> utilizzati dal <a href=\"https://mastodon.bida.im/tags/team\" class=\"mention hashtag\" rel=\"tag\">#<span>team</span></a> di sicurezza” ha affermato la società in una nota.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dCVXGqYZ\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dCVXGqYZ</span><span class=\"invisible\"></span></a></p>", "contentMap": { "it": "<p>DropBox è stata vittima di un importante attacco informatico</p><p>La società di file hosting <a href=\"https://mastodon.bida.im/tags/Dropbox\" class=\"mention hashtag\" rel=\"tag\">#<span>Dropbox</span></a> ha riferito il 1° novembre di essere stata <a href=\"https://mastodon.bida.im/tags/vittima\" class=\"mention hashtag\" rel=\"tag\">#<span>vittima</span></a> di una <a href=\"https://mastodon.bida.im/tags/campagna\" class=\"mention hashtag\" rel=\"tag\">#<span>campagna</span></a> di <a href=\"https://mastodon.bida.im/tags/phishing\" class=\"mention hashtag\" rel=\"tag\">#<span>phishing</span></a> che ha consentito ad aggressori di ottenere l’accesso non autorizzato a 130 <a href=\"https://mastodon.bida.im/tags/repository\" class=\"mention hashtag\" rel=\"tag\">#<span>repository</span></a> di codice sorgente su <a href=\"https://mastodon.bida.im/tags/GitHub\" class=\"mention hashtag\" rel=\"tag\">#<span>GitHub</span></a>.</p><p>“Questi repository includevano le nostre copie di <a href=\"https://mastodon.bida.im/tags/librerie\" class=\"mention hashtag\" rel=\"tag\">#<span>librerie</span></a> di terze parti leggermente modificate per utilizzare Dropbox, <a href=\"https://mastodon.bida.im/tags/prototipi\" class=\"mention hashtag\" rel=\"tag\">#<span>prototipi</span></a> interni e alcuni degli <a href=\"https://mastodon.bida.im/tags/strumenti\" class=\"mention hashtag\" rel=\"tag\">#<span>strumenti</span></a> e dei file di <a href=\"https://mastodon.bida.im/tags/configurazione\" class=\"mention hashtag\" rel=\"tag\">#<span>configurazione</span></a> utilizzati dal <a href=\"https://mastodon.bida.im/tags/team\" class=\"mention hashtag\" rel=\"tag\">#<span>team</span></a> di sicurezza” ha affermato la società in una nota.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dCVXGqYZ\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dCVXGqYZ</span><span class=\"invisible\"></span></a></p>" }, "attachment": [ { "type": "Document", "mediaType": "image/jpeg", "url": "https://mastodon.bida.im/system/media_attachments/files/109/313/661/739/411/895/original/cc555566aef49a38.jpg", "name": null, "blurhash": "ULBojz$lD%jDJRW;oLay4mjE%MbdbFWBayof", "width": 800, "height": 480 } ], "tag": [ { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/dropbox", "name": "#dropbox" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/vittima", "name": "#vittima" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/campagna", "name": "#campagna" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/phishing", "name": "#phishing" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/repository", "name": "#repository" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/github", "name": "#github" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/librerie", "name": "#librerie" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/prototipi", "name": "#prototipi" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/strumenti", "name": "#strumenti" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/configurazione", "name": "#configurazione" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/team", "name": "#team" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/redhotcyber", "name": "#redhotcyber" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/informationsecurity", "name": "#informationsecurity" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/ethicalhacking", "name": "#ethicalhacking" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/dataprotection", "name": "#dataprotection" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/hacking", "name": "#hacking" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybersecurity", "name": "#cybersecurity" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybercrime", "name": "#cybercrime" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/CyberSecurityAwareness", "name": "#CyberSecurityAwareness" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybersecuritytraining", "name": "#cybersecuritytraining" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/CyberSecurityNews", "name": "#CyberSecurityNews" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/privacy", "name": "#privacy" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/infosecurity", "name": "#infosecurity" } ], "replies": { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109313662270377816/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://mastodon.bida.im/users/redhotcyber/statuses/109313662270377816/replies?only_other_accounts=true&page=true", "partOf": "https://mastodon.bida.im/users/redhotcyber/statuses/109313662270377816/replies", "items": [] } } } }, { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109312425666936516/activity", "type": "Create", "actor": "https://mastodon.bida.im/users/redhotcyber", "published": "2022-11-09T06:27:25Z", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://mastodon.bida.im/users/redhotcyber/followers" ], "object": { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109312425666936516", "type": "Note", "summary": null, "inReplyTo": null, "published": "2022-11-09T06:27:25Z", "url": "https://mastodon.bida.im/@redhotcyber/109312425666936516", "attributedTo": "https://mastodon.bida.im/users/redhotcyber", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://mastodon.bida.im/users/redhotcyber/followers" ], "sensitive": false, "atomUri": "https://mastodon.bida.im/users/redhotcyber/statuses/109312425666936516", "inReplyToAtomUri": null, "conversation": "tag:mastodon.bida.im,2022-11-09:objectId=41644417:objectType=Conversation", "content": "<p>I siti di notizie statunitensi distribuiscono malware</p><p>I <a href=\"https://mastodon.bida.im/tags/ricercatori\" class=\"mention hashtag\" rel=\"tag\">#<span>ricercatori</span></a> di Proofpoint hanno scoperto una nuova campagna in cui gli aggressori utilizzano l’<a href=\"https://mastodon.bida.im/tags/infrastruttura\" class=\"mention hashtag\" rel=\"tag\">#<span>infrastruttura</span></a> compromessa di una società di <a href=\"https://mastodon.bida.im/tags/media\" class=\"mention hashtag\" rel=\"tag\">#<span>media</span></a> statunitense per distribuire il <a href=\"https://mastodon.bida.im/tags/framework\" class=\"mention hashtag\" rel=\"tag\">#<span>framework</span></a> <a href=\"https://mastodon.bida.im/tags/SocGholish\" class=\"mention hashtag\" rel=\"tag\">#<span>SocGholish</span></a> (noto anche come FakeUpdates) sui siti <a href=\"https://mastodon.bida.im/tags/web\" class=\"mention hashtag\" rel=\"tag\">#<span>web</span></a> di notizie statunitensi.</p><p>La società di media senza nome fornisce contenuti <a href=\"https://mastodon.bida.im/tags/video\" class=\"mention hashtag\" rel=\"tag\">#<span>video</span></a> e <a href=\"https://mastodon.bida.im/tags/pubblicit%C3%A0\" class=\"mention hashtag\" rel=\"tag\">#<span>pubblicità</span></a> alle principali testate giornalistiche. L’azienda serve diverse aziende negli <a href=\"https://mastodon.bida.im/tags/statiuniti\" class=\"mention hashtag\" rel=\"tag\">#<span>statiuniti</span></a>.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/d-MkRgjQ\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/d-MkRgjQ</span><span class=\"invisible\"></span></a></p>", "contentMap": { "it": "<p>I siti di notizie statunitensi distribuiscono malware</p><p>I <a href=\"https://mastodon.bida.im/tags/ricercatori\" class=\"mention hashtag\" rel=\"tag\">#<span>ricercatori</span></a> di Proofpoint hanno scoperto una nuova campagna in cui gli aggressori utilizzano l’<a href=\"https://mastodon.bida.im/tags/infrastruttura\" class=\"mention hashtag\" rel=\"tag\">#<span>infrastruttura</span></a> compromessa di una società di <a href=\"https://mastodon.bida.im/tags/media\" class=\"mention hashtag\" rel=\"tag\">#<span>media</span></a> statunitense per distribuire il <a href=\"https://mastodon.bida.im/tags/framework\" class=\"mention hashtag\" rel=\"tag\">#<span>framework</span></a> <a href=\"https://mastodon.bida.im/tags/SocGholish\" class=\"mention hashtag\" rel=\"tag\">#<span>SocGholish</span></a> (noto anche come FakeUpdates) sui siti <a href=\"https://mastodon.bida.im/tags/web\" class=\"mention hashtag\" rel=\"tag\">#<span>web</span></a> di notizie statunitensi.</p><p>La società di media senza nome fornisce contenuti <a href=\"https://mastodon.bida.im/tags/video\" class=\"mention hashtag\" rel=\"tag\">#<span>video</span></a> e <a href=\"https://mastodon.bida.im/tags/pubblicit%C3%A0\" class=\"mention hashtag\" rel=\"tag\">#<span>pubblicità</span></a> alle principali testate giornalistiche. L’azienda serve diverse aziende negli <a href=\"https://mastodon.bida.im/tags/statiuniti\" class=\"mention hashtag\" rel=\"tag\">#<span>statiuniti</span></a>.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/d-MkRgjQ\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/d-MkRgjQ</span><span class=\"invisible\"></span></a></p>" }, "attachment": [ { "type": "Document", "mediaType": "image/jpeg", "url": "https://mastodon.bida.im/system/media_attachments/files/109/312/425/020/102/667/original/8133b4f30064fe2b.jpg", "name": null, "blurhash": "UbODnI00-;-;~qRjIUayD%t7xuofxuRjWBt7", "width": 800, "height": 447 } ], "tag": [ { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/ricercatori", "name": "#ricercatori" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/infrastruttura", "name": "#infrastruttura" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/media", "name": "#media" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/framework", "name": "#framework" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/SocGholish", "name": "#SocGholish" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/web", "name": "#web" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/video", "name": "#video" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/pubblicit%C3%A0", "name": "#pubblicità" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/statiuniti", "name": "#statiuniti" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/redhotcyber", "name": "#redhotcyber" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/informationsecurity", "name": "#informationsecurity" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/ethicalhacking", "name": "#ethicalhacking" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/dataprotection", "name": "#dataprotection" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/hacking", "name": "#hacking" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybersecurity", "name": "#cybersecurity" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybercrime", "name": "#cybercrime" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/CyberSecurityAwareness", "name": "#CyberSecurityAwareness" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybersecuritytraining", "name": "#cybersecuritytraining" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/CyberSecurityNews", "name": "#CyberSecurityNews" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/privacy", "name": "#privacy" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/infosecurity", "name": "#infosecurity" } ], "replies": { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109312425666936516/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://mastodon.bida.im/users/redhotcyber/statuses/109312425666936516/replies?only_other_accounts=true&page=true", "partOf": "https://mastodon.bida.im/users/redhotcyber/statuses/109312425666936516/replies", "items": [] } } } }, { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109308296376387219/activity", "type": "Create", "actor": "https://mastodon.bida.im/users/redhotcyber", "published": "2022-11-08T12:57:17Z", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://mastodon.bida.im/users/redhotcyber/followers" ], "object": { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109308296376387219", "type": "Note", "summary": null, "inReplyTo": null, "published": "2022-11-08T12:57:17Z", "url": "https://mastodon.bida.im/@redhotcyber/109308296376387219", "attributedTo": "https://mastodon.bida.im/users/redhotcyber", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://mastodon.bida.im/users/redhotcyber/followers" ], "sensitive": false, "atomUri": "https://mastodon.bida.im/users/redhotcyber/statuses/109308296376387219", "inReplyToAtomUri": null, "conversation": "tag:mastodon.bida.im,2022-11-08:objectId=41574276:objectType=Conversation", "content": "<p>Morire realmente in un videogioco? Ora sarà possibile con l’invenzione di un visore che farà esplodere realmente il tuo cervello</p><p>Palmer Lucky, fondatore di <a href=\"https://mastodon.bida.im/tags/Oculus\" class=\"mention hashtag\" rel=\"tag\">#<span>Oculus</span></a> e <a href=\"https://mastodon.bida.im/tags/sviluppatore\" class=\"mention hashtag\" rel=\"tag\">#<span>sviluppatore</span></a> del casco Oculus <a href=\"https://mastodon.bida.im/tags/Rift\" class=\"mention hashtag\" rel=\"tag\">#<span>Rift</span></a> VR, ha svelato sul suo blog un visore che esploderà all’istante se il suo proprietario muore nel video gioco.</p><p>Il visore <a href=\"https://mastodon.bida.im/tags/killer\" class=\"mention hashtag\" rel=\"tag\">#<span>killer</span></a> sembra un <a href=\"https://mastodon.bida.im/tags/Meta\" class=\"mention hashtag\" rel=\"tag\">#<span>Meta</span></a> <a href=\"https://mastodon.bida.im/tags/QuestPro\" class=\"mention hashtag\" rel=\"tag\">#<span>QuestPro</span></a> con tre capsule esplosive posizionate sopra lo schermo. Le cariche sono rivolte direttamente alla parte anteriore del <a href=\"https://mastodon.bida.im/tags/cervello\" class=\"mention hashtag\" rel=\"tag\">#<span>cervello</span></a> del proprietario e, se esplodono, gli esploderanno letteralmente in testa.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dSN7De4x\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dSN7De4x</span><span class=\"invisible\"></span></a></p>", "contentMap": { "it": "<p>Morire realmente in un videogioco? Ora sarà possibile con l’invenzione di un visore che farà esplodere realmente il tuo cervello</p><p>Palmer Lucky, fondatore di <a href=\"https://mastodon.bida.im/tags/Oculus\" class=\"mention hashtag\" rel=\"tag\">#<span>Oculus</span></a> e <a href=\"https://mastodon.bida.im/tags/sviluppatore\" class=\"mention hashtag\" rel=\"tag\">#<span>sviluppatore</span></a> del casco Oculus <a href=\"https://mastodon.bida.im/tags/Rift\" class=\"mention hashtag\" rel=\"tag\">#<span>Rift</span></a> VR, ha svelato sul suo blog un visore che esploderà all’istante se il suo proprietario muore nel video gioco.