A small tool to view real-world ActivityPub objects as JSON! Enter a URL
or username from Mastodon or a similar service below, and we'll send a
request with
the right
Accept
header
to the server to view the underlying object.
{
"@context": [
"https://www.w3.org/ns/activitystreams",
{
"ostatus": "http://ostatus.org#",
"atomUri": "ostatus:atomUri",
"inReplyToAtomUri": "ostatus:inReplyToAtomUri",
"conversation": "ostatus:conversation",
"sensitive": "as:sensitive",
"toot": "http://joinmastodon.org/ns#",
"votersCount": "toot:votersCount",
"blurhash": "toot:blurhash",
"focalPoint": {
"@container": "@list",
"@id": "toot:focalPoint"
},
"Hashtag": "as:Hashtag"
}
],
"id": "https://mastodon.bida.im/users/redhotcyber/outbox?min_id=0&page=true",
"type": "OrderedCollectionPage",
"next": "https://mastodon.bida.im/users/redhotcyber/outbox?max_id=109298326943320529&page=true",
"prev": "https://mastodon.bida.im/users/redhotcyber/outbox?min_id=109313662270377816&page=true",
"partOf": "https://mastodon.bida.im/users/redhotcyber/outbox",
"orderedItems": [
{
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109313662270377816/activity",
"type": "Create",
"actor": "https://mastodon.bida.im/users/redhotcyber",
"published": "2022-11-09T11:41:54Z",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://mastodon.bida.im/users/redhotcyber/followers"
],
"object": {
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109313662270377816",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2022-11-09T11:41:54Z",
"url": "https://mastodon.bida.im/@redhotcyber/109313662270377816",
"attributedTo": "https://mastodon.bida.im/users/redhotcyber",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://mastodon.bida.im/users/redhotcyber/followers"
],
"sensitive": false,
"atomUri": "https://mastodon.bida.im/users/redhotcyber/statuses/109313662270377816",
"inReplyToAtomUri": null,
"conversation": "tag:mastodon.bida.im,2022-11-09:objectId=41665481:objectType=Conversation",
"content": "<p>DropBox è stata vittima di un importante attacco informatico</p><p>La società di file hosting <a href=\"https://mastodon.bida.im/tags/Dropbox\" class=\"mention hashtag\" rel=\"tag\">#<span>Dropbox</span></a> ha riferito il 1° novembre di essere stata <a href=\"https://mastodon.bida.im/tags/vittima\" class=\"mention hashtag\" rel=\"tag\">#<span>vittima</span></a> di una <a href=\"https://mastodon.bida.im/tags/campagna\" class=\"mention hashtag\" rel=\"tag\">#<span>campagna</span></a> di <a href=\"https://mastodon.bida.im/tags/phishing\" class=\"mention hashtag\" rel=\"tag\">#<span>phishing</span></a> che ha consentito ad aggressori di ottenere l’accesso non autorizzato a 130 <a href=\"https://mastodon.bida.im/tags/repository\" class=\"mention hashtag\" rel=\"tag\">#<span>repository</span></a> di codice sorgente su <a href=\"https://mastodon.bida.im/tags/GitHub\" class=\"mention hashtag\" rel=\"tag\">#<span>GitHub</span></a>.</p><p>“Questi repository includevano le nostre copie di <a href=\"https://mastodon.bida.im/tags/librerie\" class=\"mention hashtag\" rel=\"tag\">#<span>librerie</span></a> di terze parti leggermente modificate per utilizzare Dropbox, <a href=\"https://mastodon.bida.im/tags/prototipi\" class=\"mention hashtag\" rel=\"tag\">#<span>prototipi</span></a> interni e alcuni degli <a href=\"https://mastodon.bida.im/tags/strumenti\" class=\"mention hashtag\" rel=\"tag\">#<span>strumenti</span></a> e dei file di <a href=\"https://mastodon.bida.im/tags/configurazione\" class=\"mention hashtag\" rel=\"tag\">#<span>configurazione</span></a> utilizzati dal <a href=\"https://mastodon.bida.im/tags/team\" class=\"mention hashtag\" rel=\"tag\">#<span>team</span></a> di sicurezza” ha affermato la società in una nota.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dCVXGqYZ\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dCVXGqYZ</span><span class=\"invisible\"></span></a></p>",
"contentMap": {
"it": "<p>DropBox è stata vittima di un importante attacco informatico</p><p>La società di file hosting <a href=\"https://mastodon.bida.im/tags/Dropbox\" class=\"mention hashtag\" rel=\"tag\">#<span>Dropbox</span></a> ha riferito il 1° novembre di essere stata <a href=\"https://mastodon.bida.im/tags/vittima\" class=\"mention hashtag\" rel=\"tag\">#<span>vittima</span></a> di una <a href=\"https://mastodon.bida.im/tags/campagna\" class=\"mention hashtag\" rel=\"tag\">#<span>campagna</span></a> di <a href=\"https://mastodon.bida.im/tags/phishing\" class=\"mention hashtag\" rel=\"tag\">#<span>phishing</span></a> che ha consentito ad aggressori di ottenere l’accesso non autorizzato a 130 <a href=\"https://mastodon.bida.im/tags/repository\" class=\"mention hashtag\" rel=\"tag\">#<span>repository</span></a> di codice sorgente su <a href=\"https://mastodon.bida.im/tags/GitHub\" class=\"mention hashtag\" rel=\"tag\">#<span>GitHub</span></a>.</p><p>“Questi repository includevano le nostre copie di <a href=\"https://mastodon.bida.im/tags/librerie\" class=\"mention hashtag\" rel=\"tag\">#<span>librerie</span></a> di terze parti leggermente modificate per utilizzare Dropbox, <a href=\"https://mastodon.bida.im/tags/prototipi\" class=\"mention hashtag\" rel=\"tag\">#<span>prototipi</span></a> interni e alcuni degli <a href=\"https://mastodon.bida.im/tags/strumenti\" class=\"mention hashtag\" rel=\"tag\">#<span>strumenti</span></a> e dei file di <a href=\"https://mastodon.bida.im/tags/configurazione\" class=\"mention hashtag\" rel=\"tag\">#<span>configurazione</span></a> utilizzati dal <a href=\"https://mastodon.bida.im/tags/team\" class=\"mention hashtag\" rel=\"tag\">#<span>team</span></a> di sicurezza” ha affermato la società in una nota.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dCVXGqYZ\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dCVXGqYZ</span><span class=\"invisible\"></span></a></p>"
},
"attachment": [
{
"type": "Document",
"mediaType": "image/jpeg",
"url": "https://mastodon.bida.im/system/media_attachments/files/109/313/661/739/411/895/original/cc555566aef49a38.jpg",
"name": null,
"blurhash": "ULBojz$lD%jDJRW;oLay4mjE%MbdbFWBayof",
"width": 800,
"height": 480
}
],
"tag": [
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/dropbox",
"name": "#dropbox"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/vittima",
"name": "#vittima"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/campagna",
"name": "#campagna"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/phishing",
"name": "#phishing"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/repository",
"name": "#repository"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/github",
"name": "#github"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/librerie",
"name": "#librerie"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/prototipi",
"name": "#prototipi"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/strumenti",
"name": "#strumenti"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/configurazione",
"name": "#configurazione"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/team",
"name": "#team"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/redhotcyber",
"name": "#redhotcyber"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/informationsecurity",
"name": "#informationsecurity"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/ethicalhacking",
"name": "#ethicalhacking"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/dataprotection",
"name": "#dataprotection"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/hacking",
"name": "#hacking"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybersecurity",
"name": "#cybersecurity"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybercrime",
"name": "#cybercrime"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/CyberSecurityAwareness",
"name": "#CyberSecurityAwareness"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybersecuritytraining",
"name": "#cybersecuritytraining"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/CyberSecurityNews",
"name": "#CyberSecurityNews"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/privacy",
"name": "#privacy"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/infosecurity",
"name": "#infosecurity"
}
],
"replies": {
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109313662270377816/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://mastodon.bida.im/users/redhotcyber/statuses/109313662270377816/replies?only_other_accounts=true&page=true",
"partOf": "https://mastodon.bida.im/users/redhotcyber/statuses/109313662270377816/replies",
"items": []
}
}
}
},
{
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109312425666936516/activity",
"type": "Create",
"actor": "https://mastodon.bida.im/users/redhotcyber",
"published": "2022-11-09T06:27:25Z",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://mastodon.bida.im/users/redhotcyber/followers"
],
"object": {
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109312425666936516",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2022-11-09T06:27:25Z",
"url": "https://mastodon.bida.im/@redhotcyber/109312425666936516",
"attributedTo": "https://mastodon.bida.im/users/redhotcyber",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://mastodon.bida.im/users/redhotcyber/followers"
],
"sensitive": false,
"atomUri": "https://mastodon.bida.im/users/redhotcyber/statuses/109312425666936516",
"inReplyToAtomUri": null,
"conversation": "tag:mastodon.bida.im,2022-11-09:objectId=41644417:objectType=Conversation",
"content": "<p>I siti di notizie statunitensi distribuiscono malware</p><p>I <a href=\"https://mastodon.bida.im/tags/ricercatori\" class=\"mention hashtag\" rel=\"tag\">#<span>ricercatori</span></a> di Proofpoint hanno scoperto una nuova campagna in cui gli aggressori utilizzano l’<a href=\"https://mastodon.bida.im/tags/infrastruttura\" class=\"mention hashtag\" rel=\"tag\">#<span>infrastruttura</span></a> compromessa di una società di <a href=\"https://mastodon.bida.im/tags/media\" class=\"mention hashtag\" rel=\"tag\">#<span>media</span></a> statunitense per distribuire il <a href=\"https://mastodon.bida.im/tags/framework\" class=\"mention hashtag\" rel=\"tag\">#<span>framework</span></a> <a href=\"https://mastodon.bida.im/tags/SocGholish\" class=\"mention hashtag\" rel=\"tag\">#<span>SocGholish</span></a> (noto anche come FakeUpdates) sui siti <a href=\"https://mastodon.bida.im/tags/web\" class=\"mention hashtag\" rel=\"tag\">#<span>web</span></a> di notizie statunitensi.</p><p>La società di media senza nome fornisce contenuti <a href=\"https://mastodon.bida.im/tags/video\" class=\"mention hashtag\" rel=\"tag\">#<span>video</span></a> e <a href=\"https://mastodon.bida.im/tags/pubblicit%C3%A0\" class=\"mention hashtag\" rel=\"tag\">#<span>pubblicità</span></a> alle principali testate giornalistiche. L’azienda serve diverse aziende negli <a href=\"https://mastodon.bida.im/tags/statiuniti\" class=\"mention hashtag\" rel=\"tag\">#<span>statiuniti</span></a>.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/d-MkRgjQ\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/d-MkRgjQ</span><span class=\"invisible\"></span></a></p>",
"contentMap": {
"it": "<p>I siti di notizie statunitensi distribuiscono malware</p><p>I <a href=\"https://mastodon.bida.im/tags/ricercatori\" class=\"mention hashtag\" rel=\"tag\">#<span>ricercatori</span></a> di Proofpoint hanno scoperto una nuova campagna in cui gli aggressori utilizzano l’<a href=\"https://mastodon.bida.im/tags/infrastruttura\" class=\"mention hashtag\" rel=\"tag\">#<span>infrastruttura</span></a> compromessa di una società di <a href=\"https://mastodon.bida.im/tags/media\" class=\"mention hashtag\" rel=\"tag\">#<span>media</span></a> statunitense per distribuire il <a href=\"https://mastodon.bida.im/tags/framework\" class=\"mention hashtag\" rel=\"tag\">#<span>framework</span></a> <a href=\"https://mastodon.bida.im/tags/SocGholish\" class=\"mention hashtag\" rel=\"tag\">#<span>SocGholish</span></a> (noto anche come FakeUpdates) sui siti <a href=\"https://mastodon.bida.im/tags/web\" class=\"mention hashtag\" rel=\"tag\">#<span>web</span></a> di notizie statunitensi.</p><p>La società di media senza nome fornisce contenuti <a href=\"https://mastodon.bida.im/tags/video\" class=\"mention hashtag\" rel=\"tag\">#<span>video</span></a> e <a href=\"https://mastodon.bida.im/tags/pubblicit%C3%A0\" class=\"mention hashtag\" rel=\"tag\">#<span>pubblicità</span></a> alle principali testate giornalistiche. L’azienda serve diverse aziende negli <a href=\"https://mastodon.bida.im/tags/statiuniti\" class=\"mention hashtag\" rel=\"tag\">#<span>statiuniti</span></a>.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/d-MkRgjQ\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/d-MkRgjQ</span><span class=\"invisible\"></span></a></p>"
},
"attachment": [
{
"type": "Document",
"mediaType": "image/jpeg",
"url": "https://mastodon.bida.im/system/media_attachments/files/109/312/425/020/102/667/original/8133b4f30064fe2b.jpg",
"name": null,
"blurhash": "UbODnI00-;-;~qRjIUayD%t7xuofxuRjWBt7",
"width": 800,
"height": 447
}
],
"tag": [
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/ricercatori",
"name": "#ricercatori"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/infrastruttura",
"name": "#infrastruttura"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/media",
"name": "#media"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/framework",
"name": "#framework"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/SocGholish",
"name": "#SocGholish"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/web",
"name": "#web"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/video",
"name": "#video"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/pubblicit%C3%A0",
"name": "#pubblicità"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/statiuniti",
"name": "#statiuniti"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/redhotcyber",
"name": "#redhotcyber"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/informationsecurity",
"name": "#informationsecurity"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/ethicalhacking",
"name": "#ethicalhacking"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/dataprotection",
"name": "#dataprotection"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/hacking",
"name": "#hacking"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybersecurity",
"name": "#cybersecurity"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybercrime",
"name": "#cybercrime"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/CyberSecurityAwareness",
"name": "#CyberSecurityAwareness"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybersecuritytraining",
"name": "#cybersecuritytraining"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/CyberSecurityNews",
"name": "#CyberSecurityNews"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/privacy",
"name": "#privacy"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/infosecurity",
"name": "#infosecurity"
}
],
"replies": {
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109312425666936516/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://mastodon.bida.im/users/redhotcyber/statuses/109312425666936516/replies?only_other_accounts=true&page=true",
"partOf": "https://mastodon.bida.im/users/redhotcyber/statuses/109312425666936516/replies",
"items": []
}
}
}
},
{
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109308296376387219/activity",
"type": "Create",
"actor": "https://mastodon.bida.im/users/redhotcyber",
"published": "2022-11-08T12:57:17Z",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://mastodon.bida.im/users/redhotcyber/followers"
],
"object": {
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109308296376387219",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2022-11-08T12:57:17Z",
"url": "https://mastodon.bida.im/@redhotcyber/109308296376387219",
"attributedTo": "https://mastodon.bida.im/users/redhotcyber",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://mastodon.bida.im/users/redhotcyber/followers"
],
"sensitive": false,
"atomUri": "https://mastodon.bida.im/users/redhotcyber/statuses/109308296376387219",
"inReplyToAtomUri": null,
"conversation": "tag:mastodon.bida.im,2022-11-08:objectId=41574276:objectType=Conversation",
"content": "<p>Morire realmente in un videogioco? Ora sarà possibile con l’invenzione di un visore che farà esplodere realmente il tuo cervello</p><p>Palmer Lucky, fondatore di <a href=\"https://mastodon.bida.im/tags/Oculus\" class=\"mention hashtag\" rel=\"tag\">#<span>Oculus</span></a> e <a href=\"https://mastodon.bida.im/tags/sviluppatore\" class=\"mention hashtag\" rel=\"tag\">#<span>sviluppatore</span></a> del casco Oculus <a href=\"https://mastodon.bida.im/tags/Rift\" class=\"mention hashtag\" rel=\"tag\">#<span>Rift</span></a> VR, ha svelato sul suo blog un visore che esploderà all’istante se il suo proprietario muore nel video gioco.</p><p>Il visore <a href=\"https://mastodon.bida.im/tags/killer\" class=\"mention hashtag\" rel=\"tag\">#<span>killer</span></a> sembra un <a href=\"https://mastodon.bida.im/tags/Meta\" class=\"mention hashtag\" rel=\"tag\">#<span>Meta</span></a> <a href=\"https://mastodon.bida.im/tags/QuestPro\" class=\"mention hashtag\" rel=\"tag\">#<span>QuestPro</span></a> con tre capsule esplosive posizionate sopra lo schermo. Le cariche sono rivolte direttamente alla parte anteriore del <a href=\"https://mastodon.bida.im/tags/cervello\" class=\"mention hashtag\" rel=\"tag\">#<span>cervello</span></a> del proprietario e, se esplodono, gli esploderanno letteralmente in testa.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dSN7De4x\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dSN7De4x</span><span class=\"invisible\"></span></a></p>",
"contentMap": {
"it": "<p>Morire realmente in un videogioco? Ora sarà possibile con l’invenzione di un visore che farà esplodere realmente il tuo cervello</p><p>Palmer Lucky, fondatore di <a href=\"https://mastodon.bida.im/tags/Oculus\" class=\"mention hashtag\" rel=\"tag\">#<span>Oculus</span></a> e <a href=\"https://mastodon.bida.im/tags/sviluppatore\" class=\"mention hashtag\" rel=\"tag\">#<span>sviluppatore</span></a> del casco Oculus <a href=\"https://mastodon.bida.im/tags/Rift\" class=\"mention hashtag\" rel=\"tag\">#<span>Rift</span></a> VR, ha svelato sul suo blog un visore che esploderà all’istante se il suo proprietario muore nel video gioco.</p><p>Il visore <a href=\"https://mastodon.bida.im/tags/killer\" class=\"mention hashtag\" rel=\"tag\">#<span>killer</span></a> sembra un <a href=\"https://mastodon.bida.im/tags/Meta\" class=\"mention hashtag\" rel=\"tag\">#<span>Meta</span></a> <a href=\"https://mastodon.bida.im/tags/QuestPro\" class=\"mention hashtag\" rel=\"tag\">#<span>QuestPro</span></a> con tre capsule esplosive posizionate sopra lo schermo. Le cariche sono rivolte direttamente alla parte anteriore del <a href=\"https://mastodon.bida.im/tags/cervello\" class=\"mention hashtag\" rel=\"tag\">#<span>cervello</span></a> del proprietario e, se esplodono, gli esploderanno letteralmente in testa.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dSN7De4x\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dSN7De4x</span><span class=\"invisible\"></span></a></p>"
},
"attachment": [
{
"type": "Document",
"mediaType": "image/jpeg",
"url": "https://mastodon.bida.im/system/media_attachments/files/109/308/295/257/492/843/original/f9a0629a62a37701.jpg",
"name": null,
"blurhash": "UkGSDm-;WCWB~qt7azfk-;NGM{ayxbM{WBj[",
"width": 770,
"height": 616
}
],
"tag": [
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/oculus",
"name": "#oculus"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/sviluppatore",
"name": "#sviluppatore"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/Rift",
"name": "#Rift"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/killer",
"name": "#killer"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/meta",
"name": "#meta"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/QuestPro",
"name": "#QuestPro"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cervello",
"name": "#cervello"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/redhotcyber",
"name": "#redhotcyber"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/informationsecurity",
"name": "#informationsecurity"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/ethicalhacking",
"name": "#ethicalhacking"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/dataprotection",
"name": "#dataprotection"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/hacking",
"name": "#hacking"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybersecurity",
"name": "#cybersecurity"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybercrime",
"name": "#cybercrime"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/CyberSecurityAwareness",
"name": "#CyberSecurityAwareness"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybersecuritytraining",
"name": "#cybersecuritytraining"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/CyberSecurityNews",
"name": "#CyberSecurityNews"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/privacy",
"name": "#privacy"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/infosecurity",
"name": "#infosecurity"
}
],
"replies": {
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109308296376387219/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://mastodon.bida.im/users/redhotcyber/statuses/109308296376387219/replies?only_other_accounts=true&page=true",
"partOf": "https://mastodon.bida.im/users/redhotcyber/statuses/109308296376387219/replies",
"items": []
}
}
}
},
{
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109307953513473848/activity",
"type": "Create",
"actor": "https://mastodon.bida.im/users/redhotcyber",
"published": "2022-11-08T11:30:05Z",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://mastodon.bida.im/users/redhotcyber/followers"
],
"object": {
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109307953513473848",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2022-11-08T11:30:05Z",
"url": "https://mastodon.bida.im/@redhotcyber/109307953513473848",
"attributedTo": "https://mastodon.bida.im/users/redhotcyber",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://mastodon.bida.im/users/redhotcyber/followers"
],
"sensitive": false,
"atomUri": "https://mastodon.bida.im/users/redhotcyber/statuses/109307953513473848",
"inReplyToAtomUri": null,
"conversation": "tag:mastodon.bida.im,2022-11-08:objectId=41567975:objectType=Conversation",
"content": "<p>OldGremlin: il gruppo ransomware che colpisce la Russia a suon di 4 milioni di euro</p><p>Group-IB ha pubblicato il primo rapporto analitico “<a href=\"https://mastodon.bida.im/tags/OldGremlin\" class=\"mention hashtag\" rel=\"tag\">#<span>OldGremlin</span></a> Analisi degli attacchi di gruppo <a href=\"https://mastodon.bida.im/tags/ransomware\" class=\"mention hashtag\" rel=\"tag\">#<span>ransomware</span></a> mirati alle imprese russe”, dedicato al gruppo di hacker <a href=\"https://mastodon.bida.im/tags/ransomware\" class=\"mention hashtag\" rel=\"tag\">#<span>ransomware</span></a> di lingua russa.</p><p>In soli due anni e mezzo, i gremlin, secondo Group-IB, hanno effettuato 16 attacchi per ottenere riscatti per la decrittazione dei <a href=\"https://mastodon.bida.im/tags/dati\" class=\"mention hashtag\" rel=\"tag\">#<span>dati</span></a>.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dQJaQfY5\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dQJaQfY5</span><span class=\"invisible\"></span></a></p>",
"contentMap": {
"it": "<p>OldGremlin: il gruppo ransomware che colpisce la Russia a suon di 4 milioni di euro</p><p>Group-IB ha pubblicato il primo rapporto analitico “<a href=\"https://mastodon.bida.im/tags/OldGremlin\" class=\"mention hashtag\" rel=\"tag\">#<span>OldGremlin</span></a> Analisi degli attacchi di gruppo <a href=\"https://mastodon.bida.im/tags/ransomware\" class=\"mention hashtag\" rel=\"tag\">#<span>ransomware</span></a> mirati alle imprese russe”, dedicato al gruppo di hacker <a href=\"https://mastodon.bida.im/tags/ransomware\" class=\"mention hashtag\" rel=\"tag\">#<span>ransomware</span></a> di lingua russa.</p><p>In soli due anni e mezzo, i gremlin, secondo Group-IB, hanno effettuato 16 attacchi per ottenere riscatti per la decrittazione dei <a href=\"https://mastodon.bida.im/tags/dati\" class=\"mention hashtag\" rel=\"tag\">#<span>dati</span></a>.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dQJaQfY5\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dQJaQfY5</span><span class=\"invisible\"></span></a></p>"
},
"attachment": [
{
"type": "Document",
"mediaType": "image/jpeg",
"url": "https://mastodon.bida.im/system/media_attachments/files/109/307/953/108/752/817/original/62d5601302b08e84.jpg",
"name": null,
"blurhash": "UIC;tr$*0zNGO=oeVtNH5RR*%1t7RPR*o}%L",
"width": 800,
"height": 420
}
],
"tag": [
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/OldGremlin",
"name": "#OldGremlin"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/ransomware",
"name": "#ransomware"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/dati",
"name": "#dati"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/redhotcyber",
"name": "#redhotcyber"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/informationsecurity",
"name": "#informationsecurity"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/ethicalhacking",
"name": "#ethicalhacking"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/dataprotection",
"name": "#dataprotection"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/hacking",
"name": "#hacking"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybersecurity",
"name": "#cybersecurity"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybercrime",
"name": "#cybercrime"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/CyberSecurityAwareness",
"name": "#CyberSecurityAwareness"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybersecuritytraining",
"name": "#cybersecuritytraining"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/CyberSecurityNews",
"name": "#CyberSecurityNews"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/privacy",
"name": "#privacy"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/infosecurity",
"name": "#infosecurity"
}
],
"replies": {
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109307953513473848/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://mastodon.bida.im/users/redhotcyber/statuses/109307953513473848/replies?only_other_accounts=true&page=true",
"partOf": "https://mastodon.bida.im/users/redhotcyber/statuses/109307953513473848/replies",
"items": []
}
}
}
},
{
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109307947425612712/activity",
"type": "Create",
"actor": "https://mastodon.bida.im/users/redhotcyber",
"published": "2022-11-08T11:28:32Z",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://mastodon.bida.im/users/redhotcyber/followers"
],
"object": {
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109307947425612712",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2022-11-08T11:28:32Z",
"url": "https://mastodon.bida.im/@redhotcyber/109307947425612712",
"attributedTo": "https://mastodon.bida.im/users/redhotcyber",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://mastodon.bida.im/users/redhotcyber/followers"
],
"sensitive": false,
"atomUri": "https://mastodon.bida.im/users/redhotcyber/statuses/109307947425612712",
"inReplyToAtomUri": null,
"conversation": "tag:mastodon.bida.im,2022-11-08:objectId=41567859:objectType=Conversation",