</p><p>Il visore <a href=\"https://mastodon.bida.im/tags/killer\" class=\"mention hashtag\" rel=\"tag\">#<span>killer</span></a> sembra un <a href=\"https://mastodon.bida.im/tags/Meta\" class=\"mention hashtag\" rel=\"tag\">#<span>Meta</span></a> <a href=\"https://mastodon.bida.im/tags/QuestPro\" class=\"mention hashtag\" rel=\"tag\">#<span>QuestPro</span></a> con tre capsule esplosive posizionate sopra lo schermo. Le cariche sono rivolte direttamente alla parte anteriore del <a href=\"https://mastodon.bida.im/tags/cervello\" class=\"mention hashtag\" rel=\"tag\">#<span>cervello</span></a> del proprietario e, se esplodono, gli esploderanno letteralmente in testa.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dSN7De4x\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dSN7De4x</span><span class=\"invisible\"></span></a></p>" }, "attachment": [ { "type": "Document", "mediaType": "image/jpeg", "url": "https://mastodon.bida.im/system/media_attachments/files/109/308/295/257/492/843/original/f9a0629a62a37701.jpg", "name": null, "blurhash": "UkGSDm-;WCWB~qt7azfk-;NGM{ayxbM{WBj[", "width": 770, "height": 616 } ], "tag": [ { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/oculus", "name": "#oculus" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/sviluppatore", "name": "#sviluppatore" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/Rift", "name": "#Rift" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/killer", "name": "#killer" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/meta", "name": "#meta" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/QuestPro", "name": "#QuestPro" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cervello", "name": "#cervello" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/redhotcyber", "name": "#redhotcyber" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/informationsecurity", "name": "#informationsecurity" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/ethicalhacking", "name": "#ethicalhacking" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/dataprotection", "name": "#dataprotection" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/hacking", "name": "#hacking" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybersecurity", "name": "#cybersecurity" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybercrime", "name": "#cybercrime" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/CyberSecurityAwareness", "name": "#CyberSecurityAwareness" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybersecuritytraining", "name": "#cybersecuritytraining" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/CyberSecurityNews", "name": "#CyberSecurityNews" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/privacy", "name": "#privacy" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/infosecurity", "name": "#infosecurity" } ], "replies": { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109308296376387219/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://mastodon.bida.im/users/redhotcyber/statuses/109308296376387219/replies?only_other_accounts=true&page=true", "partOf": "https://mastodon.bida.im/users/redhotcyber/statuses/109308296376387219/replies", "items": [] } } } }, { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109307953513473848/activity", "type": "Create", "actor": "https://mastodon.bida.im/users/redhotcyber", "published": "2022-11-08T11:30:05Z", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://mastodon.bida.im/users/redhotcyber/followers" ], "object": { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109307953513473848", "type": "Note", "summary": null, "inReplyTo": null, "published": "2022-11-08T11:30:05Z", "url": "https://mastodon.bida.im/@redhotcyber/109307953513473848", "attributedTo": "https://mastodon.bida.im/users/redhotcyber", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://mastodon.bida.im/users/redhotcyber/followers" ], "sensitive": false, "atomUri": "https://mastodon.bida.im/users/redhotcyber/statuses/109307953513473848", "inReplyToAtomUri": null, "conversation": "tag:mastodon.bida.im,2022-11-08:objectId=41567975:objectType=Conversation", "content": "<p>OldGremlin: il gruppo ransomware che colpisce la Russia a suon di 4 milioni di euro</p><p>Group-IB ha pubblicato il primo rapporto analitico “<a href=\"https://mastodon.bida.im/tags/OldGremlin\" class=\"mention hashtag\" rel=\"tag\">#<span>OldGremlin</span></a> Analisi degli attacchi di gruppo <a href=\"https://mastodon.bida.im/tags/ransomware\" class=\"mention hashtag\" rel=\"tag\">#<span>ransomware</span></a> mirati alle imprese russe”, dedicato al gruppo di hacker <a href=\"https://mastodon.bida.im/tags/ransomware\" class=\"mention hashtag\" rel=\"tag\">#<span>ransomware</span></a> di lingua russa.</p><p>In soli due anni e mezzo, i gremlin, secondo Group-IB, hanno effettuato 16 attacchi per ottenere riscatti per la decrittazione dei <a href=\"https://mastodon.bida.im/tags/dati\" class=\"mention hashtag\" rel=\"tag\">#<span>dati</span></a>.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dQJaQfY5\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dQJaQfY5</span><span class=\"invisible\"></span></a></p>", "contentMap": { "it": "<p>OldGremlin: il gruppo ransomware che colpisce la Russia a suon di 4 milioni di euro</p><p>Group-IB ha pubblicato il primo rapporto analitico “<a href=\"https://mastodon.bida.im/tags/OldGremlin\" class=\"mention hashtag\" rel=\"tag\">#<span>OldGremlin</span></a> Analisi degli attacchi di gruppo <a href=\"https://mastodon.bida.im/tags/ransomware\" class=\"mention hashtag\" rel=\"tag\">#<span>ransomware</span></a> mirati alle imprese russe”, dedicato al gruppo di hacker <a href=\"https://mastodon.bida.im/tags/ransomware\" class=\"mention hashtag\" rel=\"tag\">#<span>ransomware</span></a> di lingua russa.</p><p>In soli due anni e mezzo, i gremlin, secondo Group-IB, hanno effettuato 16 attacchi per ottenere riscatti per la decrittazione dei <a href=\"https://mastodon.bida.im/tags/dati\" class=\"mention hashtag\" rel=\"tag\">#<span>dati</span></a>.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dQJaQfY5\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dQJaQfY5</span><span class=\"invisible\"></span></a></p>" }, "attachment": [ { "type": "Document", "mediaType": "image/jpeg", "url": "https://mastodon.bida.im/system/media_attachments/files/109/307/953/108/752/817/original/62d5601302b08e84.jpg", "name": null, "blurhash": "UIC;tr$*0zNGO=oeVtNH5RR*%1t7RPR*o}%L", "width": 800, "height": 420 } ], "tag": [ { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/OldGremlin", "name": "#OldGremlin" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/ransomware", "name": "#ransomware" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/dati", "name": "#dati" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/redhotcyber", "name": "#redhotcyber" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/informationsecurity", "name": "#informationsecurity" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/ethicalhacking", "name": "#ethicalhacking" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/dataprotection", "name": "#dataprotection" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/hacking", "name": "#hacking" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybersecurity", "name": "#cybersecurity" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybercrime", "name": "#cybercrime" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/CyberSecurityAwareness", "name": "#CyberSecurityAwareness" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybersecuritytraining", "name": "#cybersecuritytraining" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/CyberSecurityNews", "name": "#CyberSecurityNews" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/privacy", "name": "#privacy" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/infosecurity", "name": "#infosecurity" } ], "replies": { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109307953513473848/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://mastodon.bida.im/users/redhotcyber/statuses/109307953513473848/replies?only_other_accounts=true&page=true", "partOf": "https://mastodon.bida.im/users/redhotcyber/statuses/109307953513473848/replies", "items": [] } } } }, { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109307947425612712/activity", "type": "Create", "actor": "https://mastodon.bida.im/users/redhotcyber", "published": "2022-11-08T11:28:32Z", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://mastodon.bida.im/users/redhotcyber/followers" ], "object": { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109307947425612712", "type": "Note", "summary": null, "inReplyTo": null, "published": "2022-11-08T11:28:32Z", "url": "https://mastodon.bida.im/@redhotcyber/109307947425612712", "attributedTo": "https://mastodon.bida.im/users/redhotcyber", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://mastodon.bida.im/users/redhotcyber/followers" ], "sensitive": false, "atomUri": "https://mastodon.bida.im/users/redhotcyber/statuses/109307947425612712", "inReplyToAtomUri": null, "conversation": "tag:mastodon.bida.im,2022-11-08:objectId=41567859:objectType=Conversation", "content": "<p>La Russia ora è in grado di scollegarsi da internet ed utilizzare la sua Runet.</p><p><a href=\"https://mastodon.bida.im/tags/Runet\" class=\"mention hashtag\" rel=\"tag\">#<span>Runet</span></a> sarà in grado di continuare a lavorare in modo autonomo anche se <a href=\"https://mastodon.bida.im/tags/disconnesso\" class=\"mention hashtag\" rel=\"tag\">#<span>disconnesso</span></a> dalla rete globale. Lo ha annunciato il direttore del Centro per il <a href=\"https://mastodon.bida.im/tags/monitoraggio\" class=\"mention hashtag\" rel=\"tag\">#<span>monitoraggio</span></a> e il controllo della rete di <a href=\"https://mastodon.bida.im/tags/comunicazioni\" class=\"mention hashtag\" rel=\"tag\">#<span>comunicazioni</span></a> pubbliche dell’impresa unitaria dello Stato federale “Centro principale di radiofrequenza” subordinato a <a href=\"https://mastodon.bida.im/tags/Roskomnadzor\" class=\"mention hashtag\" rel=\"tag\">#<span>Roskomnadzor</span></a> Sergey Khutortsev. Le sue parole sono state riportate dall’agenzia <a href=\"https://mastodon.bida.im/tags/TASS\" class=\"mention hashtag\" rel=\"tag\">#<span>TASS</span></a>.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dPTWbcvU\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dPTWbcvU</span><span class=\"invisible\"></span></a></p>", "contentMap": { "it": "<p>La Russia ora è in grado di scollegarsi da internet ed utilizzare la sua Runet.</p><p><a href=\"https://mastodon.bida.im/tags/Runet\" class=\"mention hashtag\" rel=\"tag\">#<span>Runet</span></a> sarà in grado di continuare a lavorare in modo autonomo anche se <a href=\"https://mastodon.bida.im/tags/disconnesso\" class=\"mention hashtag\" rel=\"tag\">#<span>disconnesso</span></a> dalla rete globale. Lo ha annunciato il direttore del Centro per il <a href=\"https://mastodon.bida.im/tags/monitoraggio\" class=\"mention hashtag\" rel=\"tag\">#<span>monitoraggio</span></a> e il controllo della rete di <a href=\"https://mastodon.bida.im/tags/comunicazioni\" class=\"mention hashtag\" rel=\"tag\">#<span>comunicazioni</span></a> pubbliche dell’impresa unitaria dello Stato federale “Centro principale di radiofrequenza” subordinato a <a href=\"https://mastodon.bida.im/tags/Roskomnadzor\" class=\"mention hashtag\" rel=\"tag\">#<span>Roskomnadzor</span></a> Sergey Khutortsev. Le sue parole sono state riportate dall’agenzia <a href=\"https://mastodon.bida.im/tags/TASS\" class=\"mention hashtag\" rel=\"tag\">#<span>TASS</span></a>.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dPTWbcvU\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dPTWbcvU</span><span class=\"invisible\"></span></a></p>" }, "attachment": [ { "type": "Document", "mediaType": "image/jpeg", "url": "https://mastodon.bida.im/system/media_attachments/files/109/307/946/330/852/650/original/c382f2e9aae17208.jpg", "name": null, "blurhash": "UmFr;pn$M_WY.mbIr?oL==bIXAodofjYW=j?", "width": 756, "height": 454 } ], "tag": [ { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/runet", "name": "#runet" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/disconnesso", "name": "#disconnesso" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/monitoraggio", "name": "#monitoraggio" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/comunicazioni", "name": "#comunicazioni" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/roskomnadzor", "name": "#roskomnadzor" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/tass", "name": "#tass" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/redhotcyber", "name": "#redhotcyber" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/informationsecurity", "name": "#informationsecurity" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/ethicalhacking", "name": "#ethicalhacking" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/dataprotection", "name": "#dataprotection" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/hacking", "name": "#hacking" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybersecurity", "name": "#cybersecurity" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybercrime", "name": "#cybercrime" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/CyberSecurityAwareness", "name": "#CyberSecurityAwareness" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybersecuritytraining", "name": "#cybersecuritytraining" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/CyberSecurityNews", "name": "#CyberSecurityNews" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/privacy", "name": "#privacy" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/infosecurity", "name": "#infosecurity" } ], "replies": { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109307947425612712/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://mastodon.bida.im/users/redhotcyber/statuses/109307947425612712/replies?only_other_accounts=true&page=true", "partOf": "https://mastodon.bida.im/users/redhotcyber/statuses/109307947425612712/replies", "items": [] } } } }, { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109307115267327916/activity", "type": "Create", "actor": "https://mastodon.bida.im/users/redhotcyber", "published": "2022-11-08T07:56:54Z", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://mastodon.bida.im/users/redhotcyber/followers" ], "object": { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109307115267327916", "type": "Note", "summary": null, "inReplyTo": null, "published": "2022-11-08T07:56:54Z", "url": "https://mastodon.bida.im/@redhotcyber/109307115267327916", "attributedTo": "https://mastodon.bida.im/users/redhotcyber", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://mastodon.bida.im/users/redhotcyber/followers" ], "sensitive": false, "atomUri": "https://mastodon.bida.im/users/redhotcyber/statuses/109307115267327916", "inReplyToAtomUri": null, "conversation": "tag:mastodon.bida.im,2022-11-08:objectId=41553439:objectType=Conversation", "content": "<p>La METRO è stata colpita dal ransomware BlackBasta. I samples sono online</p><p>La famigerata banda <a href=\"https://mastodon.bida.im/tags/BlackBasta\" class=\"mention hashtag\" rel=\"tag\">#<span>BlackBasta</span></a> rivendica oggi l’attacco <a href=\"https://mastodon.bida.im/tags/ransomware\" class=\"mention hashtag\" rel=\"tag\">#<span>ransomware</span></a> alle infrastrutture della <a href=\"https://mastodon.bida.im/tags/METRO\" class=\"mention hashtag\" rel=\"tag\">#<span>METRO</span></a>, la terza catena di vendita al dettaglio in <a href=\"https://mastodon.bida.im/tags/Europa\" class=\"mention hashtag\" rel=\"tag\">#<span>Europa</span></a> e la quarta al mondo.