"content": "<p>La Russia ora è in grado di scollegarsi da internet ed utilizzare la sua Runet.</p><p><a href=\"https://mastodon.bida.im/tags/Runet\" class=\"mention hashtag\" rel=\"tag\">#<span>Runet</span></a> sarà in grado di continuare a lavorare in modo autonomo anche se <a href=\"https://mastodon.bida.im/tags/disconnesso\" class=\"mention hashtag\" rel=\"tag\">#<span>disconnesso</span></a> dalla rete globale. Lo ha annunciato il direttore del Centro per il <a href=\"https://mastodon.bida.im/tags/monitoraggio\" class=\"mention hashtag\" rel=\"tag\">#<span>monitoraggio</span></a> e il controllo della rete di <a href=\"https://mastodon.bida.im/tags/comunicazioni\" class=\"mention hashtag\" rel=\"tag\">#<span>comunicazioni</span></a> pubbliche dell’impresa unitaria dello Stato federale “Centro principale di radiofrequenza” subordinato a <a href=\"https://mastodon.bida.im/tags/Roskomnadzor\" class=\"mention hashtag\" rel=\"tag\">#<span>Roskomnadzor</span></a> Sergey Khutortsev. Le sue parole sono state riportate dall’agenzia <a href=\"https://mastodon.bida.im/tags/TASS\" class=\"mention hashtag\" rel=\"tag\">#<span>TASS</span></a>.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dPTWbcvU\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dPTWbcvU</span><span class=\"invisible\"></span></a></p>",
"contentMap": {
"it": "<p>La Russia ora è in grado di scollegarsi da internet ed utilizzare la sua Runet.</p><p><a href=\"https://mastodon.bida.im/tags/Runet\" class=\"mention hashtag\" rel=\"tag\">#<span>Runet</span></a> sarà in grado di continuare a lavorare in modo autonomo anche se <a href=\"https://mastodon.bida.im/tags/disconnesso\" class=\"mention hashtag\" rel=\"tag\">#<span>disconnesso</span></a> dalla rete globale. Lo ha annunciato il direttore del Centro per il <a href=\"https://mastodon.bida.im/tags/monitoraggio\" class=\"mention hashtag\" rel=\"tag\">#<span>monitoraggio</span></a> e il controllo della rete di <a href=\"https://mastodon.bida.im/tags/comunicazioni\" class=\"mention hashtag\" rel=\"tag\">#<span>comunicazioni</span></a> pubbliche dell’impresa unitaria dello Stato federale “Centro principale di radiofrequenza” subordinato a <a href=\"https://mastodon.bida.im/tags/Roskomnadzor\" class=\"mention hashtag\" rel=\"tag\">#<span>Roskomnadzor</span></a> Sergey Khutortsev. Le sue parole sono state riportate dall’agenzia <a href=\"https://mastodon.bida.im/tags/TASS\" class=\"mention hashtag\" rel=\"tag\">#<span>TASS</span></a>.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dPTWbcvU\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dPTWbcvU</span><span class=\"invisible\"></span></a></p>"
},
"attachment": [
{
"type": "Document",
"mediaType": "image/jpeg",
"url": "https://mastodon.bida.im/system/media_attachments/files/109/307/946/330/852/650/original/c382f2e9aae17208.jpg",
"name": null,
"blurhash": "UmFr;pn$M_WY.mbIr?oL==bIXAodofjYW=j?",
"width": 756,
"height": 454
}
],
"tag": [
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/runet",
"name": "#runet"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/disconnesso",
"name": "#disconnesso"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/monitoraggio",
"name": "#monitoraggio"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/comunicazioni",
"name": "#comunicazioni"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/roskomnadzor",
"name": "#roskomnadzor"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/tass",
"name": "#tass"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/redhotcyber",
"name": "#redhotcyber"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/informationsecurity",
"name": "#informationsecurity"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/ethicalhacking",
"name": "#ethicalhacking"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/dataprotection",
"name": "#dataprotection"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/hacking",
"name": "#hacking"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybersecurity",
"name": "#cybersecurity"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybercrime",
"name": "#cybercrime"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/CyberSecurityAwareness",
"name": "#CyberSecurityAwareness"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybersecuritytraining",
"name": "#cybersecuritytraining"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/CyberSecurityNews",
"name": "#CyberSecurityNews"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/privacy",
"name": "#privacy"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/infosecurity",
"name": "#infosecurity"
}
],
"replies": {
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109307947425612712/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://mastodon.bida.im/users/redhotcyber/statuses/109307947425612712/replies?only_other_accounts=true&page=true",
"partOf": "https://mastodon.bida.im/users/redhotcyber/statuses/109307947425612712/replies",
"items": []
}
}
}
},
{
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109307115267327916/activity",
"type": "Create",
"actor": "https://mastodon.bida.im/users/redhotcyber",
"published": "2022-11-08T07:56:54Z",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://mastodon.bida.im/users/redhotcyber/followers"
],
"object": {
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109307115267327916",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2022-11-08T07:56:54Z",
"url": "https://mastodon.bida.im/@redhotcyber/109307115267327916",
"attributedTo": "https://mastodon.bida.im/users/redhotcyber",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://mastodon.bida.im/users/redhotcyber/followers"
],
"sensitive": false,
"atomUri": "https://mastodon.bida.im/users/redhotcyber/statuses/109307115267327916",
"inReplyToAtomUri": null,
"conversation": "tag:mastodon.bida.im,2022-11-08:objectId=41553439:objectType=Conversation",
"content": "<p>La METRO è stata colpita dal ransomware BlackBasta. I samples sono online</p><p>La famigerata banda <a href=\"https://mastodon.bida.im/tags/BlackBasta\" class=\"mention hashtag\" rel=\"tag\">#<span>BlackBasta</span></a> rivendica oggi l’attacco <a href=\"https://mastodon.bida.im/tags/ransomware\" class=\"mention hashtag\" rel=\"tag\">#<span>ransomware</span></a> alle infrastrutture della <a href=\"https://mastodon.bida.im/tags/METRO\" class=\"mention hashtag\" rel=\"tag\">#<span>METRO</span></a>, la terza catena di vendita al dettaglio in <a href=\"https://mastodon.bida.im/tags/Europa\" class=\"mention hashtag\" rel=\"tag\">#<span>Europa</span></a> e la quarta al mondo.</p><p>Da <a href=\"https://mastodon.bida.im/tags/informazioni\" class=\"mention hashtag\" rel=\"tag\">#<span>informazioni</span></a> fornite a RHC, sembrerebbe che l’attacco abbia avuto inizio con una campagna mirata di phishing, poi successivamente, attraverso l’utilizzo di <a href=\"https://mastodon.bida.im/tags/malware\" class=\"mention hashtag\" rel=\"tag\">#<span>malware</span></a>, ha permesso alla gang di impadronirsi dei server ESX/Vmware e bloccare una parte delle infrastrutture.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dbf-RKa2\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dbf-RKa2</span><span class=\"invisible\"></span></a></p>",
"contentMap": {
"it": "<p>La METRO è stata colpita dal ransomware BlackBasta. I samples sono online</p><p>La famigerata banda <a href=\"https://mastodon.bida.im/tags/BlackBasta\" class=\"mention hashtag\" rel=\"tag\">#<span>BlackBasta</span></a> rivendica oggi l’attacco <a href=\"https://mastodon.bida.im/tags/ransomware\" class=\"mention hashtag\" rel=\"tag\">#<span>ransomware</span></a> alle infrastrutture della <a href=\"https://mastodon.bida.im/tags/METRO\" class=\"mention hashtag\" rel=\"tag\">#<span>METRO</span></a>, la terza catena di vendita al dettaglio in <a href=\"https://mastodon.bida.im/tags/Europa\" class=\"mention hashtag\" rel=\"tag\">#<span>Europa</span></a> e la quarta al mondo.</p><p>Da <a href=\"https://mastodon.bida.im/tags/informazioni\" class=\"mention hashtag\" rel=\"tag\">#<span>informazioni</span></a> fornite a RHC, sembrerebbe che l’attacco abbia avuto inizio con una campagna mirata di phishing, poi successivamente, attraverso l’utilizzo di <a href=\"https://mastodon.bida.im/tags/malware\" class=\"mention hashtag\" rel=\"tag\">#<span>malware</span></a>, ha permesso alla gang di impadronirsi dei server ESX/Vmware e bloccare una parte delle infrastrutture.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dbf-RKa2\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dbf-RKa2</span><span class=\"invisible\"></span></a></p>"
},
"attachment": [
{
"type": "Document",
"mediaType": "image/jpeg",
"url": "https://mastodon.bida.im/system/media_attachments/files/109/307/113/135/780/381/original/6db3d4f804c7ae8a.jpg",
"name": null,
"blurhash": "UL9%I:J7Mybbs.R*bHs.0gxGx@smNaxGayNb",
"width": 1080,
"height": 644
}
],
"tag": [
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/BlackBasta",
"name": "#BlackBasta"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/ransomware",
"name": "#ransomware"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/metro",
"name": "#metro"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/europa",
"name": "#europa"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/informazioni",
"name": "#informazioni"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/malware",
"name": "#malware"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/redhotcyber",
"name": "#redhotcyber"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/informationsecurity",
"name": "#informationsecurity"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/ethicalhacking",
"name": "#ethicalhacking"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/dataprotection",
"name": "#dataprotection"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/hacking",
"name": "#hacking"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybersecurity",
"name": "#cybersecurity"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybercrime",
"name": "#cybercrime"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/CyberSecurityAwareness",
"name": "#CyberSecurityAwareness"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybersecuritytraining",
"name": "#cybersecuritytraining"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/CyberSecurityNews",
"name": "#CyberSecurityNews"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/privacy",
"name": "#privacy"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/infosecurity",
"name": "#infosecurity"
}
],
"replies": {
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109307115267327916/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://mastodon.bida.im/users/redhotcyber/statuses/109307115267327916/replies?only_other_accounts=true&page=true",
"partOf": "https://mastodon.bida.im/users/redhotcyber/statuses/109307115267327916/replies",
"items": []
}
}
}
},
{
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109306971291244746/activity",
"type": "Create",
"actor": "https://mastodon.bida.im/users/redhotcyber",
"published": "2022-11-08T07:20:18Z",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://mastodon.bida.im/users/redhotcyber/followers"
],
"object": {
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109306971291244746",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2022-11-08T07:20:18Z",
"url": "https://mastodon.bida.im/@redhotcyber/109306971291244746",
"attributedTo": "https://mastodon.bida.im/users/redhotcyber",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://mastodon.bida.im/users/redhotcyber/followers"
],
"sensitive": false,
"atomUri": "https://mastodon.bida.im/users/redhotcyber/statuses/109306971291244746",
"inReplyToAtomUri": null,
"conversation": "tag:mastodon.bida.im,2022-11-08:objectId=41551148:objectType=Conversation",
"content": "<p>V per Vendetta: analisi psicologica di un film alla base del moderno hacktivismo</p><p>La maschera di Guy Fawkes indossata nel film V for Vendetta di James Mc Teigue perchè è il simbolo di <a href=\"https://mastodon.bida.im/tags/Anonymous\" class=\"mention hashtag\" rel=\"tag\">#<span>Anonymous</span></a>? Proviamo a ripercorrere insieme i passi più salienti del <a href=\"https://mastodon.bida.im/tags/film\" class=\"mention hashtag\" rel=\"tag\">#<span>film</span></a> per vedere quali sono le emozioni che hanno portato un gruppo di <a href=\"https://mastodon.bida.im/tags/hacktivisti\" class=\"mention hashtag\" rel=\"tag\">#<span>hacktivisti</span></a> a scegliere proprio tale <a href=\"https://mastodon.bida.im/tags/maschera\" class=\"mention hashtag\" rel=\"tag\">#<span>maschera</span></a>, come simbolo globale di protesta e di rinnovamento.</p><p>V non è un semplice super-eroe e soprattutto non è un film che può essere ricondotto, esclusivamente, ad un capolavoro <a href=\"https://mastodon.bida.im/tags/cinematografico\" class=\"mention hashtag\" rel=\"tag\">#<span>cinematografico</span></a> che tiene incollati alla poltrona.</p><p>A cura di Daniela Farina.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dU_czB4M\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dU_czB4M</span><span class=\"invisible\"></span></a></p>",
"contentMap": {
"it": "<p>V per Vendetta: analisi psicologica di un film alla base del moderno hacktivismo</p><p>La maschera di Guy Fawkes indossata nel film V for Vendetta di James Mc Teigue perchè è il simbolo di <a href=\"https://mastodon.bida.im/tags/Anonymous\" class=\"mention hashtag\" rel=\"tag\">#<span>Anonymous</span></a>? Proviamo a ripercorrere insieme i passi più salienti del <a href=\"https://mastodon.bida.im/tags/film\" class=\"mention hashtag\" rel=\"tag\">#<span>film</span></a> per vedere quali sono le emozioni che hanno portato un gruppo di <a href=\"https://mastodon.bida.im/tags/hacktivisti\" class=\"mention hashtag\" rel=\"tag\">#<span>hacktivisti</span></a> a scegliere proprio tale <a href=\"https://mastodon.bida.im/tags/maschera\" class=\"mention hashtag\" rel=\"tag\">#<span>maschera</span></a>, come simbolo globale di protesta e di rinnovamento.</p><p>V non è un semplice super-eroe e soprattutto non è un film che può essere ricondotto, esclusivamente, ad un capolavoro <a href=\"https://mastodon.bida.im/tags/cinematografico\" class=\"mention hashtag\" rel=\"tag\">#<span>cinematografico</span></a> che tiene incollati alla poltrona.</p><p>A cura di Daniela Farina.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dU_czB4M\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dU_czB4M</span><span class=\"invisible\"></span></a></p>"
},
"attachment": [
{
"type": "Document",
"mediaType": "image/jpeg",
"url": "https://mastodon.bida.im/system/media_attachments/files/109/306/970/105/906/455/original/31a18ad2508f9db6.jpg",
"name": null,
"blurhash": "URH81@sn{gf6}YJl:,n%oysonPsB]nn%J8o1",
"width": 621,
"height": 621
}
],
"tag": [
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/anonymous",
"name": "#anonymous"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/film",
"name": "#film"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/hacktivisti",
"name": "#hacktivisti"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/maschera",
"name": "#maschera"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cinematografico",
"name": "#cinematografico"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/redhotcyber",
"name": "#redhotcyber"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/informationsecurity",
"name": "#informationsecurity"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/ethicalhacking",
"name": "#ethicalhacking"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/dataprotection",
"name": "#dataprotection"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/hacking",
"name": "#hacking"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybersecurity",
"name": "#cybersecurity"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybercrime",
"name": "#cybercrime"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/CyberSecurityAwareness",
"name": "#CyberSecurityAwareness"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybersecuritytraining",
"name": "#cybersecuritytraining"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/CyberSecurityNews",
"name": "#CyberSecurityNews"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/privacy",
"name": "#privacy"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/infosecurity",
"name": "#infosecurity"
}
],
"replies": {
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109306971291244746/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://mastodon.bida.im/users/redhotcyber/statuses/109306971291244746/replies?only_other_accounts=true&page=true",
"partOf": "https://mastodon.bida.im/users/redhotcyber/statuses/109306971291244746/replies",
"items": []
}
}
}
},
{
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109304748605587575/activity",
"type": "Create",
"actor": "https://mastodon.bida.im/users/redhotcyber",
"published": "2022-11-07T21:55:02Z",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://mastodon.bida.im/users/redhotcyber/followers",
"https://mastodon.uno/users/haller"
],
"object": {
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109304748605587575",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2022-11-07T21:55:02Z",
"url": "https://mastodon.bida.im/@redhotcyber/109304748605587575",
"attributedTo": "https://mastodon.bida.im/users/redhotcyber",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://mastodon.bida.im/users/redhotcyber/followers",
"https://mastodon.uno/users/haller"
],
"sensitive": false,
"atomUri": "https://mastodon.bida.im/users/redhotcyber/statuses/109304748605587575",
"inReplyToAtomUri": null,
"conversation": "tag:mastodon.bida.im,2022-11-07:objectId=41477936:objectType=Conversation",
"content": "<p><span class=\"h-card\" translate=\"no\"><a href=\"https://mastodon.uno/@haller\" class=\"u-url mention\">@<span>haller</span></a></span> Grazie Heller, siamo però ancora un pò impacciati con lo strumento 😉</p>",
"contentMap": {
"it": "<p><span class=\"h-card\" translate=\"no\"><a href=\"https://mastodon.uno/@haller\" class=\"u-url mention\">@<span>haller</span></a></span> Grazie Heller, siamo però ancora un pò impacciati con lo strumento 😉</p>"
},
"attachment": [],
"tag": [
{
"type": "Mention",
"href": "https://mastodon.uno/users/haller",
"name": "@haller@mastodon.uno"
}
],
"replies": {
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109304748605587575/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://mastodon.bida.im/users/redhotcyber/statuses/109304748605587575/replies?only_other_accounts=true&page=true",
"partOf": "https://mastodon.bida.im/users/redhotcyber/statuses/109304748605587575/replies",
"items": []
}
}
}
},
{
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109303219290559688/activity",
"type": "Create",
"actor": "https://mastodon.bida.im/users/redhotcyber",
"published": "2022-11-07T15:26:07Z",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://mastodon.bida.im/users/redhotcyber/followers"
],
"object": {
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109303219290559688",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2022-11-07T15:26:07Z",
"url": "https://mastodon.bida.im/@redhotcyber/109303219290559688",
"attributedTo": "https://mastodon.bida.im/users/redhotcyber",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://mastodon.bida.im/users/redhotcyber/followers"
],
"sensitive": false,
"atomUri": "https://mastodon.bida.im/users/redhotcyber/statuses/109303219290559688",
"inReplyToAtomUri": null,
"conversation": "tag:mastodon.bida.im,2022-11-07:objectId=41493595:objectType=Conversation",
"content": "<p>Sta arrivando "Betti"! Il fumetto di Red Hot Cyber sulla Cybersecurity!</p><p>Red Hot Cyber, credendo che occorra trovare dei metodi non convenzionali per stimolare le persone verso la <a href=\"https://mastodon.bida.im/tags/consapevolezza\" class=\"mention hashtag\" rel=\"tag\">#<span>consapevolezza</span></a> al rischio e alla <a href=\"https://mastodon.bida.im/tags/cultura\" class=\"mention hashtag\" rel=\"tag\">#<span>cultura</span></a> <a href=\"https://mastodon.bida.im/tags/hacker\" class=\"mention hashtag\" rel=\"tag\">#<span>hacker</span></a>, ha realizzato la prima Graphic Novel di una collana, dal titolo: “<a href=\"https://mastodon.bida.im/tags/BettiRHC\" class=\"mention hashtag\" rel=\"tag\">#<span>BettiRHC</span></a>”.</p><p>2022! </p><p>Una guerra silenziosa per la conquista dei dati fa la prima vittima. Un semplice rettore di <a href=\"https://mastodon.bida.im/tags/universit%C3%A0\" class=\"mention hashtag\" rel=\"tag\">#<span>università</span></a>, creatore di un <a href=\"https://mastodon.bida.im/tags/software\" class=\"mention hashtag\" rel=\"tag\">#<span>software</span></a> segreto in grado di cambiare radicalmente la <a href=\"https://mastodon.bida.im/tags/programmazione\" class=\"mention hashtag\" rel=\"tag\">#<span>programmazione</span></a>, muore in circostanze misteriose, lasciando nei guai la moglie Anna e la figlia Betti.<br /> <br />Per i pre ordini, potete registrarvi qua: <a href=\"https://lnkd.in/dfjWvQTc\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dfjWvQTc</span><span class=\"invisible\"></span></a></p><p>SAVE THE DATE: GENNAIO 2023</p><p><a href=\"https://mastodon.bida.im/tags/hackerhood\" class=\"mention hashtag\" rel=\"tag\">#<span>hackerhood</span></a> <a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/hacker\" class=\"mention hashtag\" rel=\"tag\">#<span>hacker</span></a> <a href=\"https://mastodon.bida.im/tags/community\" class=\"mention hashtag\" rel=\"tag\">#<span>community</span></a> <a href=\"https://mastodon.bida.im/tags/bughunting\" class=\"mention hashtag\" rel=\"tag\">#<span>bughunting</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a> <a href=\"https://mastodon.bida.im/tags/fumetto\" class=\"mention hashtag\" rel=\"tag\">#<span>fumetto</span></a> <a href=\"https://mastodon.bida.im/tags/consapevolezza\" class=\"mention hashtag\" rel=\"tag\">#<span>consapevolezza</span></a> <a href=\"https://mastodon.bida.im/tags/comics\" class=\"mention hashtag\" rel=\"tag\">#<span>comics</span></a></p>",
"contentMap": {
"it": "<p>Sta arrivando "Betti"! Il fumetto di Red Hot Cyber sulla Cybersecurity!</p><p>Red Hot Cyber, credendo che occorra trovare dei metodi non convenzionali per stimolare le persone verso la <a href=\"https://mastodon.bida.im/tags/consapevolezza\" class=\"mention hashtag\" rel=\"tag\">#<span>consapevolezza</span></a> al rischio e alla <a href=\"https://mastodon.bida.im/tags/cultura\" class=\"mention hashtag\" rel=\"tag\">#<span>cultura</span></a> <a href=\"https://mastodon.bida.im/tags/hacker\" class=\"mention hashtag\" rel=\"tag\">#<span>hacker</span></a>, ha realizzato la prima Graphic Novel di una collana, dal titolo: “<a href=\"https://mastodon.bida.im/tags/BettiRHC\" class=\"mention hashtag\" rel=\"tag\">#<span>BettiRHC</span></a>”.</p><p>2022! </p><p>Una guerra silenziosa per la conquista dei dati fa la prima vittima. Un semplice rettore di <a href=\"https://mastodon.bida.im/tags/universit%C3%A0\" class=\"mention hashtag\" rel=\"tag\">#<span>università</span></a>, creatore di un <a href=\"https://mastodon.bida.im/tags/software\" class=\"mention hashtag\" rel=\"tag\">#<span>software</span></a> segreto in grado di cambiare radicalmente la <a href=\"https://mastodon.bida.im/tags/programmazione\" class=\"mention hashtag\" rel=\"tag\">#<span>programmazione</span></a>, muore in circostanze misteriose, lasciando nei guai la moglie Anna e la figlia Betti.<br /> <br />Per i pre ordini, potete registrarvi qua: <a href=\"https://lnkd.in/dfjWvQTc\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dfjWvQTc</span><span class=\"invisible\"></span></a></p><p>SAVE THE DATE: GENNAIO 2023</p><p><a href=\"https://mastodon.bida.im/tags/hackerhood\" class=\"mention hashtag\" rel=\"tag\">#<span>hackerhood</span></a> <a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/hacker\" class=\"mention hashtag\" rel=\"tag\">#<span>hacker</span></a> <a href=\"https://mastodon.bida.im/tags/community\" class=\"mention hashtag\" rel=\"tag\">#<span>community</span></a> <a href=\"https://mastodon.bida.im/tags/bughunting\" class=\"mention hashtag\" rel=\"tag\">#<span>bughunting</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a> <a href=\"https://mastodon.bida.im/tags/fumetto\" class=\"mention hashtag\" rel=\"tag\">#<span>fumetto</span></a> <a href=\"https://mastodon.bida.im/tags/consapevolezza\" class=\"mention hashtag\" rel=\"tag\">#<span>consapevolezza</span></a> <a href=\"https://mastodon.bida.im/tags/comics\" class=\"mention hashtag\" rel=\"tag\">#<span>comics</span></a></p>"
},
"attachment": [
{
"type": "Document",
"mediaType": "image/jpeg",
"url": "https://mastodon.bida.im/system/media_attachments/files/109/303/215/067/177/127/original/e0aca790b4a9a053.jpg",
"name": null,
"blurhash": "UBQcn{iw_3x^9FIVD%%24TMw00%N9FIVD%xa",
"width": 1080,
"height": 1091
}
],
"tag": [
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/consapevolezza",
"name": "#consapevolezza"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cultura",
"name": "#cultura"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/hacker",
"name": "#hacker"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/BettiRHC",
"name": "#BettiRHC"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/universit%C3%A0",
"name": "#università"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/software",
"name": "#software"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/programmazione",
"name": "#programmazione"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/hackerhood",
"name": "#hackerhood"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/redhotcyber",
"name": "#redhotcyber"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/ethicalhacking",
"name": "#ethicalhacking"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/hacking",
"name": "#hacking"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/community",
"name": "#community"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/bughunting",
"name": "#bughunting"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybersecurity",
"name": "#cybersecurity"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/infosecurity",
"name": "#infosecurity"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/fumetto",
"name": "#fumetto"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/comics",
"name": "#comics"
}
],
"replies": {
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109303219290559688/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://mastodon.bida.im/users/redhotcyber/statuses/109303219290559688/replies?only_other_accounts=true&page=true",
"partOf": "https://mastodon.bida.im/users/redhotcyber/statuses/109303219290559688/replies",
"items": []
}
}
}
},
{
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109303211797231515/activity",
"type": "Create",
"actor": "https://mastodon.bida.im/users/redhotcyber",
"published": "2022-11-07T15:24:12Z",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://mastodon.bida.im/users/redhotcyber/followers"
],
"object": {
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109303211797231515",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2022-11-07T15:24:12Z",
"url": "https://mastodon.bida.im/@redhotcyber/109303211797231515",
"attributedTo": "https://mastodon.bida.im/users/redhotcyber",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://mastodon.bida.im/users/redhotcyber/followers"
],
"sensitive": false,
"atomUri": "https://mastodon.bida.im/users/redhotcyber/statuses/109303211797231515",
"inReplyToAtomUri": null,
"conversation": "tag:mastodon.bida.im,2022-11-07:objectId=41493483:objectType=Conversation",
"content": "<p>Revil ritorna e pubblica un Meme. Su “happy blog” la rivendicazione dell’attacco a Mediabank. Facciamo un po’ di storia</p><p>La famosa cybergang <a href=\"https://mastodon.bida.im/tags/REvil\" class=\"mention hashtag\" rel=\"tag\">#<span>REvil</span></a>, della quale abbiamo parlato moltissimo nel 2021, che fece conoscere ai più il mondo del <a href=\"https://mastodon.bida.im/tags/ransomware\" class=\"mention hashtag\" rel=\"tag\">#<span>ransomware</span></a> con l’attacco distribuito a <a href=\"https://mastodon.bida.im/tags/Kaseya\" class=\"mention hashtag\" rel=\"tag\">#<span>Kaseya</span></a>, in modo intermittente pubblica nuove <a href=\"https://mastodon.bida.im/tags/vittime\" class=\"mention hashtag\" rel=\"tag\">#<span>vittime</span></a> sul suo data leak site (<a href=\"https://mastodon.bida.im/tags/DLS\" class=\"mention hashtag\" rel=\"tag\">#<span>DLS</span></a>), chiamato in modo scherzoso “<a href=\"https://mastodon.bida.im/tags/happyblog\" class=\"mention hashtag\" rel=\"tag\">#<span>happyblog</span></a>”.</p><p>Nell'articolo, ripercorreremo la <a href=\"https://mastodon.bida.im/tags/storia\" class=\"mention hashtag\" rel=\"tag\">#<span>storia</span></a> di questa celebre <a href=\"https://mastodon.bida.im/tags/cybergang\" class=\"mention hashtag\" rel=\"tag\">#<span>cybergang</span></a>, e il suo culmine, quando colpì migliaia di aziende con un <a href=\"https://mastodon.bida.im/tags/ransomware\" class=\"mention hashtag\" rel=\"tag\">#<span>ransomware</span></a> <a href=\"https://mastodon.bida.im/tags/distribuito\" class=\"mention hashtag\" rel=\"tag\">#<span>distribuito</span></a> contenuto all'interno degli aggiornamenti del software Kaseya chiedendo 70 milioni di dollari come riscatto.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/d4--A8i7\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/d4--A8i7</span><span class=\"invisible\"></span></a></p>",