</p><p>Da <a href=\"https://mastodon.bida.im/tags/informazioni\" class=\"mention hashtag\" rel=\"tag\">#<span>informazioni</span></a> fornite a RHC, sembrerebbe che l’attacco abbia avuto inizio con una campagna mirata di phishing, poi successivamente, attraverso l’utilizzo di <a href=\"https://mastodon.bida.im/tags/malware\" class=\"mention hashtag\" rel=\"tag\">#<span>malware</span></a>, ha permesso alla gang di impadronirsi dei server ESX/Vmware e bloccare una parte delle infrastrutture.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dbf-RKa2\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dbf-RKa2</span><span class=\"invisible\"></span></a></p>", "contentMap": { "it": "<p>La METRO è stata colpita dal ransomware BlackBasta. I samples sono online</p><p>La famigerata banda <a href=\"https://mastodon.bida.im/tags/BlackBasta\" class=\"mention hashtag\" rel=\"tag\">#<span>BlackBasta</span></a> rivendica oggi l’attacco <a href=\"https://mastodon.bida.im/tags/ransomware\" class=\"mention hashtag\" rel=\"tag\">#<span>ransomware</span></a> alle infrastrutture della <a href=\"https://mastodon.bida.im/tags/METRO\" class=\"mention hashtag\" rel=\"tag\">#<span>METRO</span></a>, la terza catena di vendita al dettaglio in <a href=\"https://mastodon.bida.im/tags/Europa\" class=\"mention hashtag\" rel=\"tag\">#<span>Europa</span></a> e la quarta al mondo.</p><p>Da <a href=\"https://mastodon.bida.im/tags/informazioni\" class=\"mention hashtag\" rel=\"tag\">#<span>informazioni</span></a> fornite a RHC, sembrerebbe che l’attacco abbia avuto inizio con una campagna mirata di phishing, poi successivamente, attraverso l’utilizzo di <a href=\"https://mastodon.bida.im/tags/malware\" class=\"mention hashtag\" rel=\"tag\">#<span>malware</span></a>, ha permesso alla gang di impadronirsi dei server ESX/Vmware e bloccare una parte delle infrastrutture.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dbf-RKa2\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dbf-RKa2</span><span class=\"invisible\"></span></a></p>" }, "attachment": [ { "type": "Document", "mediaType": "image/jpeg", "url": "https://mastodon.bida.im/system/media_attachments/files/109/307/113/135/780/381/original/6db3d4f804c7ae8a.jpg", "name": null, "blurhash": "UL9%I:J7Mybbs.R*bHs.0gxGx@smNaxGayNb", "width": 1080, "height": 644 } ], "tag": [ { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/BlackBasta", "name": "#BlackBasta" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/ransomware", "name": "#ransomware" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/metro", "name": "#metro" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/europa", "name": "#europa" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/informazioni", "name": "#informazioni" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/malware", "name": "#malware" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/redhotcyber", "name": "#redhotcyber" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/informationsecurity", "name": "#informationsecurity" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/ethicalhacking", "name": "#ethicalhacking" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/dataprotection", "name": "#dataprotection" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/hacking", "name": "#hacking" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybersecurity", "name": "#cybersecurity" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybercrime", "name": "#cybercrime" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/CyberSecurityAwareness", "name": "#CyberSecurityAwareness" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybersecuritytraining", "name": "#cybersecuritytraining" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/CyberSecurityNews", "name": "#CyberSecurityNews" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/privacy", "name": "#privacy" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/infosecurity", "name": "#infosecurity" } ], "replies": { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109307115267327916/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://mastodon.bida.im/users/redhotcyber/statuses/109307115267327916/replies?only_other_accounts=true&page=true", "partOf": "https://mastodon.bida.im/users/redhotcyber/statuses/109307115267327916/replies", "items": [] } } } }, { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109306971291244746/activity", "type": "Create", "actor": "https://mastodon.bida.im/users/redhotcyber", "published": "2022-11-08T07:20:18Z", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://mastodon.bida.im/users/redhotcyber/followers" ], "object": { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109306971291244746", "type": "Note", "summary": null, "inReplyTo": null, "published": "2022-11-08T07:20:18Z", "url": "https://mastodon.bida.im/@redhotcyber/109306971291244746", "attributedTo": "https://mastodon.bida.im/users/redhotcyber", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://mastodon.bida.im/users/redhotcyber/followers" ], "sensitive": false, "atomUri": "https://mastodon.bida.im/users/redhotcyber/statuses/109306971291244746", "inReplyToAtomUri": null, "conversation": "tag:mastodon.bida.im,2022-11-08:objectId=41551148:objectType=Conversation", "content": "<p>V per Vendetta: analisi psicologica di un film alla base del moderno hacktivismo</p><p>La maschera di Guy Fawkes indossata nel film V for Vendetta di James Mc Teigue perchè è il simbolo di <a href=\"https://mastodon.bida.im/tags/Anonymous\" class=\"mention hashtag\" rel=\"tag\">#<span>Anonymous</span></a>? Proviamo a ripercorrere insieme i passi più salienti del <a href=\"https://mastodon.bida.im/tags/film\" class=\"mention hashtag\" rel=\"tag\">#<span>film</span></a> per vedere quali sono le emozioni che hanno portato un gruppo di <a href=\"https://mastodon.bida.im/tags/hacktivisti\" class=\"mention hashtag\" rel=\"tag\">#<span>hacktivisti</span></a> a scegliere proprio tale <a href=\"https://mastodon.bida.im/tags/maschera\" class=\"mention hashtag\" rel=\"tag\">#<span>maschera</span></a>, come simbolo globale di protesta e di rinnovamento.</p><p>V non è un semplice super-eroe e soprattutto non è un film che può essere ricondotto, esclusivamente, ad un capolavoro <a href=\"https://mastodon.bida.im/tags/cinematografico\" class=\"mention hashtag\" rel=\"tag\">#<span>cinematografico</span></a> che tiene incollati alla poltrona.</p><p>A cura di Daniela Farina.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dU_czB4M\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dU_czB4M</span><span class=\"invisible\"></span></a></p>", "contentMap": { "it": "<p>V per Vendetta: analisi psicologica di un film alla base del moderno hacktivismo</p><p>La maschera di Guy Fawkes indossata nel film V for Vendetta di James Mc Teigue perchè è il simbolo di <a href=\"https://mastodon.bida.im/tags/Anonymous\" class=\"mention hashtag\" rel=\"tag\">#<span>Anonymous</span></a>? Proviamo a ripercorrere insieme i passi più salienti del <a href=\"https://mastodon.bida.im/tags/film\" class=\"mention hashtag\" rel=\"tag\">#<span>film</span></a> per vedere quali sono le emozioni che hanno portato un gruppo di <a href=\"https://mastodon.bida.im/tags/hacktivisti\" class=\"mention hashtag\" rel=\"tag\">#<span>hacktivisti</span></a> a scegliere proprio tale <a href=\"https://mastodon.bida.im/tags/maschera\" class=\"mention hashtag\" rel=\"tag\">#<span>maschera</span></a>, come simbolo globale di protesta e di rinnovamento.</p><p>V non è un semplice super-eroe e soprattutto non è un film che può essere ricondotto, esclusivamente, ad un capolavoro <a href=\"https://mastodon.bida.im/tags/cinematografico\" class=\"mention hashtag\" rel=\"tag\">#<span>cinematografico</span></a> che tiene incollati alla poltrona.</p><p>A cura di Daniela Farina.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dU_czB4M\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dU_czB4M</span><span class=\"invisible\"></span></a></p>" }, "attachment": [ { "type": "Document", "mediaType": "image/jpeg", "url": "https://mastodon.bida.im/system/media_attachments/files/109/306/970/105/906/455/original/31a18ad2508f9db6.jpg", "name": null, "blurhash": "URH81@sn{gf6}YJl:,n%oysonPsB]nn%J8o1", "width": 621, "height": 621 } ], "tag": [ { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/anonymous", "name": "#anonymous" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/film", "name": "#film" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/hacktivisti", "name": "#hacktivisti" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/maschera", "name": "#maschera" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cinematografico", "name": "#cinematografico" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/redhotcyber", "name": "#redhotcyber" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/informationsecurity", "name": "#informationsecurity" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/ethicalhacking", "name": "#ethicalhacking" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/dataprotection", "name": "#dataprotection" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/hacking", "name": "#hacking" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybersecurity", "name": "#cybersecurity" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybercrime", "name": "#cybercrime" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/CyberSecurityAwareness", "name": "#CyberSecurityAwareness" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybersecuritytraining", "name": "#cybersecuritytraining" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/CyberSecurityNews", "name": "#CyberSecurityNews" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/privacy", "name": "#privacy" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/infosecurity", "name": "#infosecurity" } ], "replies": { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109306971291244746/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://mastodon.bida.im/users/redhotcyber/statuses/109306971291244746/replies?only_other_accounts=true&page=true", "partOf": "https://mastodon.bida.im/users/redhotcyber/statuses/109306971291244746/replies", "items": [] } } } }, { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109304748605587575/activity", "type": "Create", "actor": "https://mastodon.bida.im/users/redhotcyber", "published": "2022-11-07T21:55:02Z", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://mastodon.bida.im/users/redhotcyber/followers", "https://mastodon.uno/users/haller" ], "object": { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109304748605587575", "type": "Note", "summary": null, "inReplyTo": null, "published": "2022-11-07T21:55:02Z", "url": "https://mastodon.bida.im/@redhotcyber/109304748605587575", "attributedTo": "https://mastodon.bida.im/users/redhotcyber", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://mastodon.bida.im/users/redhotcyber/followers", "https://mastodon.uno/users/haller" ], "sensitive": false, "atomUri": "https://mastodon.bida.im/users/redhotcyber/statuses/109304748605587575", "inReplyToAtomUri": null, "conversation": "tag:mastodon.bida.im,2022-11-07:objectId=41477936:objectType=Conversation", "content": "<p><span class=\"h-card\" translate=\"no\"><a href=\"https://mastodon.uno/@haller\" class=\"u-url mention\">@<span>haller</span></a></span> Grazie Heller, siamo però ancora un pò impacciati con lo strumento 😉</p>", "contentMap": { "it": "<p><span class=\"h-card\" translate=\"no\"><a href=\"https://mastodon.uno/@haller\" class=\"u-url mention\">@<span>haller</span></a></span> Grazie Heller, siamo però ancora un pò impacciati con lo strumento 😉</p>" }, "attachment": [], "tag": [ { "type": "Mention", "href": "https://mastodon.uno/users/haller", "name": "@haller@mastodon.uno" } ], "replies": { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109304748605587575/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://mastodon.bida.im/users/redhotcyber/statuses/109304748605587575/replies?only_other_accounts=true&page=true", "partOf": "https://mastodon.bida.im/users/redhotcyber/statuses/109304748605587575/replies", "items": [] } } } }, { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109303219290559688/activity", "type": "Create", "actor": "https://mastodon.bida.im/users/redhotcyber", "published": "2022-11-07T15:26:07Z", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://mastodon.bida.im/users/redhotcyber/followers" ], "object": { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109303219290559688", "type": "Note", "summary": null, "inReplyTo": null, "published": "2022-11-07T15:26:07Z", "url": "https://mastodon.bida.im/@redhotcyber/109303219290559688", "attributedTo": "https://mastodon.bida.im/users/redhotcyber", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://mastodon.bida.im/users/redhotcyber/followers" ], "sensitive": false, "atomUri": "https://mastodon.bida.im/users/redhotcyber/statuses/109303219290559688", "inReplyToAtomUri": null, "conversation": "tag:mastodon.bida.im,2022-11-07:objectId=41493595:objectType=Conversation", "content": "<p>Sta arrivando &quot;Betti&quot;! Il fumetto di Red Hot Cyber sulla Cybersecurity!</p><p>Red Hot Cyber, credendo che occorra trovare dei metodi non convenzionali per stimolare le persone verso la <a href=\"https://mastodon.bida.im/tags/consapevolezza\" class=\"mention hashtag\" rel=\"tag\">#<span>consapevolezza</span></a> al rischio e alla <a href=\"https://mastodon.bida.im/tags/cultura\" class=\"mention hashtag\" rel=\"tag\">#<span>cultura</span></a> <a href=\"https://mastodon.bida.im/tags/hacker\" class=\"mention hashtag\" rel=\"tag\">#<span>hacker</span></a>, ha realizzato la prima Graphic Novel di una collana, dal titolo: “<a href=\"https://mastodon.bida.im/tags/BettiRHC\" class=\"mention hashtag\" rel=\"tag\">#<span>BettiRHC</span></a>”.</p><p>2022! </p><p>Una guerra silenziosa per la conquista dei dati fa la prima vittima. Un semplice rettore di <a href=\"https://mastodon.bida.im/tags/universit%C3%A0\" class=\"mention hashtag\" rel=\"tag\">#<span>università</span></a>, creatore di un <a href=\"https://mastodon.bida.im/tags/software\" class=\"mention hashtag\" rel=\"tag\">#<span>software</span></a> segreto in grado di cambiare radicalmente la <a href=\"https://mastodon.bida.im/tags/programmazione\" class=\"mention hashtag\" rel=\"tag\">#<span>programmazione</span></a>, muore in circostanze misteriose, lasciando nei guai la moglie Anna e la figlia Betti.<br /> <br />Per i pre ordini, potete registrarvi qua: <a href=\"https://lnkd.in/dfjWvQTc\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dfjWvQTc</span><span class=\"invisible\"></span></a></p><p>SAVE THE DATE: GENNAIO 2023</p><p><a href=\"https://mastodon.bida.im/tags/hackerhood\" class=\"mention hashtag\" rel=\"tag\">#<span>hackerhood</span></a> <a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/hacker\" class=\"mention hashtag\" rel=\"tag\">#<span>hacker</span></a> <a href=\"https://mastodon.bida.im/tags/community\" class=\"mention hashtag\" rel=\"tag\">#<span>community</span></a> <a href=\"https://mastodon.bida.im/tags/bughunting\" class=\"mention hashtag\" rel=\"tag\">#<span>bughunting</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a> <a href=\"https://mastodon.bida.im/tags/fumetto\" class=\"mention hashtag\" rel=\"tag\">#<span>fumetto</span></a> <a href=\"https://mastodon.bida.im/tags/consapevolezza\" class=\"mention hashtag\" rel=\"tag\">#<span>consapevolezza</span></a> <a href=\"https://mastodon.bida.im/tags/comics\" class=\"mention hashtag\" rel=\"tag\">#<span>comics</span></a></p>", "contentMap": { "it": "<p>Sta arrivando &quot;Betti&quot;! Il fumetto di Red Hot Cyber sulla Cybersecurity!</p><p>Red Hot Cyber, credendo che occorra trovare dei metodi non convenzionali per stimolare le persone verso la <a href=\"https://mastodon.bida.im/tags/consapevolezza\" class=\"mention hashtag\" rel=\"tag\">#<span>consapevolezza</span></a> al rischio e alla <a href=\"https://mastodon.bida.im/tags/cultura\" class=\"mention hashtag\" rel=\"tag\">#<span>cultura</span></a> <a href=\"https://mastodon.bida.im/tags/hacker\" class=\"mention hashtag\" rel=\"tag\">#<span>hacker</span></a>, ha realizzato la prima Graphic Novel di una collana, dal titolo: “<a href=\"https://mastodon.bida.im/tags/BettiRHC\" class=\"mention hashtag\" rel=\"tag\">#<span>BettiRHC</span></a>”.</p><p>2022! </p><p>Una guerra silenziosa per la conquista dei dati fa la prima vittima. Un semplice rettore di <a href=\"https://mastodon.bida.im/tags/universit%C3%A0\" class=\"mention hashtag\" rel=\"tag\">#<span>università</span></a>, creatore di un <a href=\"https://mastodon.bida.im/tags/software\" class=\"mention hashtag\" rel=\"tag\">#<span>software</span></a> segreto in grado di cambiare radicalmente la <a href=\"https://mastodon.bida.im/tags/programmazione\" class=\"mention hashtag\" rel=\"tag\">#<span>programmazione</span></a>, muore in circostanze misteriose, lasciando nei guai la moglie Anna e la figlia Betti.<br /> <br />Per i pre ordini, potete registrarvi qua: <a href=\"https://lnkd.in/dfjWvQTc\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dfjWvQTc</span><span class=\"invisible\"></span></a></p><p>SAVE THE DATE: GENNAIO 2023</p><p><a href=\"https://mastodon.bida.im/tags/hackerhood\" class=\"mention hashtag\" rel=\"tag\">#<span>hackerhood</span></a> <a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/hacker\" class=\"mention hashtag\" rel=\"tag\">#<span>hacker</span></a> <a href=\"https://mastodon.bida.im/tags/community\" class=\"mention hashtag\" rel=\"tag\">#<span>community</span></a> <a href=\"https://mastodon.bida.im/tags/bughunting\" class=\"mention hashtag\" rel=\"tag\">#<span>bughunting</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a> <a href=\"https://mastodon.bida.im/tags/fumetto\" class=\"mention hashtag\" rel=\"tag\">#<span>fumetto</span></a> <a href=\"https://mastodon.bida.im/tags/consapevolezza\" class=\"mention hashtag\" rel=\"tag\">#<span>consapevolezza</span></a> <a href=\"https://mastodon.bida.im/tags/comics\" class=\"mention hashtag\" rel=\"tag\">#<span>comics</span></a></p>" }, "attachment": [ { "type": "Document", "mediaType": "image/jpeg", "url": "https://mastodon.bida.im/system/media_attachments/files/109/303/215/067/177/127/original/e0aca790b4a9a053.jpg", "name": null, "blurhash": "UBQcn{iw_3x^9FIVD%%24TMw00%N9FIVD%xa", "width": 1080, "height": 1091 } ], "tag": [ { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/consapevolezza", "name": "#consapevolezza" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cultura", "name": "#cultura" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/hacker", "name": "#hacker" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/BettiRHC", "name": "#BettiRHC" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/universit%C3%A0", "name": "#università" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/software", "name": "#software" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/programmazione", "name": "#programmazione" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/hackerhood", "name": "#hackerhood" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/redhotcyber", "name": "#redhotcyber" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/ethicalhacking", "name": "#ethicalhacking" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/hacking", "name": "#hacking" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/community", "name": "#community" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/bughunting", "name": "#bughunting" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybersecurity", "name": "#cybersecurity" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/infosecurity", "name": "#infosecurity" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/fumetto", "name": "#fumetto" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/comics", "name": "#comics" } ], "replies": { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109303219290559688/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://mastodon.bida.im/users/redhotcyber/statuses/109303219290559688/replies?only_other_accounts=true&page=true", "partOf": "https://mastodon.bida.im/users/redhotcyber/statuses/109303219290559688/replies", "items": [] } } } }, { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109303211797231515/activity", "type": "Create", "actor": "https://mastodon.bida.im/users/redhotcyber", "published": "2022-11-07T15:24:12Z", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://mastodon.bida.im/users/redhotcyber/followers" ], "object": { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109303211797231515", "type": "Note", "summary": null, "inReplyTo": null, "published": "2022-11-07T15:24:12Z", "url": "https://mastodon.bida.im/@redhotcyber/109303211797231515", "attributedTo": "https://mastodon.bida.im/users/redhotcyber", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://mastodon.bida.im/users/redhotcyber/followers" ], "sensitive": false, "atomUri": "https://mastodon.bida.im/users/redhotcyber/statuses/109303211797231515", "inReplyToAtomUri": null, "conversation": "tag:mastodon.bida.im,2022-11-07:objectId=41493483:objectType=Conversation", "content": "<p>Revil ritorna e pubblica un Meme. Su “happy blog” la rivendicazione dell’attacco a Mediabank. Facciamo un po’ di storia</p><p>La famosa cybergang <a href=\"https://mastodon.bida.im/tags/REvil\" class=\"mention hashtag\" rel=\"tag\">#<span>REvil</span></a>, della quale abbiamo parlato moltissimo nel 2021, che fece conoscere ai più il mondo del <a href=\"https://mastodon.bida.im/tags/ransomware\" class=\"mention hashtag\" rel=\"tag\">#<span>ransomware</span></a> con l’attacco distribuito a <a href=\"https://mastodon.bida.im/tags/Kaseya\" class=\"mention hashtag\" rel=\"tag\">#<span>Kaseya</span></a>, in modo intermittente pubblica nuove <a href=\"https://mastodon.bida.im/tags/vittime\" class=\"mention hashtag\" rel=\"tag\">#<span>vittime</span></a> sul suo data leak site (<a href=\"https://mastodon.bida.im/tags/DLS\" class=\"mention hashtag\" rel=\"tag\">#<span>DLS</span></a>), chiamato in modo scherzoso “<a href=\"https://mastodon.bida.im/tags/happyblog\" class=\"mention hashtag\" rel=\"tag\">#<span>happyblog</span></a>”.</p><p>Nell&#39;articolo, ripercorreremo la <a href=\"https://mastodon.bida.im/tags/storia\" class=\"mention hashtag\" rel=\"tag\">#<span>storia</span></a> di questa celebre <a href=\"https://mastodon.bida.im/tags/cybergang\" class=\"mention hashtag\" rel=\"tag\">#<span>cybergang</span></a>, e il suo culmine, quando colpì migliaia di aziende con un <a href=\"https://mastodon.bida.im/tags/ransomware\" class=\"mention hashtag\" rel=\"tag\">#<span>ransomware</span></a> <a href=\"https://mastodon.bida.im/tags/distribuito\" class=\"mention hashtag\" rel=\"tag\">#<span>distribuito</span></a> contenuto all&#39;interno degli aggiornamenti del software Kaseya chiedendo 70 milioni di dollari come riscatto.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/d4--A8i7\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/d4--A8i7</span><span class=\"invisible\"></span></a></p>", "contentMap": { "it": "<p>Revil ritorna e pubblica un Meme. Su “happy blog” la rivendicazione dell’attacco a Mediabank. Facciamo un po’ di storia</p><p>La famosa cybergang <a href=\"https://mastodon.bida.im/tags/REvil\" class=\"mention hashtag\" rel=\"tag\">#<span>REvil</span></a>, della quale abbiamo parlato moltissimo nel 2021, che fece conoscere ai più il mondo del <a href=\"https://mastodon.bida.im/tags/ransomware\" class=\"mention hashtag\" rel=\"tag\">#<span>ransomware</span></a> con l’attacco distribuito a <a href=\"https://mastodon.bida.im/tags/Kaseya\" class=\"mention hashtag\" rel=\"tag\">#<span>Kaseya</span></a>, in modo intermittente pubblica nuove <a href=\"https://mastodon.bida.im/tags/vittime\" class=\"mention hashtag\" rel=\"tag\">#<span>vittime</span></a> sul suo data leak site (<a href=\"https://mastodon.bida.im/tags/DLS\" class=\"mention hashtag\" rel=\"tag\">#<span>DLS</span></a>), chiamato in modo scherzoso “<a href=\"https://mastodon.bida.im/tags/happyblog\" class=\"mention hashtag\" rel=\"tag\">#<span>happyblog</span></a>”.</p><p>Nell&#39;articolo, ripercorreremo la <a href=\"https://mastodon.bida.im/tags/storia\" class=\"mention hashtag\" rel=\"tag\">#<span>storia</span></a> di questa celebre <a href=\"https://mastodon.bida.im/tags/cybergang\" class=\"mention hashtag\" rel=\"tag\">#<span>cybergang</span></a>, e il suo culmine, quando colpì migliaia di aziende con un <a href=\"https://mastodon.bida.im/tags/ransomware\" class=\"mention hashtag\" rel=\"tag\">#<span>ransomware</span></a> <a href=\"https://mastodon.bida.im/tags/distribuito\" class=\"mention hashtag\" rel=\"tag\">#<span>distribuito</span></a> contenuto all&#39;interno degli aggiornamenti del software Kaseya chiedendo 70 milioni di dollari come riscatto.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/d4--A8i7\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/d4--A8i7</span><span class=\"invisible\"></span></a></p>" }, "attachment": [ { "type": "Document", "mediaType": "image/jpeg", "url": "https://mastodon.bida.im/system/media_attachments/files/109/303/209/053/010/208/original/2362444dc19ec65b.jpg", "name": null, "blurhash": "UMC~uG9xSd-nJEs:t7oe1P?FsSE2$xM~ozs.", "width": 661, "height": 661 } ], "tag": [ { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/revil", "name": "#revil" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/ransomware", "name": "#ransomware" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/kaseya", "name": "#kaseya" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/vittime", "name": "#vittime" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/dls", "name": "#dls" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/happyblog", "name": "#happyblog" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/storia", "name": "#storia" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/Cybergang", "name": "#Cybergang" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/distribuito", "name": "#distribuito" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/redhotcyber", "name": "#redhotcyber" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/dataprotection", "name": "#dataprotection" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/hacking", "name": "#hacking" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybersecurity", "name": "#cybersecurity" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybercrime", "name": "#cybercrime" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/CyberSecurityAwareness", "name": "#CyberSecurityAwareness" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybersecuritytraining", "name": "#cybersecuritytraining" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/CyberSecurityNews", "name": "#CyberSecurityNews" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/infosecurity", "name": "#infosecurity" } ], "replies": { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109303211797231515/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://mastodon.bida.im/users/redhotcyber/statuses/109303211797231515/replies?only_other_accounts=true&page=true", "partOf": "https://mastodon.bida.im/users/redhotcyber/statuses/109303211797231515/replies", "items": [] } } } }, { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109302232103844428/activity", "type": "Create", "actor": "https://mastodon.bida.im/users/redhotcyber", "published": "2022-11-07T11:15:03Z", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://mastodon.bida.im/users/redhotcyber/followers" ], "object": { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109302232103844428", "type": "Note", "summary": null, "inReplyTo": null, "published": "2022-11-07T11:15:03Z", "url": "https://mastodon.bida.im/@redhotcyber/109302232103844428", "attributedTo": "https://mastodon.bida.im/users/redhotcyber", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://mastodon.bida.im/users/redhotcyber/followers" ], "sensitive": false, "atomUri": "https://mastodon.bida.im/users/redhotcyber/statuses/109302232103844428", "inReplyToAtomUri": null, "conversation": "tag:mastodon.bida.im,2022-11-07:objectId=41477936:objectType=Conversation", "content": "<p>70.000 nuovi dati personali di italiani in vendita nelle underground. Nessuna corrispondenza con gli ultimi leak</p><p>Abbiamo fatto delle correlazioni con altri campioni di <a href=\"https://mastodon.bida.im/tags/dati\" class=\"mention hashtag\" rel=\"tag\">#<span>dati</span></a> in vendita nelle <a href=\"https://mastodon.bida.im/tags/underground\" class=\"mention hashtag\" rel=\"tag\">#<span>underground</span></a>, come le 35 milioni di transazioni relative all&#39;e-commerce violato e il samples proveniente dal forum <a href=\"https://mastodon.bida.im/tags/XSS\" class=\"mention hashtag\" rel=\"tag\">#<span>XSS</span></a> che mette in vendita informazioni <a href=\"https://mastodon.bida.im/tags/Forex\" class=\"mention hashtag\" rel=\"tag\">#<span>Forex</span></a> <a href=\"https://mastodon.bida.im/tags/Crypto\" class=\"mention hashtag\" rel=\"tag\">#<span>Crypto</span></a> lead/Database per 3000 dollari.