"contentMap": {
"it": "<p>Revil ritorna e pubblica un Meme. Su “happy blog” la rivendicazione dell’attacco a Mediabank. Facciamo un po’ di storia</p><p>La famosa cybergang <a href=\"https://mastodon.bida.im/tags/REvil\" class=\"mention hashtag\" rel=\"tag\">#<span>REvil</span></a>, della quale abbiamo parlato moltissimo nel 2021, che fece conoscere ai più il mondo del <a href=\"https://mastodon.bida.im/tags/ransomware\" class=\"mention hashtag\" rel=\"tag\">#<span>ransomware</span></a> con l’attacco distribuito a <a href=\"https://mastodon.bida.im/tags/Kaseya\" class=\"mention hashtag\" rel=\"tag\">#<span>Kaseya</span></a>, in modo intermittente pubblica nuove <a href=\"https://mastodon.bida.im/tags/vittime\" class=\"mention hashtag\" rel=\"tag\">#<span>vittime</span></a> sul suo data leak site (<a href=\"https://mastodon.bida.im/tags/DLS\" class=\"mention hashtag\" rel=\"tag\">#<span>DLS</span></a>), chiamato in modo scherzoso “<a href=\"https://mastodon.bida.im/tags/happyblog\" class=\"mention hashtag\" rel=\"tag\">#<span>happyblog</span></a>”.</p><p>Nell'articolo, ripercorreremo la <a href=\"https://mastodon.bida.im/tags/storia\" class=\"mention hashtag\" rel=\"tag\">#<span>storia</span></a> di questa celebre <a href=\"https://mastodon.bida.im/tags/cybergang\" class=\"mention hashtag\" rel=\"tag\">#<span>cybergang</span></a>, e il suo culmine, quando colpì migliaia di aziende con un <a href=\"https://mastodon.bida.im/tags/ransomware\" class=\"mention hashtag\" rel=\"tag\">#<span>ransomware</span></a> <a href=\"https://mastodon.bida.im/tags/distribuito\" class=\"mention hashtag\" rel=\"tag\">#<span>distribuito</span></a> contenuto all'interno degli aggiornamenti del software Kaseya chiedendo 70 milioni di dollari come riscatto.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/d4--A8i7\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/d4--A8i7</span><span class=\"invisible\"></span></a></p>"
},
"attachment": [
{
"type": "Document",
"mediaType": "image/jpeg",
"url": "https://mastodon.bida.im/system/media_attachments/files/109/303/209/053/010/208/original/2362444dc19ec65b.jpg",
"name": null,
"blurhash": "UMC~uG9xSd-nJEs:t7oe1P?FsSE2$xM~ozs.",
"width": 661,
"height": 661
}
],
"tag": [
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/revil",
"name": "#revil"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/ransomware",
"name": "#ransomware"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/kaseya",
"name": "#kaseya"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/vittime",
"name": "#vittime"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/dls",
"name": "#dls"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/happyblog",
"name": "#happyblog"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/storia",
"name": "#storia"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/Cybergang",
"name": "#Cybergang"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/distribuito",
"name": "#distribuito"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/redhotcyber",
"name": "#redhotcyber"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/dataprotection",
"name": "#dataprotection"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/hacking",
"name": "#hacking"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybersecurity",
"name": "#cybersecurity"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybercrime",
"name": "#cybercrime"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/CyberSecurityAwareness",
"name": "#CyberSecurityAwareness"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybersecuritytraining",
"name": "#cybersecuritytraining"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/CyberSecurityNews",
"name": "#CyberSecurityNews"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/infosecurity",
"name": "#infosecurity"
}
],
"replies": {
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109303211797231515/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://mastodon.bida.im/users/redhotcyber/statuses/109303211797231515/replies?only_other_accounts=true&page=true",
"partOf": "https://mastodon.bida.im/users/redhotcyber/statuses/109303211797231515/replies",
"items": []
}
}
}
},
{
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109302232103844428/activity",
"type": "Create",
"actor": "https://mastodon.bida.im/users/redhotcyber",
"published": "2022-11-07T11:15:03Z",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://mastodon.bida.im/users/redhotcyber/followers"
],
"object": {
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109302232103844428",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2022-11-07T11:15:03Z",
"url": "https://mastodon.bida.im/@redhotcyber/109302232103844428",
"attributedTo": "https://mastodon.bida.im/users/redhotcyber",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://mastodon.bida.im/users/redhotcyber/followers"
],
"sensitive": false,
"atomUri": "https://mastodon.bida.im/users/redhotcyber/statuses/109302232103844428",
"inReplyToAtomUri": null,
"conversation": "tag:mastodon.bida.im,2022-11-07:objectId=41477936:objectType=Conversation",
"content": "<p>70.000 nuovi dati personali di italiani in vendita nelle underground. Nessuna corrispondenza con gli ultimi leak</p><p>Abbiamo fatto delle correlazioni con altri campioni di <a href=\"https://mastodon.bida.im/tags/dati\" class=\"mention hashtag\" rel=\"tag\">#<span>dati</span></a> in vendita nelle <a href=\"https://mastodon.bida.im/tags/underground\" class=\"mention hashtag\" rel=\"tag\">#<span>underground</span></a>, come le 35 milioni di transazioni relative all'e-commerce violato e il samples proveniente dal forum <a href=\"https://mastodon.bida.im/tags/XSS\" class=\"mention hashtag\" rel=\"tag\">#<span>XSS</span></a> che mette in vendita informazioni <a href=\"https://mastodon.bida.im/tags/Forex\" class=\"mention hashtag\" rel=\"tag\">#<span>Forex</span></a> <a href=\"https://mastodon.bida.im/tags/Crypto\" class=\"mention hashtag\" rel=\"tag\">#<span>Crypto</span></a> lead/Database per 3000 dollari.</p><p>Tali dati sembrano non essere afferenti a tali samples.</p><p>Pertanto la domanda sorge spontanea: chi ancora non ha i propri dati in vendita o pubblicati nelle underground?</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dFw3CGzx\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dFw3CGzx</span><span class=\"invisible\"></span></a></p>",
"contentMap": {
"it": "<p>70.000 nuovi dati personali di italiani in vendita nelle underground. Nessuna corrispondenza con gli ultimi leak</p><p>Abbiamo fatto delle correlazioni con altri campioni di <a href=\"https://mastodon.bida.im/tags/dati\" class=\"mention hashtag\" rel=\"tag\">#<span>dati</span></a> in vendita nelle <a href=\"https://mastodon.bida.im/tags/underground\" class=\"mention hashtag\" rel=\"tag\">#<span>underground</span></a>, come le 35 milioni di transazioni relative all'e-commerce violato e il samples proveniente dal forum <a href=\"https://mastodon.bida.im/tags/XSS\" class=\"mention hashtag\" rel=\"tag\">#<span>XSS</span></a> che mette in vendita informazioni <a href=\"https://mastodon.bida.im/tags/Forex\" class=\"mention hashtag\" rel=\"tag\">#<span>Forex</span></a> <a href=\"https://mastodon.bida.im/tags/Crypto\" class=\"mention hashtag\" rel=\"tag\">#<span>Crypto</span></a> lead/Database per 3000 dollari.</p><p>Tali dati sembrano non essere afferenti a tali samples.</p><p>Pertanto la domanda sorge spontanea: chi ancora non ha i propri dati in vendita o pubblicati nelle underground?</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dFw3CGzx\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dFw3CGzx</span><span class=\"invisible\"></span></a></p>"
},
"attachment": [
{
"type": "Document",
"mediaType": "image/jpeg",
"url": "https://mastodon.bida.im/system/media_attachments/files/109/302/231/285/961/713/original/e0e58d25a3b63fc6.jpeg",
"name": null,
"blurhash": "UsKnbsXRITWB~qW.M_WCD%WBRkafIUoLWBay",
"width": 800,
"height": 480
}
],
"tag": [
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/dati",
"name": "#dati"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/underground",
"name": "#underground"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/xss",
"name": "#xss"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/forex",
"name": "#forex"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/crypto",
"name": "#crypto"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/redhotcyber",
"name": "#redhotcyber"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/informationsecurity",
"name": "#informationsecurity"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/ethicalhacking",
"name": "#ethicalhacking"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/dataprotection",
"name": "#dataprotection"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/hacking",
"name": "#hacking"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybersecurity",
"name": "#cybersecurity"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybercrime",
"name": "#cybercrime"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/CyberSecurityAwareness",
"name": "#CyberSecurityAwareness"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybersecuritytraining",
"name": "#cybersecuritytraining"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/CyberSecurityNews",
"name": "#CyberSecurityNews"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/privacy",
"name": "#privacy"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/infosecurity",
"name": "#infosecurity"
}
],
"replies": {
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109302232103844428/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://mastodon.bida.im/users/redhotcyber/statuses/109302232103844428/replies?only_other_accounts=true&page=true",
"partOf": "https://mastodon.bida.im/users/redhotcyber/statuses/109302232103844428/replies",
"items": []
}
}
}
},
{
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109302228550008372/activity",
"type": "Create",
"actor": "https://mastodon.bida.im/users/redhotcyber",
"published": "2022-11-07T11:14:09Z",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://mastodon.bida.im/users/redhotcyber/followers"
],
"object": {
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109302228550008372",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2022-11-07T11:14:09Z",
"url": "https://mastodon.bida.im/@redhotcyber/109302228550008372",
"attributedTo": "https://mastodon.bida.im/users/redhotcyber",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://mastodon.bida.im/users/redhotcyber/followers"
],
"sensitive": false,
"atomUri": "https://mastodon.bida.im/users/redhotcyber/statuses/109302228550008372",
"inReplyToAtomUri": null,
"conversation": "tag:mastodon.bida.im,2022-11-07:objectId=41477884:objectType=Conversation",
"content": "<p>L’ufficio federale della Germania riporta che le minacce informatiche sono “più alte che mai”</p><p>L’Ufficio <a href=\"https://mastodon.bida.im/tags/federale\" class=\"mention hashtag\" rel=\"tag\">#<span>federale</span></a> tedesco per la sicurezza <a href=\"https://mastodon.bida.im/tags/informatica\" class=\"mention hashtag\" rel=\"tag\">#<span>informatica</span></a> (<a href=\"https://mastodon.bida.im/tags/BSI\" class=\"mention hashtag\" rel=\"tag\">#<span>BSI</span></a>) ha avvertito che il <a href=\"https://mastodon.bida.im/tags/ransomware\" class=\"mention hashtag\" rel=\"tag\">#<span>ransomware</span></a>, gli attacchi <a href=\"https://mastodon.bida.im/tags/informatici\" class=\"mention hashtag\" rel=\"tag\">#<span>informatici</span></a> a sfondo politico e altre minacce alla sicurezza tedesca sono “più alte che mai”.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/d45C_KUj\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/d45C_KUj</span><span class=\"invisible\"></span></a></p>",
"contentMap": {
"it": "<p>L’ufficio federale della Germania riporta che le minacce informatiche sono “più alte che mai”</p><p>L’Ufficio <a href=\"https://mastodon.bida.im/tags/federale\" class=\"mention hashtag\" rel=\"tag\">#<span>federale</span></a> tedesco per la sicurezza <a href=\"https://mastodon.bida.im/tags/informatica\" class=\"mention hashtag\" rel=\"tag\">#<span>informatica</span></a> (<a href=\"https://mastodon.bida.im/tags/BSI\" class=\"mention hashtag\" rel=\"tag\">#<span>BSI</span></a>) ha avvertito che il <a href=\"https://mastodon.bida.im/tags/ransomware\" class=\"mention hashtag\" rel=\"tag\">#<span>ransomware</span></a>, gli attacchi <a href=\"https://mastodon.bida.im/tags/informatici\" class=\"mention hashtag\" rel=\"tag\">#<span>informatici</span></a> a sfondo politico e altre minacce alla sicurezza tedesca sono “più alte che mai”.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/d45C_KUj\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/d45C_KUj</span><span class=\"invisible\"></span></a></p>"
},
"attachment": [
{
"type": "Document",
"mediaType": "image/jpeg",
"url": "https://mastodon.bida.im/system/media_attachments/files/109/302/228/177/157/561/original/df6309d5fed8e4fe.jpeg",
"name": null,
"blurhash": "UNGb3VEhiHRiEMWBW.jF01oI%gozV?oLs:e-",
"width": 800,
"height": 480
}
],
"tag": [
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/federale",