</p><p>Tali dati sembrano non essere afferenti a tali samples.</p><p>Pertanto la domanda sorge spontanea: chi ancora non ha i propri dati in vendita o pubblicati nelle underground?</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dFw3CGzx\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dFw3CGzx</span><span class=\"invisible\"></span></a></p>", "contentMap": { "it": "<p>70.000 nuovi dati personali di italiani in vendita nelle underground. Nessuna corrispondenza con gli ultimi leak</p><p>Abbiamo fatto delle correlazioni con altri campioni di <a href=\"https://mastodon.bida.im/tags/dati\" class=\"mention hashtag\" rel=\"tag\">#<span>dati</span></a> in vendita nelle <a href=\"https://mastodon.bida.im/tags/underground\" class=\"mention hashtag\" rel=\"tag\">#<span>underground</span></a>, come le 35 milioni di transazioni relative all&#39;e-commerce violato e il samples proveniente dal forum <a href=\"https://mastodon.bida.im/tags/XSS\" class=\"mention hashtag\" rel=\"tag\">#<span>XSS</span></a> che mette in vendita informazioni <a href=\"https://mastodon.bida.im/tags/Forex\" class=\"mention hashtag\" rel=\"tag\">#<span>Forex</span></a> <a href=\"https://mastodon.bida.im/tags/Crypto\" class=\"mention hashtag\" rel=\"tag\">#<span>Crypto</span></a> lead/Database per 3000 dollari.</p><p>Tali dati sembrano non essere afferenti a tali samples.</p><p>Pertanto la domanda sorge spontanea: chi ancora non ha i propri dati in vendita o pubblicati nelle underground?</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dFw3CGzx\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dFw3CGzx</span><span class=\"invisible\"></span></a></p>" }, "attachment": [ { "type": "Document", "mediaType": "image/jpeg", "url": "https://mastodon.bida.im/system/media_attachments/files/109/302/231/285/961/713/original/e0e58d25a3b63fc6.jpeg", "name": null, "blurhash": "UsKnbsXRITWB~qW.M_WCD%WBRkafIUoLWBay", "width": 800, "height": 480 } ], "tag": [ { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/dati", "name": "#dati" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/underground", "name": "#underground" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/xss", "name": "#xss" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/forex", "name": "#forex" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/crypto", "name": "#crypto" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/redhotcyber", "name": "#redhotcyber" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/informationsecurity", "name": "#informationsecurity" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/ethicalhacking", "name": "#ethicalhacking" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/dataprotection", "name": "#dataprotection" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/hacking", "name": "#hacking" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybersecurity", "name": "#cybersecurity" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybercrime", "name": "#cybercrime" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/CyberSecurityAwareness", "name": "#CyberSecurityAwareness" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybersecuritytraining", "name": "#cybersecuritytraining" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/CyberSecurityNews", "name": "#CyberSecurityNews" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/privacy", "name": "#privacy" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/infosecurity", "name": "#infosecurity" } ], "replies": { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109302232103844428/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://mastodon.bida.im/users/redhotcyber/statuses/109302232103844428/replies?only_other_accounts=true&page=true", "partOf": "https://mastodon.bida.im/users/redhotcyber/statuses/109302232103844428/replies", "items": [] } } } }, { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109302228550008372/activity", "type": "Create", "actor": "https://mastodon.bida.im/users/redhotcyber", "published": "2022-11-07T11:14:09Z", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://mastodon.bida.im/users/redhotcyber/followers" ], "object": { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109302228550008372", "type": "Note", "summary": null, "inReplyTo": null, "published": "2022-11-07T11:14:09Z", "url": "https://mastodon.bida.im/@redhotcyber/109302228550008372", "attributedTo": "https://mastodon.bida.im/users/redhotcyber", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://mastodon.bida.im/users/redhotcyber/followers" ], "sensitive": false, "atomUri": "https://mastodon.bida.im/users/redhotcyber/statuses/109302228550008372", "inReplyToAtomUri": null, "conversation": "tag:mastodon.bida.im,2022-11-07:objectId=41477884:objectType=Conversation", "content": "<p>L’ufficio federale della Germania riporta che le minacce informatiche sono “più alte che mai”</p><p>L’Ufficio <a href=\"https://mastodon.bida.im/tags/federale\" class=\"mention hashtag\" rel=\"tag\">#<span>federale</span></a> tedesco per la sicurezza <a href=\"https://mastodon.bida.im/tags/informatica\" class=\"mention hashtag\" rel=\"tag\">#<span>informatica</span></a> (<a href=\"https://mastodon.bida.im/tags/BSI\" class=\"mention hashtag\" rel=\"tag\">#<span>BSI</span></a>) ha avvertito che il <a href=\"https://mastodon.bida.im/tags/ransomware\" class=\"mention hashtag\" rel=\"tag\">#<span>ransomware</span></a>, gli attacchi <a href=\"https://mastodon.bida.im/tags/informatici\" class=\"mention hashtag\" rel=\"tag\">#<span>informatici</span></a> a sfondo politico e altre minacce alla sicurezza tedesca sono “più alte che mai”.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/d45C_KUj\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/d45C_KUj</span><span class=\"invisible\"></span></a></p>", "contentMap": { "it": "<p>L’ufficio federale della Germania riporta che le minacce informatiche sono “più alte che mai”</p><p>L’Ufficio <a href=\"https://mastodon.bida.im/tags/federale\" class=\"mention hashtag\" rel=\"tag\">#<span>federale</span></a> tedesco per la sicurezza <a href=\"https://mastodon.bida.im/tags/informatica\" class=\"mention hashtag\" rel=\"tag\">#<span>informatica</span></a> (<a href=\"https://mastodon.bida.im/tags/BSI\" class=\"mention hashtag\" rel=\"tag\">#<span>BSI</span></a>) ha avvertito che il <a href=\"https://mastodon.bida.im/tags/ransomware\" class=\"mention hashtag\" rel=\"tag\">#<span>ransomware</span></a>, gli attacchi <a href=\"https://mastodon.bida.im/tags/informatici\" class=\"mention hashtag\" rel=\"tag\">#<span>informatici</span></a> a sfondo politico e altre minacce alla sicurezza tedesca sono “più alte che mai”.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/d45C_KUj\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/d45C_KUj</span><span class=\"invisible\"></span></a></p>" }, "attachment": [ { "type": "Document", "mediaType": "image/jpeg", "url": "https://mastodon.bida.im/system/media_attachments/files/109/302/228/177/157/561/original/df6309d5fed8e4fe.jpeg", "name": null, "blurhash": "UNGb3VEhiHRiEMWBW.jF01oI%gozV?oLs:e-", "width": 800, "height": 480 } ], "tag": [ { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/federale", "name": "#federale" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/informatica", "name": "#informatica" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/bsi", "name": "#bsi" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/ransomware", "name": "#ransomware" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/informatici", "name": "#informatici" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/redhotcyber", "name": "#redhotcyber" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/informationsecurity", "name": "#informationsecurity" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/ethicalhacking", "name": "#ethicalhacking" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/dataprotection", "name": "#dataprotection" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/hacking", "name": "#hacking" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybersecurity", "name": "#cybersecurity" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybercrime", "name": "#cybercrime" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/CyberSecurityAwareness", "name": "#CyberSecurityAwareness" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybersecuritytraining", "name": "#cybersecuritytraining" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/CyberSecurityNews", "name": "#CyberSecurityNews" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/privacy", "name": "#privacy" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/infosecurity", "name": "#infosecurity" } ], "replies": { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109302228550008372/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://mastodon.bida.im/users/redhotcyber/statuses/109302228550008372/replies?only_other_accounts=true&page=true", "partOf": "https://mastodon.bida.im/users/redhotcyber/statuses/109302228550008372/replies", "items": [] } } } }, { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109302225646611168/activity", "type": "Create", "actor": "https://mastodon.bida.im/users/redhotcyber", "published": "2022-11-07T11:13:25Z", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://mastodon.bida.im/users/redhotcyber/followers" ], "object": { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109302225646611168", "type": "Note", "summary": null, "inReplyTo": null, "published": "2022-11-07T11:13:25Z", "url": "https://mastodon.bida.im/@redhotcyber/109302225646611168", "attributedTo": "https://mastodon.bida.im/users/redhotcyber", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://mastodon.bida.im/users/redhotcyber/followers" ], "sensitive": false, "atomUri": "https://mastodon.bida.im/users/redhotcyber/statuses/109302225646611168", "inReplyToAtomUri": null, "conversation": "tag:mastodon.bida.im,2022-11-07:objectId=41477821:objectType=Conversation", "content": "<p>Ora il riscatto arriva nei pacchetti DDoS. L’evoluzione di Fodcha tra estorsione e razzismo</p><p>Una nuova <a href=\"https://mastodon.bida.im/tags/botnet\" class=\"mention hashtag\" rel=\"tag\">#<span>botnet</span></a> scoperta all’inizio del 2022 da parte del laboratorio di Threat <a href=\"https://mastodon.bida.im/tags/Intelligence\" class=\"mention hashtag\" rel=\"tag\">#<span>Intelligence</span></a> di <a href=\"https://mastodon.bida.im/tags/360NetLabs\" class=\"mention hashtag\" rel=\"tag\">#<span>360NetLabs</span></a> si evolve massicciamente.</p><p>L’evoluzione di <a href=\"https://mastodon.bida.im/tags/Fodcha\" class=\"mention hashtag\" rel=\"tag\">#<span>Fodcha</span></a> è caratterizzata da una maggiore protezione dei <a href=\"https://mastodon.bida.im/tags/server\" class=\"mention hashtag\" rel=\"tag\">#<span>server</span></a> <a href=\"https://mastodon.bida.im/tags/C2\" class=\"mention hashtag\" rel=\"tag\">#<span>C2</span></a>, l’aggiunta di una richiesta di <a href=\"https://mastodon.bida.im/tags/riscatto\" class=\"mention hashtag\" rel=\"tag\">#<span>riscatto</span></a> all&#39;interno dei pacchetti DDoS ed una componente razzista.</p><p>A cura di Eros Capobianco.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/daPcusi4\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/daPcusi4</span><span class=\"invisible\"></span></a></p>", "contentMap": { "it": "<p>Ora il riscatto arriva nei pacchetti DDoS. L’evoluzione di Fodcha tra estorsione e razzismo</p><p>Una nuova <a href=\"https://mastodon.bida.im/tags/botnet\" class=\"mention hashtag\" rel=\"tag\">#<span>botnet</span></a> scoperta all’inizio del 2022 da parte del laboratorio di Threat <a href=\"https://mastodon.bida.im/tags/Intelligence\" class=\"mention hashtag\" rel=\"tag\">#<span>Intelligence</span></a> di <a href=\"https://mastodon.bida.im/tags/360NetLabs\" class=\"mention hashtag\" rel=\"tag\">#<span>360NetLabs</span></a> si evolve massicciamente.</p><p>L’evoluzione di <a href=\"https://mastodon.bida.im/tags/Fodcha\" class=\"mention hashtag\" rel=\"tag\">#<span>Fodcha</span></a> è caratterizzata da una maggiore protezione dei <a href=\"https://mastodon.bida.im/tags/server\" class=\"mention hashtag\" rel=\"tag\">#<span>server</span></a> <a href=\"https://mastodon.bida.im/tags/C2\" class=\"mention hashtag\" rel=\"tag\">#<span>C2</span></a>, l’aggiunta di una richiesta di <a href=\"https://mastodon.bida.im/tags/riscatto\" class=\"mention hashtag\" rel=\"tag\">#<span>riscatto</span></a> all&#39;interno dei pacchetti DDoS ed una componente razzista.</p><p>A cura di Eros Capobianco.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/daPcusi4\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/daPcusi4</span><span class=\"invisible\"></span></a></p>" }, "attachment": [ { "type": "Document", "mediaType": "image/jpeg", "url": "https://mastodon.bida.im/system/media_attachments/files/109/302/224/698/271/357/original/51d7ed8682095efa.jpeg", "name": null, "blurhash": "UrBERVWBsjj?tmWAoIbIMaf6NLWXMwj]WYoJ", "width": 800, "height": 480 } ], "tag": [ { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/botnet", "name": "#botnet" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/intelligence", "name": "#intelligence" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/360NetLabs", "name": "#360NetLabs" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/Fodcha", "name": "#Fodcha" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/server", "name": "#server" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/c2", "name": "#c2" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/riscatto", "name": "#riscatto" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/redhotcyber", "name": "#redhotcyber" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/informationsecurity", "name": "#informationsecurity" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/ethicalhacking", "name": "#ethicalhacking" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/dataprotection", "name": "#dataprotection" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/hacking", "name": "#hacking" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybersecurity", "name": "#cybersecurity" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybercrime", "name": "#cybercrime" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/CyberSecurityAwareness", "name": "#CyberSecurityAwareness" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybersecuritytraining", "name": "#cybersecuritytraining" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/CyberSecurityNews", "name": "#CyberSecurityNews" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/privacy", "name": "#privacy" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/infosecurity", "name": "#infosecurity" } ], "replies": { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109302225646611168/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://mastodon.bida.im/users/redhotcyber/statuses/109302225646611168/replies?only_other_accounts=true&page=true", "partOf": "https://mastodon.bida.im/users/redhotcyber/statuses/109302225646611168/replies", "items": [] } } } }, { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109301236780274962/activity", "type": "Create", "actor": "https://mastodon.bida.im/users/redhotcyber", "published": "2022-11-07T07:01:56Z", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://mastodon.bida.im/users/redhotcyber/followers" ], "object": { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109301236780274962", "type": "Note", "summary": null, "inReplyTo": null, "published": "2022-11-07T07:01:56Z", "url": "https://mastodon.bida.im/@redhotcyber/109301236780274962", "attributedTo": "https://mastodon.bida.im/users/redhotcyber", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://mastodon.bida.im/users/redhotcyber/followers" ], "sensitive": false, "atomUri": "https://mastodon.bida.im/users/redhotcyber/statuses/109301236780274962", "inReplyToAtomUri": null, "conversation": "tag:mastodon.bida.im,2022-11-07:objectId=41462748:objectType=Conversation", "content": "<p>E se le chat tra vittima e gang ransomware venissero pubblicate? Lockbit: “è una introduzione dal programma idee geniali”</p><p>Come sappiamo, le <a href=\"https://mastodon.bida.im/tags/cybergang\" class=\"mention hashtag\" rel=\"tag\">#<span>cybergang</span></a> <a href=\"https://mastodon.bida.im/tags/ransomware\" class=\"mention hashtag\" rel=\"tag\">#<span>ransomware</span></a> evolvono costantemente le loro tecniche, tattiche e procedure (<a href=\"https://mastodon.bida.im/tags/TTP\" class=\"mention hashtag\" rel=\"tag\">#<span>TTP</span></a>) e non ultime le <a href=\"https://mastodon.bida.im/tags/tattiche\" class=\"mention hashtag\" rel=\"tag\">#<span>tattiche</span></a> di <a href=\"https://mastodon.bida.im/tags/estorsione\" class=\"mention hashtag\" rel=\"tag\">#<span>estorsione</span></a> consentono di aumentare la <a href=\"https://mastodon.bida.im/tags/pressione\" class=\"mention hashtag\" rel=\"tag\">#<span>pressione</span></a> verso le aziende violate in modo da consentire una <a href=\"https://mastodon.bida.im/tags/monetizzazione\" class=\"mention hashtag\" rel=\"tag\">#<span>monetizzazione</span></a> anche nelle situazioni più difficili.</p><p>Abbiamo chiesto a LockBit se questa introduzione fosse il frutto di qualche &quot;idea geniale&quot; ed in effetti è stato proprio così.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dWSYZBDG\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dWSYZBDG</span><span class=\"invisible\"></span></a></p>", "contentMap": { "it": "<p>E se le chat tra vittima e gang ransomware venissero pubblicate? Lockbit: “è una introduzione dal programma idee geniali”</p><p>Come sappiamo, le <a href=\"https://mastodon.bida.im/tags/cybergang\" class=\"mention hashtag\" rel=\"tag\">#<span>cybergang</span></a> <a href=\"https://mastodon.bida.im/tags/ransomware\" class=\"mention hashtag\" rel=\"tag\">#<span>ransomware</span></a> evolvono costantemente le loro tecniche, tattiche e procedure (<a href=\"https://mastodon.bida.im/tags/TTP\" class=\"mention hashtag\" rel=\"tag\">#<span>TTP</span></a>) e non ultime le <a href=\"https://mastodon.bida.im/tags/tattiche\" class=\"mention hashtag\" rel=\"tag\">#<span>tattiche</span></a> di <a href=\"https://mastodon.bida.im/tags/estorsione\" class=\"mention hashtag\" rel=\"tag\">#<span>estorsione</span></a> consentono di aumentare la <a href=\"https://mastodon.bida.im/tags/pressione\" class=\"mention hashtag\" rel=\"tag\">#<span>pressione</span></a> verso le aziende violate in modo da consentire una <a href=\"https://mastodon.bida.im/tags/monetizzazione\" class=\"mention hashtag\" rel=\"tag\">#<span>monetizzazione</span></a> anche nelle situazioni più difficili.</p><p>Abbiamo chiesto a LockBit se questa introduzione fosse il frutto di qualche &quot;idea geniale&quot; ed in effetti è stato proprio così.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dWSYZBDG\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dWSYZBDG</span><span class=\"invisible\"></span></a></p>" }, "attachment": [ { "type": "Document", "mediaType": "image/jpeg", "url": "https://mastodon.bida.im/system/media_attachments/files/109/301/235/560/561/283/original/1248664f5c0dea3f.jpg", "name": null, "blurhash": "UQA+~qJ,I:r?RPj[Sgjt0e#-t7S#%MWVr?f6", "width": 662, "height": 662 } ], "tag": [ { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/Cybergang", "name": "#Cybergang" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/ransomware", "name": "#ransomware" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/ttp", "name": "#ttp" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/tattiche", "name": "#tattiche" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/estorsione", "name": "#estorsione" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/pressione", "name": "#pressione" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/monetizzazione", "name": "#monetizzazione" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/redhotcyber", "name": "#redhotcyber" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/informationsecurity", "name": "#informationsecurity" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/ethicalhacking", "name": "#ethicalhacking" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/dataprotection", "name": "#dataprotection" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/hacking", "name": "#hacking" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybersecurity", "name": "#cybersecurity" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybercrime", "name": "#cybercrime" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/CyberSecurityAwareness", "name": "#CyberSecurityAwareness" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybersecuritytraining", "name": "#cybersecuritytraining" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/CyberSecurityNews", "name": "#CyberSecurityNews" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/privacy", "name": "#privacy" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/infosecurity", "name": "#infosecurity" } ], "replies": { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109301236780274962/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://mastodon.bida.im/users/redhotcyber/statuses/109301236780274962/replies?only_other_accounts=true&page=true", "partOf": "https://mastodon.bida.im/users/redhotcyber/statuses/109301236780274962/replies", "items": [] } } } }, { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109301230212808154/activity", "type": "Create", "actor": "https://mastodon.bida.im/users/redhotcyber", "published": "2022-11-07T07:00:16Z", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://mastodon.bida.im/users/redhotcyber/followers" ], "object": { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109301230212808154", "type": "Note", "summary": null, "inReplyTo": null, "published": "2022-11-07T07:00:16Z", "url": "https://mastodon.bida.im/@redhotcyber/109301230212808154", "attributedTo": "https://mastodon.bida.im/users/redhotcyber", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://mastodon.bida.im/users/redhotcyber/followers" ], "sensitive": false, "atomUri": "https://mastodon.bida.im/users/redhotcyber/statuses/109301230212808154", "inReplyToAtomUri": null, "conversation": "tag:mastodon.bida.im,2022-11-07:objectId=41462660:objectType=Conversation", "content": "<p>Microsoft risolve un bug critico di Remote Code Execution su Azure Cosmos DB</p><p>Gli analisti di <a href=\"https://mastodon.bida.im/tags/OrcaSecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>OrcaSecurity</span></a> hanno scoperto una vulnerabilità critica che interessa <a href=\"https://mastodon.bida.im/tags/Azure\" class=\"mention hashtag\" rel=\"tag\">#<span>Azure</span></a> <a href=\"https://mastodon.bida.im/tags/CosmosDB\" class=\"mention hashtag\" rel=\"tag\">#<span>CosmosDB</span></a>.</p><p>Il problema, soprannominato <a href=\"https://mastodon.bida.im/tags/CosMiss\" class=\"mention hashtag\" rel=\"tag\">#<span>CosMiss</span></a> dai <a href=\"https://mastodon.bida.im/tags/ricercatori\" class=\"mention hashtag\" rel=\"tag\">#<span>ricercatori</span></a>, consentiva l’accesso non autorizzato in lettura e scrittura ai container, nonché l’esecuzione arbitraria di codice.</p><p>La <a href=\"https://mastodon.bida.im/tags/vulnerabilit%C3%A0\" class=\"mention hashtag\" rel=\"tag\">#<span>vulnerabilità</span></a> è correlata a Jupyter Notebook per Azure Cosmos DB, che si integra con gli account Azure e Azure Cosmos DB per semplificare l’analisi e la visualizzazione dei <a href=\"https://mastodon.bida.im/tags/dati\" class=\"mention hashtag\" rel=\"tag\">#<span>dati</span></a> <a href=\"https://mastodon.bida.im/tags/NoSQL\" class=\"mention hashtag\" rel=\"tag\">#<span>NoSQL</span></a> e dei risultati delle query.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/d9Jem4dF\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/d9Jem4dF</span><span class=\"invisible\"></span></a></p>", "contentMap": { "it": "<p>Microsoft risolve un bug critico di Remote Code Execution su Azure Cosmos DB</p><p>Gli analisti di <a href=\"https://mastodon.bida.im/tags/OrcaSecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>OrcaSecurity</span></a> hanno scoperto una vulnerabilità critica che interessa <a href=\"https://mastodon.bida.im/tags/Azure\" class=\"mention hashtag\" rel=\"tag\">#<span>Azure</span></a> <a href=\"https://mastodon.bida.im/tags/CosmosDB\" class=\"mention hashtag\" rel=\"tag\">#<span>CosmosDB</span></a>.</p><p>Il problema, soprannominato <a href=\"https://mastodon.bida.im/tags/CosMiss\" class=\"mention hashtag\" rel=\"tag\">#<span>CosMiss</span></a> dai <a href=\"https://mastodon.bida.im/tags/ricercatori\" class=\"mention hashtag\" rel=\"tag\">#<span>ricercatori</span></a>, consentiva l’accesso non autorizzato in lettura e scrittura ai container, nonché l’esecuzione arbitraria di codice.</p><p>La <a href=\"https://mastodon.bida.im/tags/vulnerabilit%C3%A0\" class=\"mention hashtag\" rel=\"tag\">#<span>vulnerabilità</span></a> è correlata a Jupyter Notebook per Azure Cosmos DB, che si integra con gli account Azure e Azure Cosmos DB per semplificare l’analisi e la visualizzazione dei <a href=\"https://mastodon.bida.im/tags/dati\" class=\"mention hashtag\" rel=\"tag\">#<span>dati</span></a> <a href=\"https://mastodon.bida.im/tags/NoSQL\" class=\"mention hashtag\" rel=\"tag\">#<span>NoSQL</span></a> e dei risultati delle query.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/d9Jem4dF\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/d9Jem4dF</span><span class=\"invisible\"></span></a></p>" }, "attachment": [ { "type": "Document", "mediaType": "image/jpeg", "url": "https://mastodon.bida.im/system/media_attachments/files/109/301/229/233/416/995/original/433ed0e6fca86919.jpg", "name": null, "blurhash": "U038@nj[D%j@WAfQj[f7D*fQWBazf5a{WBj[", "width": 1079, "height": 686 } ], "tag": [ { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/OrcaSecurity", "name": "#OrcaSecurity" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/azure", "name": "#azure" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cosmosdb", "name": "#cosmosdb" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/CosMiss", "name": "#CosMiss" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/ricercatori", "name": "#ricercatori" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/vulnerabilit%C3%A0", "name": "#vulnerabilità" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/dati", "name": "#dati" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/nosql", "name": "#nosql" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/redhotcyber", "name": "#redhotcyber" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/informationsecurity", "name": "#informationsecurity" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/ethicalhacking", "name": "#ethicalhacking" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/dataprotection", "name": "#dataprotection" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/hacking", "name": "#hacking" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybersecurity", "name": "#cybersecurity" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybercrime", "name": "#cybercrime" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/CyberSecurityAwareness", "name": "#CyberSecurityAwareness" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybersecuritytraining", "name": "#cybersecuritytraining" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/CyberSecurityNews", "name": "#CyberSecurityNews" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/privacy", "name": "#privacy" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/infosecurity", "name": "#infosecurity" } ], "replies": { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109301230212808154/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://mastodon.bida.im/users/redhotcyber/statuses/109301230212808154/replies?only_other_accounts=true&page=true", "partOf": "https://mastodon.bida.im/users/redhotcyber/statuses/109301230212808154/replies", "items": [] } } } }, { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109298364109199002/activity", "type": "Create", "actor": "https://mastodon.bida.im/users/redhotcyber", "published": "2022-11-06T18:51:22Z", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://mastodon.bida.im/users/redhotcyber/followers" ], "object": { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109298364109199002", "type": "Note", "summary": null, "inReplyTo": null, "published": "2022-11-06T18:51:22Z", "url": "https://mastodon.bida.im/@redhotcyber/109298364109199002", "attributedTo": "https://mastodon.bida.im/users/redhotcyber", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://mastodon.bida.im/users/redhotcyber/followers" ], "sensitive": false, "atomUri": "https://mastodon.bida.im/users/redhotcyber/statuses/109298364109199002", "inReplyToAtomUri": null, "conversation": "tag:mastodon.bida.im,2022-11-06:objectId=41428802:objectType=Conversation", "content": "<p>Un attacco alla supply chain blocca le ferrovie Danesi</p><p>Il <a href=\"https://mastodon.bida.im/tags/software\" class=\"mention hashtag\" rel=\"tag\">#<span>software</span></a> delle ferrovie danesi (<a href=\"https://mastodon.bida.im/tags/DSB\" class=\"mention hashtag\" rel=\"tag\">#<span>DSB</span></a>) di <a href=\"https://mastodon.bida.im/tags/Supeo\" class=\"mention hashtag\" rel=\"tag\">#<span>Supeo</span></a> ha subito un grave hack durante il fine settimana, bloccando i treni in tutto il paese da sabato, lo ha riportato Danmarks Radio.