"name": "#federale"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/informatica",
"name": "#informatica"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/bsi",
"name": "#bsi"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/ransomware",
"name": "#ransomware"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/informatici",
"name": "#informatici"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/redhotcyber",
"name": "#redhotcyber"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/informationsecurity",
"name": "#informationsecurity"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/ethicalhacking",
"name": "#ethicalhacking"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/dataprotection",
"name": "#dataprotection"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/hacking",
"name": "#hacking"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybersecurity",
"name": "#cybersecurity"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybercrime",
"name": "#cybercrime"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/CyberSecurityAwareness",
"name": "#CyberSecurityAwareness"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybersecuritytraining",
"name": "#cybersecuritytraining"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/CyberSecurityNews",
"name": "#CyberSecurityNews"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/privacy",
"name": "#privacy"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/infosecurity",
"name": "#infosecurity"
}
],
"replies": {
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109302228550008372/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://mastodon.bida.im/users/redhotcyber/statuses/109302228550008372/replies?only_other_accounts=true&page=true",
"partOf": "https://mastodon.bida.im/users/redhotcyber/statuses/109302228550008372/replies",
"items": []
}
}
}
},
{
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109302225646611168/activity",
"type": "Create",
"actor": "https://mastodon.bida.im/users/redhotcyber",
"published": "2022-11-07T11:13:25Z",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://mastodon.bida.im/users/redhotcyber/followers"
],
"object": {
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109302225646611168",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2022-11-07T11:13:25Z",
"url": "https://mastodon.bida.im/@redhotcyber/109302225646611168",
"attributedTo": "https://mastodon.bida.im/users/redhotcyber",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://mastodon.bida.im/users/redhotcyber/followers"
],
"sensitive": false,
"atomUri": "https://mastodon.bida.im/users/redhotcyber/statuses/109302225646611168",
"inReplyToAtomUri": null,
"conversation": "tag:mastodon.bida.im,2022-11-07:objectId=41477821:objectType=Conversation",
"content": "<p>Ora il riscatto arriva nei pacchetti DDoS. L’evoluzione di Fodcha tra estorsione e razzismo</p><p>Una nuova <a href=\"https://mastodon.bida.im/tags/botnet\" class=\"mention hashtag\" rel=\"tag\">#<span>botnet</span></a> scoperta all’inizio del 2022 da parte del laboratorio di Threat <a href=\"https://mastodon.bida.im/tags/Intelligence\" class=\"mention hashtag\" rel=\"tag\">#<span>Intelligence</span></a> di <a href=\"https://mastodon.bida.im/tags/360NetLabs\" class=\"mention hashtag\" rel=\"tag\">#<span>360NetLabs</span></a> si evolve massicciamente.</p><p>L’evoluzione di <a href=\"https://mastodon.bida.im/tags/Fodcha\" class=\"mention hashtag\" rel=\"tag\">#<span>Fodcha</span></a> è caratterizzata da una maggiore protezione dei <a href=\"https://mastodon.bida.im/tags/server\" class=\"mention hashtag\" rel=\"tag\">#<span>server</span></a> <a href=\"https://mastodon.bida.im/tags/C2\" class=\"mention hashtag\" rel=\"tag\">#<span>C2</span></a>, l’aggiunta di una richiesta di <a href=\"https://mastodon.bida.im/tags/riscatto\" class=\"mention hashtag\" rel=\"tag\">#<span>riscatto</span></a> all'interno dei pacchetti DDoS ed una componente razzista.</p><p>A cura di Eros Capobianco.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/daPcusi4\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/daPcusi4</span><span class=\"invisible\"></span></a></p>",
"contentMap": {
"it": "<p>Ora il riscatto arriva nei pacchetti DDoS. L’evoluzione di Fodcha tra estorsione e razzismo</p><p>Una nuova <a href=\"https://mastodon.bida.im/tags/botnet\" class=\"mention hashtag\" rel=\"tag\">#<span>botnet</span></a> scoperta all’inizio del 2022 da parte del laboratorio di Threat <a href=\"https://mastodon.bida.im/tags/Intelligence\" class=\"mention hashtag\" rel=\"tag\">#<span>Intelligence</span></a> di <a href=\"https://mastodon.bida.im/tags/360NetLabs\" class=\"mention hashtag\" rel=\"tag\">#<span>360NetLabs</span></a> si evolve massicciamente.</p><p>L’evoluzione di <a href=\"https://mastodon.bida.im/tags/Fodcha\" class=\"mention hashtag\" rel=\"tag\">#<span>Fodcha</span></a> è caratterizzata da una maggiore protezione dei <a href=\"https://mastodon.bida.im/tags/server\" class=\"mention hashtag\" rel=\"tag\">#<span>server</span></a> <a href=\"https://mastodon.bida.im/tags/C2\" class=\"mention hashtag\" rel=\"tag\">#<span>C2</span></a>, l’aggiunta di una richiesta di <a href=\"https://mastodon.bida.im/tags/riscatto\" class=\"mention hashtag\" rel=\"tag\">#<span>riscatto</span></a> all'interno dei pacchetti DDoS ed una componente razzista.</p><p>A cura di Eros Capobianco.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/daPcusi4\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/daPcusi4</span><span class=\"invisible\"></span></a></p>"
},
"attachment": [
{
"type": "Document",
"mediaType": "image/jpeg",
"url": "https://mastodon.bida.im/system/media_attachments/files/109/302/224/698/271/357/original/51d7ed8682095efa.jpeg",
"name": null,
"blurhash": "UrBERVWBsjj?tmWAoIbIMaf6NLWXMwj]WYoJ",
"width": 800,
"height": 480
}
],
"tag": [
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/botnet",
"name": "#botnet"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/intelligence",
"name": "#intelligence"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/360NetLabs",
"name": "#360NetLabs"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/Fodcha",
"name": "#Fodcha"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/server",
"name": "#server"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/c2",
"name": "#c2"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/riscatto",
"name": "#riscatto"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/redhotcyber",
"name": "#redhotcyber"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/informationsecurity",
"name": "#informationsecurity"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/ethicalhacking",
"name": "#ethicalhacking"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/dataprotection",
"name": "#dataprotection"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/hacking",
"name": "#hacking"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybersecurity",
"name": "#cybersecurity"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybercrime",
"name": "#cybercrime"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/CyberSecurityAwareness",
"name": "#CyberSecurityAwareness"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybersecuritytraining",
"name": "#cybersecuritytraining"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/CyberSecurityNews",
"name": "#CyberSecurityNews"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/privacy",
"name": "#privacy"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/infosecurity",
"name": "#infosecurity"
}
],
"replies": {
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109302225646611168/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://mastodon.bida.im/users/redhotcyber/statuses/109302225646611168/replies?only_other_accounts=true&page=true",
"partOf": "https://mastodon.bida.im/users/redhotcyber/statuses/109302225646611168/replies",
"items": []
}
}
}
},
{
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109301236780274962/activity",
"type": "Create",
"actor": "https://mastodon.bida.im/users/redhotcyber",
"published": "2022-11-07T07:01:56Z",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://mastodon.bida.im/users/redhotcyber/followers"
],
"object": {
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109301236780274962",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2022-11-07T07:01:56Z",
"url": "https://mastodon.bida.im/@redhotcyber/109301236780274962",
"attributedTo": "https://mastodon.bida.im/users/redhotcyber",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://mastodon.bida.im/users/redhotcyber/followers"
],
"sensitive": false,
"atomUri": "https://mastodon.bida.im/users/redhotcyber/statuses/109301236780274962",
"inReplyToAtomUri": null,
"conversation": "tag:mastodon.bida.im,2022-11-07:objectId=41462748:objectType=Conversation",
"content": "<p>E se le chat tra vittima e gang ransomware venissero pubblicate? Lockbit: “è una introduzione dal programma idee geniali”</p><p>Come sappiamo, le <a href=\"https://mastodon.bida.im/tags/cybergang\" class=\"mention hashtag\" rel=\"tag\">#<span>cybergang</span></a> <a href=\"https://mastodon.bida.im/tags/ransomware\" class=\"mention hashtag\" rel=\"tag\">#<span>ransomware</span></a> evolvono costantemente le loro tecniche, tattiche e procedure (<a href=\"https://mastodon.bida.im/tags/TTP\" class=\"mention hashtag\" rel=\"tag\">#<span>TTP</span></a>) e non ultime le <a href=\"https://mastodon.bida.im/tags/tattiche\" class=\"mention hashtag\" rel=\"tag\">#<span>tattiche</span></a> di <a href=\"https://mastodon.bida.im/tags/estorsione\" class=\"mention hashtag\" rel=\"tag\">#<span>estorsione</span></a> consentono di aumentare la <a href=\"https://mastodon.bida.im/tags/pressione\" class=\"mention hashtag\" rel=\"tag\">#<span>pressione</span></a> verso le aziende violate in modo da consentire una <a href=\"https://mastodon.bida.im/tags/monetizzazione\" class=\"mention hashtag\" rel=\"tag\">#<span>monetizzazione</span></a> anche nelle situazioni più difficili.</p><p>Abbiamo chiesto a LockBit se questa introduzione fosse il frutto di qualche "idea geniale" ed in effetti è stato proprio così.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dWSYZBDG\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dWSYZBDG</span><span class=\"invisible\"></span></a></p>",
"contentMap": {
"it": "<p>E se le chat tra vittima e gang ransomware venissero pubblicate? Lockbit: “è una introduzione dal programma idee geniali”</p><p>Come sappiamo, le <a href=\"https://mastodon.bida.im/tags/cybergang\" class=\"mention hashtag\" rel=\"tag\">#<span>cybergang</span></a> <a href=\"https://mastodon.bida.im/tags/ransomware\" class=\"mention hashtag\" rel=\"tag\">#<span>ransomware</span></a> evolvono costantemente le loro tecniche, tattiche e procedure (<a href=\"https://mastodon.bida.im/tags/TTP\" class=\"mention hashtag\" rel=\"tag\">#<span>TTP</span></a>) e non ultime le <a href=\"https://mastodon.bida.im/tags/tattiche\" class=\"mention hashtag\" rel=\"tag\">#<span>tattiche</span></a> di <a href=\"https://mastodon.bida.im/tags/estorsione\" class=\"mention hashtag\" rel=\"tag\">#<span>estorsione</span></a> consentono di aumentare la <a href=\"https://mastodon.bida.im/tags/pressione\" class=\"mention hashtag\" rel=\"tag\">#<span>pressione</span></a> verso le aziende violate in modo da consentire una <a href=\"https://mastodon.bida.im/tags/monetizzazione\" class=\"mention hashtag\" rel=\"tag\">#<span>monetizzazione</span></a> anche nelle situazioni più difficili.</p><p>Abbiamo chiesto a LockBit se questa introduzione fosse il frutto di qualche "idea geniale" ed in effetti è stato proprio così.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dWSYZBDG\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dWSYZBDG</span><span class=\"invisible\"></span></a></p>"
},
"attachment": [
{
"type": "Document",
"mediaType": "image/jpeg",
"url": "https://mastodon.bida.im/system/media_attachments/files/109/301/235/560/561/283/original/1248664f5c0dea3f.jpg",
"name": null,
"blurhash": "UQA+~qJ,I:r?RPj[Sgjt0e#-t7S#%MWVr?f6",
"width": 662,
"height": 662
}
],
"tag": [
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/Cybergang",
"name": "#Cybergang"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/ransomware",
"name": "#ransomware"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/ttp",
"name": "#ttp"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/tattiche",
"name": "#tattiche"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/estorsione",
"name": "#estorsione"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/pressione",
"name": "#pressione"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/monetizzazione",
"name": "#monetizzazione"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/redhotcyber",
"name": "#redhotcyber"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/informationsecurity",
"name": "#informationsecurity"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/ethicalhacking",
"name": "#ethicalhacking"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/dataprotection",
"name": "#dataprotection"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/hacking",
"name": "#hacking"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybersecurity",
"name": "#cybersecurity"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybercrime",
"name": "#cybercrime"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/CyberSecurityAwareness",
"name": "#CyberSecurityAwareness"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybersecuritytraining",
"name": "#cybersecuritytraining"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/CyberSecurityNews",
"name": "#CyberSecurityNews"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/privacy",
"name": "#privacy"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/infosecurity",
"name": "#infosecurity"
}
],
"replies": {
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109301236780274962/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://mastodon.bida.im/users/redhotcyber/statuses/109301236780274962/replies?only_other_accounts=true&page=true",