</p><p>Secondo quanto riferito, un attacco informatico ai <a href=\"https://mastodon.bida.im/tags/sistemi\" class=\"mention hashtag\" rel=\"tag\">#<span>sistemi</span></a> di un <a href=\"https://mastodon.bida.im/tags/appaltatore\" class=\"mention hashtag\" rel=\"tag\">#<span>appaltatore</span></a> <a href=\"https://mastodon.bida.im/tags/software\" class=\"mention hashtag\" rel=\"tag\">#<span>software</span></a> è stata la causa dell’interruzione dei treni.</p><p>Si noti che i malintenzionati hanno attaccato un programma utilizzato dai macchinisti per accedere a <a href=\"https://mastodon.bida.im/tags/informazioni\" class=\"mention hashtag\" rel=\"tag\">#<span>informazioni</span></a> riservate sulla ferrovia. </p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dXBFDTvG\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dXBFDTvG</span><span class=\"invisible\"></span></a></p>", "contentMap": { "it": "<p>Un attacco alla supply chain blocca le ferrovie Danesi</p><p>Il <a href=\"https://mastodon.bida.im/tags/software\" class=\"mention hashtag\" rel=\"tag\">#<span>software</span></a> delle ferrovie danesi (<a href=\"https://mastodon.bida.im/tags/DSB\" class=\"mention hashtag\" rel=\"tag\">#<span>DSB</span></a>) di <a href=\"https://mastodon.bida.im/tags/Supeo\" class=\"mention hashtag\" rel=\"tag\">#<span>Supeo</span></a> ha subito un grave hack durante il fine settimana, bloccando i treni in tutto il paese da sabato, lo ha riportato Danmarks Radio.</p><p>Secondo quanto riferito, un attacco informatico ai <a href=\"https://mastodon.bida.im/tags/sistemi\" class=\"mention hashtag\" rel=\"tag\">#<span>sistemi</span></a> di un <a href=\"https://mastodon.bida.im/tags/appaltatore\" class=\"mention hashtag\" rel=\"tag\">#<span>appaltatore</span></a> <a href=\"https://mastodon.bida.im/tags/software\" class=\"mention hashtag\" rel=\"tag\">#<span>software</span></a> è stata la causa dell’interruzione dei treni.</p><p>Si noti che i malintenzionati hanno attaccato un programma utilizzato dai macchinisti per accedere a <a href=\"https://mastodon.bida.im/tags/informazioni\" class=\"mention hashtag\" rel=\"tag\">#<span>informazioni</span></a> riservate sulla ferrovia. </p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dXBFDTvG\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dXBFDTvG</span><span class=\"invisible\"></span></a></p>" }, "attachment": [ { "type": "Document", "mediaType": "image/jpeg", "url": "https://mastodon.bida.im/system/media_attachments/files/109/298/363/965/278/618/original/dc26e4d176e7278a.jpg", "name": null, "blurhash": "UUEpj3VrRkt6GKWEs.WWtSt8WBjsI9ozj[WB", "width": 1079, "height": 718 } ], "tag": [ { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/software", "name": "#software" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/dsb", "name": "#dsb" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/Supeo", "name": "#Supeo" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/sistemi", "name": "#sistemi" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/appaltatore", "name": "#appaltatore" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/informazioni", "name": "#informazioni" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/redhotcyber", "name": "#redhotcyber" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/informationsecurity", "name": "#informationsecurity" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/ethicalhacking", "name": "#ethicalhacking" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/dataprotection", "name": "#dataprotection" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/hacking", "name": "#hacking" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybersecurity", "name": "#cybersecurity" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybercrime", "name": "#cybercrime" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/CyberSecurityAwareness", "name": "#CyberSecurityAwareness" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybersecuritytraining", "name": "#cybersecuritytraining" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/CyberSecurityNews", "name": "#CyberSecurityNews" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/privacy", "name": "#privacy" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/infosecurity", "name": "#infosecurity" } ], "replies": { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109298364109199002/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://mastodon.bida.im/users/redhotcyber/statuses/109298364109199002/replies?only_other_accounts=true&page=true", "partOf": "https://mastodon.bida.im/users/redhotcyber/statuses/109298364109199002/replies", "items": [] } } } }, { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109298361168777021/activity", "type": "Create", "actor": "https://mastodon.bida.im/users/redhotcyber", "published": "2022-11-06T18:50:37Z", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://mastodon.bida.im/users/redhotcyber/followers" ], "object": { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109298361168777021", "type": "Note", "summary": null, "inReplyTo": null, "published": "2022-11-06T18:50:37Z", "url": "https://mastodon.bida.im/@redhotcyber/109298361168777021", "attributedTo": "https://mastodon.bida.im/users/redhotcyber", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://mastodon.bida.im/users/redhotcyber/followers" ], "sensitive": false, "atomUri": "https://mastodon.bida.im/users/redhotcyber/statuses/109298361168777021", "inReplyToAtomUri": null, "conversation": "tag:mastodon.bida.im,2022-11-06:objectId=41428744:objectType=Conversation", "content": "<p>Un attacco alla supply chain blocca le ferrovie Danesi</p><p>Il <a href=\"https://mastodon.bida.im/tags/software\" class=\"mention hashtag\" rel=\"tag\">#<span>software</span></a> delle ferrovie danesi (<a href=\"https://mastodon.bida.im/tags/DSB\" class=\"mention hashtag\" rel=\"tag\">#<span>DSB</span></a>) di <a href=\"https://mastodon.bida.im/tags/Supeo\" class=\"mention hashtag\" rel=\"tag\">#<span>Supeo</span></a> ha subito un grave hack durante il fine settimana, bloccando i treni in tutto il paese da sabato, lo ha riportato Danmarks Radio.</p><p>Secondo quanto riferito, un attacco informatico ai <a href=\"https://mastodon.bida.im/tags/sistemi\" class=\"mention hashtag\" rel=\"tag\">#<span>sistemi</span></a> di un <a href=\"https://mastodon.bida.im/tags/appaltatore\" class=\"mention hashtag\" rel=\"tag\">#<span>appaltatore</span></a> <a href=\"https://mastodon.bida.im/tags/software\" class=\"mention hashtag\" rel=\"tag\">#<span>software</span></a> è stata la causa dell’interruzione dei treni.</p><p>Si noti che i malintenzionati hanno attaccato un programma utilizzato dai macchinisti per accedere a <a href=\"https://mastodon.bida.im/tags/informazioni\" class=\"mention hashtag\" rel=\"tag\">#<span>informazioni</span></a> riservate sulla ferrovia. </p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dXBFDTvG\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dXBFDTvG</span><span class=\"invisible\"></span></a></p>", "contentMap": { "it": "<p>Un attacco alla supply chain blocca le ferrovie Danesi</p><p>Il <a href=\"https://mastodon.bida.im/tags/software\" class=\"mention hashtag\" rel=\"tag\">#<span>software</span></a> delle ferrovie danesi (<a href=\"https://mastodon.bida.im/tags/DSB\" class=\"mention hashtag\" rel=\"tag\">#<span>DSB</span></a>) di <a href=\"https://mastodon.bida.im/tags/Supeo\" class=\"mention hashtag\" rel=\"tag\">#<span>Supeo</span></a> ha subito un grave hack durante il fine settimana, bloccando i treni in tutto il paese da sabato, lo ha riportato Danmarks Radio.</p><p>Secondo quanto riferito, un attacco informatico ai <a href=\"https://mastodon.bida.im/tags/sistemi\" class=\"mention hashtag\" rel=\"tag\">#<span>sistemi</span></a> di un <a href=\"https://mastodon.bida.im/tags/appaltatore\" class=\"mention hashtag\" rel=\"tag\">#<span>appaltatore</span></a> <a href=\"https://mastodon.bida.im/tags/software\" class=\"mention hashtag\" rel=\"tag\">#<span>software</span></a> è stata la causa dell’interruzione dei treni.</p><p>Si noti che i malintenzionati hanno attaccato un programma utilizzato dai macchinisti per accedere a <a href=\"https://mastodon.bida.im/tags/informazioni\" class=\"mention hashtag\" rel=\"tag\">#<span>informazioni</span></a> riservate sulla ferrovia. </p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dXBFDTvG\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dXBFDTvG</span><span class=\"invisible\"></span></a></p>" }, "attachment": [ { "type": "Document", "mediaType": "image/jpeg", "url": "https://mastodon.bida.im/system/media_attachments/files/109/298/360/529/317/885/original/04488598fd4ef56c.jpg", "name": null, "blurhash": "UbCHEFx]M{WqDiIAaKoeDNxt%MkC%Kx^NdM|", "width": 1079, "height": 661 } ], "tag": [ { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/software", "name": "#software" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/dsb", "name": "#dsb" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/Supeo", "name": "#Supeo" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/sistemi", "name": "#sistemi" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/appaltatore", "name": "#appaltatore" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/informazioni", "name": "#informazioni" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/redhotcyber", "name": "#redhotcyber" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/informationsecurity", "name": "#informationsecurity" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/ethicalhacking", "name": "#ethicalhacking" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/dataprotection", "name": "#dataprotection" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/hacking", "name": "#hacking" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybersecurity", "name": "#cybersecurity" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybercrime", "name": "#cybercrime" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/CyberSecurityAwareness", "name": "#CyberSecurityAwareness" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybersecuritytraining", "name": "#cybersecuritytraining" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/CyberSecurityNews", "name": "#CyberSecurityNews" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/privacy", "name": "#privacy" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/infosecurity", "name": "#infosecurity" } ], "replies": { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109298361168777021/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://mastodon.bida.im/users/redhotcyber/statuses/109298361168777021/replies?only_other_accounts=true&page=true", "partOf": "https://mastodon.bida.im/users/redhotcyber/statuses/109298361168777021/replies", "items": [] } } } }, { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109298358311645779/activity", "type": "Create", "actor": "https://mastodon.bida.im/users/redhotcyber", "published": "2022-11-06T18:49:54Z", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://mastodon.bida.im/users/redhotcyber/followers" ], "object": { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109298358311645779", "type": "Note", "summary": null, "inReplyTo": null, "published": "2022-11-06T18:49:54Z", "url": "https://mastodon.bida.im/@redhotcyber/109298358311645779", "attributedTo": "https://mastodon.bida.im/users/redhotcyber", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://mastodon.bida.im/users/redhotcyber/followers" ], "sensitive": false, "atomUri": "https://mastodon.bida.im/users/redhotcyber/statuses/109298358311645779", "inReplyToAtomUri": null, "conversation": "tag:mastodon.bida.im,2022-11-06:objectId=41428695:objectType=Conversation", "content": "<p>La “liberazione” di Twitter preoccupa, ma non ancora abbastanza</p><p>L’agorà digitale di <a href=\"https://mastodon.bida.im/tags/Twitter\" class=\"mention hashtag\" rel=\"tag\">#<span>Twitter</span></a> continua a far parlare di sé dopo la sua <a href=\"https://mastodon.bida.im/tags/liberazione\" class=\"mention hashtag\" rel=\"tag\">#<span>liberazione</span></a> a tal punto da impegnare l’Alto Commissario delle Nazioni Unite per i <a href=\"https://mastodon.bida.im/tags/diritti\" class=\"mention hashtag\" rel=\"tag\">#<span>diritti</span></a> <a href=\"https://mastodon.bida.im/tags/umani\" class=\"mention hashtag\" rel=\"tag\">#<span>umani</span></a> nello scrivere una lettera aperta indirizzata proprio a Elon <a href=\"https://mastodon.bida.im/tags/Musk\" class=\"mention hashtag\" rel=\"tag\">#<span>Musk</span></a>.</p><p>Eppure, il magnate ha già rassicurato che l’impegno di Twitter per la moderazione dei contenuti è inalterato, mentre le novità principali annunciate riguardano funzioni di <a href=\"https://mastodon.bida.im/tags/ricerca\" class=\"mention hashtag\" rel=\"tag\">#<span>ricerca</span></a> interna e un maggiore occhio di riguardo per la <a href=\"https://mastodon.bida.im/tags/monetizzazione\" class=\"mention hashtag\" rel=\"tag\">#<span>monetizzazione</span></a> dei contenuti per i <a href=\"https://mastodon.bida.im/tags/creator\" class=\"mention hashtag\" rel=\"tag\">#<span>creator</span></a>.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/d666Yrrv\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/d666Yrrv</span><span class=\"invisible\"></span></a></p>", "contentMap": { "it": "<p>La “liberazione” di Twitter preoccupa, ma non ancora abbastanza</p><p>L’agorà digitale di <a href=\"https://mastodon.bida.im/tags/Twitter\" class=\"mention hashtag\" rel=\"tag\">#<span>Twitter</span></a> continua a far parlare di sé dopo la sua <a href=\"https://mastodon.bida.im/tags/liberazione\" class=\"mention hashtag\" rel=\"tag\">#<span>liberazione</span></a> a tal punto da impegnare l’Alto Commissario delle Nazioni Unite per i <a href=\"https://mastodon.bida.im/tags/diritti\" class=\"mention hashtag\" rel=\"tag\">#<span>diritti</span></a> <a href=\"https://mastodon.bida.im/tags/umani\" class=\"mention hashtag\" rel=\"tag\">#<span>umani</span></a> nello scrivere una lettera aperta indirizzata proprio a Elon <a href=\"https://mastodon.bida.im/tags/Musk\" class=\"mention hashtag\" rel=\"tag\">#<span>Musk</span></a>.</p><p>Eppure, il magnate ha già rassicurato che l’impegno di Twitter per la moderazione dei contenuti è inalterato, mentre le novità principali annunciate riguardano funzioni di <a href=\"https://mastodon.bida.im/tags/ricerca\" class=\"mention hashtag\" rel=\"tag\">#<span>ricerca</span></a> interna e un maggiore occhio di riguardo per la <a href=\"https://mastodon.bida.im/tags/monetizzazione\" class=\"mention hashtag\" rel=\"tag\">#<span>monetizzazione</span></a> dei contenuti per i <a href=\"https://mastodon.bida.im/tags/creator\" class=\"mention hashtag\" rel=\"tag\">#<span>creator</span></a>.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/d666Yrrv\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/d666Yrrv</span><span class=\"invisible\"></span></a></p>" }, "attachment": [ { "type": "Document", "mediaType": "image/jpeg", "url": "https://mastodon.bida.im/system/media_attachments/files/109/298/357/668/840/835/original/90fa4e5f6625fd35.jpg", "name": null, "blurhash": "UbCaMvoK0:S5xaayRkof9bay-nflNGkCt6V@", "width": 1080, "height": 515 } ], "tag": [ { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/twitter", "name": "#twitter" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/liberazione", "name": "#liberazione" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/diritti", "name": "#diritti" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/umani", "name": "#umani" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/musk", "name": "#musk" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/ricerca", "name": "#ricerca" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/monetizzazione", "name": "#monetizzazione" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/creator", "name": "#creator" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/redhotcyber", "name": "#redhotcyber" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/informationsecurity", "name": "#informationsecurity" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/ethicalhacking", "name": "#ethicalhacking" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/dataprotection", "name": "#dataprotection" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/hacking", "name": "#hacking" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybersecurity", "name": "#cybersecurity" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybercrime", "name": "#cybercrime" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/CyberSecurityAwareness", "name": "#CyberSecurityAwareness" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybersecuritytraining", "name": "#cybersecuritytraining" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/CyberSecurityNews", "name": "#CyberSecurityNews" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/privacy", "name": "#privacy" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/infosecurity", "name": "#infosecurity" } ], "replies": { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109298358311645779/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://mastodon.bida.im/users/redhotcyber/statuses/109298358311645779/replies?only_other_accounts=true&page=true", "partOf": "https://mastodon.bida.im/users/redhotcyber/statuses/109298358311645779/replies", "items": [] } } } }, { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109298354665040101/activity", "type": "Create", "actor": "https://mastodon.bida.im/users/redhotcyber", "published": "2022-11-06T18:48:58Z", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://mastodon.bida.im/users/redhotcyber/followers" ], "object": { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109298354665040101", "type": "Note", "summary": null, "inReplyTo": null, "published": "2022-11-06T18:48:58Z", "url": "https://mastodon.bida.im/@redhotcyber/109298354665040101", "attributedTo": "https://mastodon.bida.im/users/redhotcyber", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://mastodon.bida.im/users/redhotcyber/followers" ], "sensitive": false, "atomUri": "https://mastodon.bida.im/users/redhotcyber/statuses/109298354665040101", "inReplyToAtomUri": null, "conversation": "tag:mastodon.bida.im,2022-11-06:objectId=41428640:objectType=Conversation", "content": "<p>Il malware si nasconde dentro le APP fake di Netflix, avverte Kaspersky Lab</p><p>Molto spesso, i <a href=\"https://mastodon.bida.im/tags/Trojan\" class=\"mention hashtag\" rel=\"tag\">#<span>Trojan</span></a> si travestono da servizi di <a href=\"https://mastodon.bida.im/tags/streaming\" class=\"mention hashtag\" rel=\"tag\">#<span>streaming</span></a>.</p><p><a href=\"https://mastodon.bida.im/tags/Ransomware\" class=\"mention hashtag\" rel=\"tag\">#<span>Ransomware</span></a>, <a href=\"https://mastodon.bida.im/tags/spyware\" class=\"mention hashtag\" rel=\"tag\">#<span>spyware</span></a> e <a href=\"https://mastodon.bida.im/tags/downloader\" class=\"mention hashtag\" rel=\"tag\">#<span>downloader</span></a> sono cablati in false <a href=\"https://mastodon.bida.im/tags/app\" class=\"mention hashtag\" rel=\"tag\">#<span>app</span></a> Netflix, Disney+ e altro ancora. Un’altra mossa popolare è il <a href=\"https://mastodon.bida.im/tags/phishing\" class=\"mention hashtag\" rel=\"tag\">#<span>phishing</span></a> emulando piattaforme note. Gli <a href=\"https://mastodon.bida.im/tags/esperti\" class=\"mention hashtag\" rel=\"tag\">#<span>esperti</span></a> di <a href=\"https://mastodon.bida.im/tags/KasperskyLab\" class=\"mention hashtag\" rel=\"tag\">#<span>KasperskyLab</span></a> hanno aggiornato le statistiche dall’inizio dell’anno alla fine di settembre.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dBmudzvH\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dBmudzvH</span><span class=\"invisible\"></span></a></p>", "contentMap": { "it": "<p>Il malware si nasconde dentro le APP fake di Netflix, avverte Kaspersky Lab</p><p>Molto spesso, i <a href=\"https://mastodon.bida.im/tags/Trojan\" class=\"mention hashtag\" rel=\"tag\">#<span>Trojan</span></a> si travestono da servizi di <a href=\"https://mastodon.bida.im/tags/streaming\" class=\"mention hashtag\" rel=\"tag\">#<span>streaming</span></a>.</p><p><a href=\"https://mastodon.bida.im/tags/Ransomware\" class=\"mention hashtag\" rel=\"tag\">#<span>Ransomware</span></a>, <a href=\"https://mastodon.bida.im/tags/spyware\" class=\"mention hashtag\" rel=\"tag\">#<span>spyware</span></a> e <a href=\"https://mastodon.bida.im/tags/downloader\" class=\"mention hashtag\" rel=\"tag\">#<span>downloader</span></a> sono cablati in false <a href=\"https://mastodon.bida.im/tags/app\" class=\"mention hashtag\" rel=\"tag\">#<span>app</span></a> Netflix, Disney+ e altro ancora. Un’altra mossa popolare è il <a href=\"https://mastodon.bida.im/tags/phishing\" class=\"mention hashtag\" rel=\"tag\">#<span>phishing</span></a> emulando piattaforme note. Gli <a href=\"https://mastodon.bida.im/tags/esperti\" class=\"mention hashtag\" rel=\"tag\">#<span>esperti</span></a> di <a href=\"https://mastodon.bida.im/tags/KasperskyLab\" class=\"mention hashtag\" rel=\"tag\">#<span>KasperskyLab</span></a> hanno aggiornato le statistiche dall’inizio dell’anno alla fine di settembre.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dBmudzvH\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dBmudzvH</span><span class=\"invisible\"></span></a></p>" }, "attachment": [ { "type": "Document", "mediaType": "image/jpeg", "url": "https://mastodon.bida.im/system/media_attachments/files/109/298/353/776/411/254/original/a9fb2b152318d7fd.jpg", "name": null, "blurhash": "UECsU2x9Emr:4U01ofxu_1_3nNRQITNdIUs:", "width": 1079, "height": 614 } ], "tag": [ { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/trojan", "name": "#trojan" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/streaming", "name": "#streaming" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/ransomware", "name": "#ransomware" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/spyware", "name": "#spyware" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/downloader", "name": "#downloader" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/app", "name": "#app" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/phishing", "name": "#phishing" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/esperti", "name": "#esperti" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/kasperskylab", "name": "#kasperskylab" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/redhotcyber", "name": "#redhotcyber" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/informationsecurity", "name": "#informationsecurity" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/ethicalhacking", "name": "#ethicalhacking" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/dataprotection", "name": "#dataprotection" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/hacking", "name": "#hacking" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybersecurity", "name": "#cybersecurity" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybercrime", "name": "#cybercrime" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/CyberSecurityAwareness", "name": "#CyberSecurityAwareness" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybersecuritytraining", "name": "#cybersecuritytraining" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/CyberSecurityNews", "name": "#CyberSecurityNews" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/privacy", "name": "#privacy" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/infosecurity", "name": "#infosecurity" } ], "replies": { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109298354665040101/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://mastodon.bida.im/users/redhotcyber/statuses/109298354665040101/replies?only_other_accounts=true&page=true", "partOf": "https://mastodon.bida.im/users/redhotcyber/statuses/109298354665040101/replies", "items": [] } } } }, { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109298326943320529/activity", "type": "Create", "actor": "https://mastodon.bida.im/users/redhotcyber", "published": "2022-11-06T18:41:55Z", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://mastodon.bida.im/users/redhotcyber/followers" ], "object": { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109298326943320529", "type": "Note", "summary": null, "inReplyTo": null, "published": "2022-11-06T18:41:55Z", "url": "https://mastodon.bida.im/@redhotcyber/109298326943320529", "attributedTo": "https://mastodon.bida.im/users/redhotcyber", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://mastodon.bida.im/users/redhotcyber/followers" ], "sensitive": false, "atomUri": "https://mastodon.bida.im/users/redhotcyber/statuses/109298326943320529", "inReplyToAtomUri": null, "conversation": "tag:mastodon.bida.im,2022-11-06:objectId=41428235:objectType=Conversation", "content": "<p>Anche le gang ransomware piangono. Yanluowang è stata compromessa. Le chat sono online</p><p>Gli esperti di sicurezza segnalano una violazione del gruppo <a href=\"https://mastodon.bida.im/tags/Yanluowang\" class=\"mention hashtag\" rel=\"tag\">#<span>Yanluowang</span></a>, che ha compromesso <a href=\"https://mastodon.bida.im/tags/Cisco\" class=\"mention hashtag\" rel=\"tag\">#<span>Cisco</span></a> quest&#39;estate. Secondo gli <a href=\"https://mastodon.bida.im/tags/esperti\" class=\"mention hashtag\" rel=\"tag\">#<span>esperti</span></a>, le chat interne del gruppo sono trapelate in rete, dimostrando che Yanluowang è composto da membri di <a href=\"https://mastodon.bida.im/tags/lingua\" class=\"mention hashtag\" rel=\"tag\">#<span>lingua</span></a> russa.</p><p>Questa è una sfumatura interessante, dal momento che inizialmente molti credevano che Yanluowang fosse un gruppo cinese. Tuttavia, qualche tempo fa questa opinione ha iniziato a cambiare, poiché a settembre il collettivo si era associato alla <a href=\"https://mastodon.bida.im/tags/EvilCorp\" class=\"mention hashtag\" rel=\"tag\">#<span>EvilCorp</span></a>.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dp__HXdd\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dp__HXdd</span><span class=\"invisible\"></span></a></p>", "contentMap": { "it": "<p>Anche le gang ransomware piangono. Yanluowang è stata compromessa. Le chat sono online</p><p>Gli esperti di sicurezza segnalano una violazione del gruppo <a href=\"https://mastodon.bida.im/tags/Yanluowang\" class=\"mention hashtag\" rel=\"tag\">#<span>Yanluowang</span></a>, che ha compromesso <a href=\"https://mastodon.bida.im/tags/Cisco\" class=\"mention hashtag\" rel=\"tag\">#<span>Cisco</span></a> quest&#39;estate. Secondo gli <a href=\"https://mastodon.bida.im/tags/esperti\" class=\"mention hashtag\" rel=\"tag\">#<span>esperti</span></a>, le chat interne del gruppo sono trapelate in rete, dimostrando che Yanluowang è composto da membri di <a href=\"https://mastodon.bida.im/tags/lingua\" class=\"mention hashtag\" rel=\"tag\">#<span>lingua</span></a> russa.</p><p>Questa è una sfumatura interessante, dal momento che inizialmente molti credevano che Yanluowang fosse un gruppo cinese. Tuttavia, qualche tempo fa questa opinione ha iniziato a cambiare, poiché a settembre il collettivo si era associato alla <a href=\"https://mastodon.bida.im/tags/EvilCorp\" class=\"mention hashtag\" rel=\"tag\">#<span>EvilCorp</span></a>.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dp__HXdd\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dp__HXdd</span><span class=\"invisible\"></span></a></p>" }, "attachment": [ { "type": "Document", "mediaType": "image/jpeg", "url": "https://mastodon.bida.im/system/media_attachments/files/109/298/324/153/517/505/original/4602abc2014b05ef.jpg", "name": null, "blurhash": "UE3n,,g|M3k9P7l6xZbuqLeVS_j?VaZQm:e;", "width": 1080, "height": 655 } ], "tag": [ { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/Yanluowang", "name": "#Yanluowang" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cisco", "name": "#cisco" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/esperti", "name": "#esperti" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/lingua", "name": "#lingua" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/evilcorp", "name": "#evilcorp" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/redhotcyber", "name": "#redhotcyber" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/informationsecurity", "name": "#informationsecurity" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/ethicalhacking", "name": "#ethicalhacking" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/dataprotection", "name": "#dataprotection" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/hacking", "name": "#hacking" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybersecurity", "name": "#cybersecurity" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybercrime", "name": "#cybercrime" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/CyberSecurityAwareness", "name": "#CyberSecurityAwareness" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybersecuritytraining", "name": "#cybersecuritytraining" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/CyberSecurityNews", "name": "#CyberSecurityNews" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/privacy", "name": "#privacy" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/infosecurity", "name": "#infosecurity" } ], "replies": { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/109298326943320529/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://mastodon.bida.im/users/redhotcyber/statuses/109298326943320529/replies?only_other_accounts=true&page=true", "partOf": "https://mastodon.bida.im/users/redhotcyber/statuses/109298326943320529/replies", "items": [] } } } } ] }