"partOf": "https://mastodon.bida.im/users/redhotcyber/statuses/109301236780274962/replies",
"items": []
}
}
}
},
{
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109301230212808154/activity",
"type": "Create",
"actor": "https://mastodon.bida.im/users/redhotcyber",
"published": "2022-11-07T07:00:16Z",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://mastodon.bida.im/users/redhotcyber/followers"
],
"object": {
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109301230212808154",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2022-11-07T07:00:16Z",
"url": "https://mastodon.bida.im/@redhotcyber/109301230212808154",
"attributedTo": "https://mastodon.bida.im/users/redhotcyber",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://mastodon.bida.im/users/redhotcyber/followers"
],
"sensitive": false,
"atomUri": "https://mastodon.bida.im/users/redhotcyber/statuses/109301230212808154",
"inReplyToAtomUri": null,
"conversation": "tag:mastodon.bida.im,2022-11-07:objectId=41462660:objectType=Conversation",
"content": "<p>Microsoft risolve un bug critico di Remote Code Execution su Azure Cosmos DB</p><p>Gli analisti di <a href=\"https://mastodon.bida.im/tags/OrcaSecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>OrcaSecurity</span></a> hanno scoperto una vulnerabilità critica che interessa <a href=\"https://mastodon.bida.im/tags/Azure\" class=\"mention hashtag\" rel=\"tag\">#<span>Azure</span></a> <a href=\"https://mastodon.bida.im/tags/CosmosDB\" class=\"mention hashtag\" rel=\"tag\">#<span>CosmosDB</span></a>.</p><p>Il problema, soprannominato <a href=\"https://mastodon.bida.im/tags/CosMiss\" class=\"mention hashtag\" rel=\"tag\">#<span>CosMiss</span></a> dai <a href=\"https://mastodon.bida.im/tags/ricercatori\" class=\"mention hashtag\" rel=\"tag\">#<span>ricercatori</span></a>, consentiva l’accesso non autorizzato in lettura e scrittura ai container, nonché l’esecuzione arbitraria di codice.</p><p>La <a href=\"https://mastodon.bida.im/tags/vulnerabilit%C3%A0\" class=\"mention hashtag\" rel=\"tag\">#<span>vulnerabilità</span></a> è correlata a Jupyter Notebook per Azure Cosmos DB, che si integra con gli account Azure e Azure Cosmos DB per semplificare l’analisi e la visualizzazione dei <a href=\"https://mastodon.bida.im/tags/dati\" class=\"mention hashtag\" rel=\"tag\">#<span>dati</span></a> <a href=\"https://mastodon.bida.im/tags/NoSQL\" class=\"mention hashtag\" rel=\"tag\">#<span>NoSQL</span></a> e dei risultati delle query.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/d9Jem4dF\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/d9Jem4dF</span><span class=\"invisible\"></span></a></p>",
"contentMap": {
"it": "<p>Microsoft risolve un bug critico di Remote Code Execution su Azure Cosmos DB</p><p>Gli analisti di <a href=\"https://mastodon.bida.im/tags/OrcaSecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>OrcaSecurity</span></a> hanno scoperto una vulnerabilità critica che interessa <a href=\"https://mastodon.bida.im/tags/Azure\" class=\"mention hashtag\" rel=\"tag\">#<span>Azure</span></a> <a href=\"https://mastodon.bida.im/tags/CosmosDB\" class=\"mention hashtag\" rel=\"tag\">#<span>CosmosDB</span></a>.</p><p>Il problema, soprannominato <a href=\"https://mastodon.bida.im/tags/CosMiss\" class=\"mention hashtag\" rel=\"tag\">#<span>CosMiss</span></a> dai <a href=\"https://mastodon.bida.im/tags/ricercatori\" class=\"mention hashtag\" rel=\"tag\">#<span>ricercatori</span></a>, consentiva l’accesso non autorizzato in lettura e scrittura ai container, nonché l’esecuzione arbitraria di codice.</p><p>La <a href=\"https://mastodon.bida.im/tags/vulnerabilit%C3%A0\" class=\"mention hashtag\" rel=\"tag\">#<span>vulnerabilità</span></a> è correlata a Jupyter Notebook per Azure Cosmos DB, che si integra con gli account Azure e Azure Cosmos DB per semplificare l’analisi e la visualizzazione dei <a href=\"https://mastodon.bida.im/tags/dati\" class=\"mention hashtag\" rel=\"tag\">#<span>dati</span></a> <a href=\"https://mastodon.bida.im/tags/NoSQL\" class=\"mention hashtag\" rel=\"tag\">#<span>NoSQL</span></a> e dei risultati delle query.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/d9Jem4dF\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/d9Jem4dF</span><span class=\"invisible\"></span></a></p>"
},
"attachment": [
{
"type": "Document",
"mediaType": "image/jpeg",
"url": "https://mastodon.bida.im/system/media_attachments/files/109/301/229/233/416/995/original/433ed0e6fca86919.jpg",
"name": null,
"blurhash": "U038@nj[D%j@WAfQj[f7D*fQWBazf5a{WBj[",
"width": 1079,
"height": 686
}
],
"tag": [
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/OrcaSecurity",
"name": "#OrcaSecurity"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/azure",
"name": "#azure"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cosmosdb",
"name": "#cosmosdb"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/CosMiss",
"name": "#CosMiss"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/ricercatori",
"name": "#ricercatori"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/vulnerabilit%C3%A0",
"name": "#vulnerabilità"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/dati",
"name": "#dati"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/nosql",
"name": "#nosql"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/redhotcyber",
"name": "#redhotcyber"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/informationsecurity",
"name": "#informationsecurity"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/ethicalhacking",
"name": "#ethicalhacking"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/dataprotection",
"name": "#dataprotection"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/hacking",
"name": "#hacking"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybersecurity",
"name": "#cybersecurity"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybercrime",
"name": "#cybercrime"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/CyberSecurityAwareness",
"name": "#CyberSecurityAwareness"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybersecuritytraining",
"name": "#cybersecuritytraining"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/CyberSecurityNews",
"name": "#CyberSecurityNews"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/privacy",
"name": "#privacy"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/infosecurity",
"name": "#infosecurity"
}
],
"replies": {
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109301230212808154/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://mastodon.bida.im/users/redhotcyber/statuses/109301230212808154/replies?only_other_accounts=true&page=true",
"partOf": "https://mastodon.bida.im/users/redhotcyber/statuses/109301230212808154/replies",
"items": []
}
}
}
},
{
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109298364109199002/activity",
"type": "Create",
"actor": "https://mastodon.bida.im/users/redhotcyber",
"published": "2022-11-06T18:51:22Z",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://mastodon.bida.im/users/redhotcyber/followers"
],
"object": {
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109298364109199002",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2022-11-06T18:51:22Z",
"url": "https://mastodon.bida.im/@redhotcyber/109298364109199002",
"attributedTo": "https://mastodon.bida.im/users/redhotcyber",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://mastodon.bida.im/users/redhotcyber/followers"
],
"sensitive": false,
"atomUri": "https://mastodon.bida.im/users/redhotcyber/statuses/109298364109199002",
"inReplyToAtomUri": null,
"conversation": "tag:mastodon.bida.im,2022-11-06:objectId=41428802:objectType=Conversation",
"content": "<p>Un attacco alla supply chain blocca le ferrovie Danesi</p><p>Il <a href=\"https://mastodon.bida.im/tags/software\" class=\"mention hashtag\" rel=\"tag\">#<span>software</span></a> delle ferrovie danesi (<a href=\"https://mastodon.bida.im/tags/DSB\" class=\"mention hashtag\" rel=\"tag\">#<span>DSB</span></a>) di <a href=\"https://mastodon.bida.im/tags/Supeo\" class=\"mention hashtag\" rel=\"tag\">#<span>Supeo</span></a> ha subito un grave hack durante il fine settimana, bloccando i treni in tutto il paese da sabato, lo ha riportato Danmarks Radio.</p><p>Secondo quanto riferito, un attacco informatico ai <a href=\"https://mastodon.bida.im/tags/sistemi\" class=\"mention hashtag\" rel=\"tag\">#<span>sistemi</span></a> di un <a href=\"https://mastodon.bida.im/tags/appaltatore\" class=\"mention hashtag\" rel=\"tag\">#<span>appaltatore</span></a> <a href=\"https://mastodon.bida.im/tags/software\" class=\"mention hashtag\" rel=\"tag\">#<span>software</span></a> è stata la causa dell’interruzione dei treni.</p><p>Si noti che i malintenzionati hanno attaccato un programma utilizzato dai macchinisti per accedere a <a href=\"https://mastodon.bida.im/tags/informazioni\" class=\"mention hashtag\" rel=\"tag\">#<span>informazioni</span></a> riservate sulla ferrovia. </p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dXBFDTvG\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dXBFDTvG</span><span class=\"invisible\"></span></a></p>",
"contentMap": {
"it": "<p>Un attacco alla supply chain blocca le ferrovie Danesi</p><p>Il <a href=\"https://mastodon.bida.im/tags/software\" class=\"mention hashtag\" rel=\"tag\">#<span>software</span></a> delle ferrovie danesi (<a href=\"https://mastodon.bida.im/tags/DSB\" class=\"mention hashtag\" rel=\"tag\">#<span>DSB</span></a>) di <a href=\"https://mastodon.bida.im/tags/Supeo\" class=\"mention hashtag\" rel=\"tag\">#<span>Supeo</span></a> ha subito un grave hack durante il fine settimana, bloccando i treni in tutto il paese da sabato, lo ha riportato Danmarks Radio.</p><p>Secondo quanto riferito, un attacco informatico ai <a href=\"https://mastodon.bida.im/tags/sistemi\" class=\"mention hashtag\" rel=\"tag\">#<span>sistemi</span></a> di un <a href=\"https://mastodon.bida.im/tags/appaltatore\" class=\"mention hashtag\" rel=\"tag\">#<span>appaltatore</span></a> <a href=\"https://mastodon.bida.im/tags/software\" class=\"mention hashtag\" rel=\"tag\">#<span>software</span></a> è stata la causa dell’interruzione dei treni.</p><p>Si noti che i malintenzionati hanno attaccato un programma utilizzato dai macchinisti per accedere a <a href=\"https://mastodon.bida.im/tags/informazioni\" class=\"mention hashtag\" rel=\"tag\">#<span>informazioni</span></a> riservate sulla ferrovia. </p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dXBFDTvG\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dXBFDTvG</span><span class=\"invisible\"></span></a></p>"
},
"attachment": [
{
"type": "Document",
"mediaType": "image/jpeg",
"url": "https://mastodon.bida.im/system/media_attachments/files/109/298/363/965/278/618/original/dc26e4d176e7278a.jpg",
"name": null,
"blurhash": "UUEpj3VrRkt6GKWEs.WWtSt8WBjsI9ozj[WB",
"width": 1079,
"height": 718
}
],
"tag": [
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/software",
"name": "#software"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/dsb",
"name": "#dsb"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/Supeo",
"name": "#Supeo"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/sistemi",
"name": "#sistemi"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/appaltatore",
"name": "#appaltatore"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/informazioni",
"name": "#informazioni"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/redhotcyber",
"name": "#redhotcyber"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/informationsecurity",
"name": "#informationsecurity"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/ethicalhacking",
"name": "#ethicalhacking"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/dataprotection",
"name": "#dataprotection"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/hacking",
"name": "#hacking"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybersecurity",
"name": "#cybersecurity"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybercrime",
"name": "#cybercrime"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/CyberSecurityAwareness",
"name": "#CyberSecurityAwareness"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybersecuritytraining",
"name": "#cybersecuritytraining"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/CyberSecurityNews",
"name": "#CyberSecurityNews"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/privacy",
"name": "#privacy"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/infosecurity",
"name": "#infosecurity"
}
],
"replies": {
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109298364109199002/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://mastodon.bida.im/users/redhotcyber/statuses/109298364109199002/replies?only_other_accounts=true&page=true",
"partOf": "https://mastodon.bida.im/users/redhotcyber/statuses/109298364109199002/replies",
"items": []
}
}
}
},
{
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109298361168777021/activity",
"type": "Create",
"actor": "https://mastodon.bida.im/users/redhotcyber",
"published": "2022-11-06T18:50:37Z",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://mastodon.bida.im/users/redhotcyber/followers"
],
"object": {
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109298361168777021",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2022-11-06T18:50:37Z",
"url": "https://mastodon.bida.im/@redhotcyber/109298361168777021",
"attributedTo": "https://mastodon.bida.im/users/redhotcyber",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://mastodon.bida.im/users/redhotcyber/followers"
],
"sensitive": false,
"atomUri": "https://mastodon.bida.im/users/redhotcyber/statuses/109298361168777021",
"inReplyToAtomUri": null,
"conversation": "tag:mastodon.bida.im,2022-11-06:objectId=41428744:objectType=Conversation",
"content": "<p>Un attacco alla supply chain blocca le ferrovie Danesi</p><p>Il <a href=\"https://mastodon.bida.im/tags/software\" class=\"mention hashtag\" rel=\"tag\">#<span>software</span></a> delle ferrovie danesi (<a href=\"https://mastodon.bida.im/tags/DSB\" class=\"mention hashtag\" rel=\"tag\">#<span>DSB</span></a>) di <a href=\"https://mastodon.bida.im/tags/Supeo\" class=\"mention hashtag\" rel=\"tag\">#<span>Supeo</span></a> ha subito un grave hack durante il fine settimana, bloccando i treni in tutto il paese da sabato, lo ha riportato Danmarks Radio.</p><p>Secondo quanto riferito, un attacco informatico ai <a href=\"https://mastodon.bida.im/tags/sistemi\" class=\"mention hashtag\" rel=\"tag\">#<span>sistemi</span></a> di un <a href=\"https://mastodon.bida.im/tags/appaltatore\" class=\"mention hashtag\" rel=\"tag\">#<span>appaltatore</span></a> <a href=\"https://mastodon.bida.im/tags/software\" class=\"mention hashtag\" rel=\"tag\">#<span>software</span></a> è stata la causa dell’interruzione dei treni.</p><p>Si noti che i malintenzionati hanno attaccato un programma utilizzato dai macchinisti per accedere a <a href=\"https://mastodon.bida.im/tags/informazioni\" class=\"mention hashtag\" rel=\"tag\">#<span>informazioni</span></a> riservate sulla ferrovia. </p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dXBFDTvG\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dXBFDTvG</span><span class=\"invisible\"></span></a></p>",
"contentMap": {
"it": "<p>Un attacco alla supply chain blocca le ferrovie Danesi</p><p>Il <a href=\"https://mastodon.bida.im/tags/software\" class=\"mention hashtag\" rel=\"tag\">#<span>software</span></a> delle ferrovie danesi (<a href=\"https://mastodon.bida.im/tags/DSB\" class=\"mention hashtag\" rel=\"tag\">#<span>DSB</span></a>) di <a href=\"https://mastodon.bida.im/tags/Supeo\" class=\"mention hashtag\" rel=\"tag\">#<span>Supeo</span></a> ha subito un grave hack durante il fine settimana, bloccando i treni in tutto il paese da sabato, lo ha riportato Danmarks Radio.</p><p>Secondo quanto riferito, un attacco informatico ai <a href=\"https://mastodon.bida.im/tags/sistemi\" class=\"mention hashtag\" rel=\"tag\">#<span>sistemi</span></a> di un <a href=\"https://mastodon.bida.im/tags/appaltatore\" class=\"mention hashtag\" rel=\"tag\">#<span>appaltatore</span></a> <a href=\"https://mastodon.bida.im/tags/software\" class=\"mention hashtag\" rel=\"tag\">#<span>software</span></a> è stata la causa dell’interruzione dei treni.</p><p>Si noti che i malintenzionati hanno attaccato un programma utilizzato dai macchinisti per accedere a <a href=\"https://mastodon.bida.im/tags/informazioni\" class=\"mention hashtag\" rel=\"tag\">#<span>informazioni</span></a> riservate sulla ferrovia. </p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dXBFDTvG\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dXBFDTvG</span><span class=\"invisible\"></span></a></p>"
},
"attachment": [
{
"type": "Document",
"mediaType": "image/jpeg",
"url": "https://mastodon.bida.im/system/media_attachments/files/109/298/360/529/317/885/original/04488598fd4ef56c.jpg",
"name": null,
"blurhash": "UbCHEFx]M{WqDiIAaKoeDNxt%MkC%Kx^NdM|",
"width": 1079,
"height": 661
}
],
"tag": [
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/software",
"name": "#software"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/dsb",
"name": "#dsb"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/Supeo",
"name": "#Supeo"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/sistemi",
"name": "#sistemi"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/appaltatore",
"name": "#appaltatore"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/informazioni",
"name": "#informazioni"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/redhotcyber",
"name": "#redhotcyber"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/informationsecurity",
"name": "#informationsecurity"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/ethicalhacking",
"name": "#ethicalhacking"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/dataprotection",
"name": "#dataprotection"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/hacking",
"name": "#hacking"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybersecurity",
"name": "#cybersecurity"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybercrime",
"name": "#cybercrime"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/CyberSecurityAwareness",
"name": "#CyberSecurityAwareness"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybersecuritytraining",
"name": "#cybersecuritytraining"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/CyberSecurityNews",
"name": "#CyberSecurityNews"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/privacy",
"name": "#privacy"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/infosecurity",
"name": "#infosecurity"
}
],
"replies": {
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109298361168777021/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://mastodon.bida.im/users/redhotcyber/statuses/109298361168777021/replies?only_other_accounts=true&page=true",
"partOf": "https://mastodon.bida.im/users/redhotcyber/statuses/109298361168777021/replies",
"items": []
}
}
}
},
{
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109298358311645779/activity",
"type": "Create",
"actor": "https://mastodon.bida.im/users/redhotcyber",
"published": "2022-11-06T18:49:54Z",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://mastodon.bida.im/users/redhotcyber/followers"
],
"object": {
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109298358311645779",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2022-11-06T18:49:54Z",
"url": "https://mastodon.bida.im/@redhotcyber/109298358311645779",
"attributedTo": "https://mastodon.bida.im/users/redhotcyber",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://mastodon.bida.im/users/redhotcyber/followers"
],
"sensitive": false,
"atomUri": "https://mastodon.bida.im/users/redhotcyber/statuses/109298358311645779",
"inReplyToAtomUri": null,
"conversation": "tag:mastodon.bida.im,2022-11-06:objectId=41428695:objectType=Conversation",
"content": "<p>La “liberazione” di Twitter preoccupa, ma non ancora abbastanza</p><p>L’agorà digitale di <a href=\"https://mastodon.bida.im/tags/Twitter\" class=\"mention hashtag\" rel=\"tag\">#<span>Twitter</span></a> continua a far parlare di sé dopo la sua <a href=\"https://mastodon.bida.im/tags/liberazione\" class=\"mention hashtag\" rel=\"tag\">#<span>liberazione</span></a> a tal punto da impegnare l’Alto Commissario delle Nazioni Unite per i <a href=\"https://mastodon.bida.im/tags/diritti\" class=\"mention hashtag\" rel=\"tag\">#<span>diritti</span></a> <a href=\"https://mastodon.bida.im/tags/umani\" class=\"mention hashtag\" rel=\"tag\">#<span>umani</span></a> nello scrivere una lettera aperta indirizzata proprio a Elon <a href=\"https://mastodon.bida.im/tags/Musk\" class=\"mention hashtag\" rel=\"tag\">#<span>Musk</span></a>.</p><p>Eppure, il magnate ha già rassicurato che l’impegno di Twitter per la moderazione dei contenuti è inalterato, mentre le novità principali annunciate riguardano funzioni di <a href=\"https://mastodon.bida.im/tags/ricerca\" class=\"mention hashtag\" rel=\"tag\">#<span>ricerca</span></a> interna e un maggiore occhio di riguardo per la <a href=\"https://mastodon.bida.im/tags/monetizzazione\" class=\"mention hashtag\" rel=\"tag\">#<span>monetizzazione</span></a> dei contenuti per i <a href=\"https://mastodon.bida.im/tags/creator\" class=\"mention hashtag\" rel=\"tag\">#<span>creator</span></a>.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/d666Yrrv\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/d666Yrrv</span><span class=\"invisible\"></span></a></p>",
"contentMap": {
"it": "<p>La “liberazione” di Twitter preoccupa, ma non ancora abbastanza</p><p>L’agorà digitale di <a href=\"https://mastodon.bida.im/tags/Twitter\" class=\"mention hashtag\" rel=\"tag\">#<span>Twitter</span></a> continua a far parlare di sé dopo la sua <a href=\"https://mastodon.bida.im/tags/liberazione\" class=\"mention hashtag\" rel=\"tag\">#<span>liberazione</span></a> a tal punto da impegnare l’Alto Commissario delle Nazioni Unite per i <a href=\"https://mastodon.bida.im/tags/diritti\" class=\"mention hashtag\" rel=\"tag\">#<span>diritti</span></a> <a href=\"https://mastodon.bida.im/tags/umani\" class=\"mention hashtag\" rel=\"tag\">#<span>umani</span></a> nello scrivere una lettera aperta indirizzata proprio a Elon <a href=\"https://mastodon.bida.im/tags/Musk\" class=\"mention hashtag\" rel=\"tag\">#<span>Musk</span></a>.</p><p>Eppure, il magnate ha già rassicurato che l’impegno di Twitter per la moderazione dei contenuti è inalterato, mentre le novità principali annunciate riguardano funzioni di <a href=\"https://mastodon.bida.im/tags/ricerca\" class=\"mention hashtag\" rel=\"tag\">#<span>ricerca</span></a> interna e un maggiore occhio di riguardo per la <a href=\"https://mastodon.bida.im/tags/monetizzazione\" class=\"mention hashtag\" rel=\"tag\">#<span>monetizzazione</span></a> dei contenuti per i <a href=\"https://mastodon.bida.im/tags/creator\" class=\"mention hashtag\" rel=\"tag\">#<span>creator</span></a>.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/d666Yrrv\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/d666Yrrv</span><span class=\"invisible\"></span></a></p>"
},
"attachment": [
{
"type": "Document",
"mediaType": "image/jpeg",
"url": "https://mastodon.bida.im/system/media_attachments/files/109/298/357/668/840/835/original/90fa4e5f6625fd35.jpg",
"name": null,
"blurhash": "UbCaMvoK0:S5xaayRkof9bay-nflNGkCt6V@",
"width": 1080,
"height": 515
}
],
"tag": [
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/twitter",
"name": "#twitter"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/liberazione",
"name": "#liberazione"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/diritti",
"name": "#diritti"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/umani",
"name": "#umani"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/musk",
"name": "#musk"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/ricerca",
"name": "#ricerca"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/monetizzazione",
"name": "#monetizzazione"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/creator",
"name": "#creator"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/redhotcyber",
"name": "#redhotcyber"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/informationsecurity",
"name": "#informationsecurity"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/ethicalhacking",
"name": "#ethicalhacking"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/dataprotection",
"name": "#dataprotection"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/hacking",
"name": "#hacking"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybersecurity",
"name": "#cybersecurity"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybercrime",
"name": "#cybercrime"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/CyberSecurityAwareness",
"name": "#CyberSecurityAwareness"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybersecuritytraining",
"name": "#cybersecuritytraining"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/CyberSecurityNews",
"name": "#CyberSecurityNews"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/privacy",
"name": "#privacy"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/infosecurity",
"name": "#infosecurity"
}
],
"replies": {
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109298358311645779/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://mastodon.bida.im/users/redhotcyber/statuses/109298358311645779/replies?only_other_accounts=true&page=true",
"partOf": "https://mastodon.bida.im/users/redhotcyber/statuses/109298358311645779/replies",
"items": []
}
}
}
},
{
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109298354665040101/activity",
"type": "Create",
"actor": "https://mastodon.bida.im/users/redhotcyber",
"published": "2022-11-06T18:48:58Z",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://mastodon.bida.im/users/redhotcyber/followers"
],
"object": {
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109298354665040101",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2022-11-06T18:48:58Z",
"url": "https://mastodon.bida.im/@redhotcyber/109298354665040101",
"attributedTo": "https://mastodon.bida.im/users/redhotcyber",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://mastodon.bida.im/users/redhotcyber/followers"
],
"sensitive": false,
"atomUri": "https://mastodon.bida.im/users/redhotcyber/statuses/109298354665040101",
"inReplyToAtomUri": null,
"conversation": "tag:mastodon.bida.im,2022-11-06:objectId=41428640:objectType=Conversation",
"content": "<p>Il malware si nasconde dentro le APP fake di Netflix, avverte Kaspersky Lab</p><p>Molto spesso, i <a href=\"https://mastodon.bida.im/tags/Trojan\" class=\"mention hashtag\" rel=\"tag\">#<span>Trojan</span></a> si travestono da servizi di <a href=\"https://mastodon.bida.im/tags/streaming\" class=\"mention hashtag\" rel=\"tag\">#<span>streaming</span></a>.</p><p><a href=\"https://mastodon.bida.im/tags/Ransomware\" class=\"mention hashtag\" rel=\"tag\">#<span>Ransomware</span></a>, <a href=\"https://mastodon.bida.im/tags/spyware\" class=\"mention hashtag\" rel=\"tag\">#<span>spyware</span></a> e <a href=\"https://mastodon.bida.im/tags/downloader\" class=\"mention hashtag\" rel=\"tag\">#<span>downloader</span></a> sono cablati in false <a href=\"https://mastodon.bida.im/tags/app\" class=\"mention hashtag\" rel=\"tag\">#<span>app</span></a> Netflix, Disney+ e altro ancora. Un’altra mossa popolare è il <a href=\"https://mastodon.bida.im/tags/phishing\" class=\"mention hashtag\" rel=\"tag\">#<span>phishing</span></a> emulando piattaforme note. Gli <a href=\"https://mastodon.bida.im/tags/esperti\" class=\"mention hashtag\" rel=\"tag\">#<span>esperti</span></a> di <a href=\"https://mastodon.bida.im/tags/KasperskyLab\" class=\"mention hashtag\" rel=\"tag\">#<span>KasperskyLab</span></a> hanno aggiornato le statistiche dall’inizio dell’anno alla fine di settembre.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dBmudzvH\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dBmudzvH</span><span class=\"invisible\"></span></a></p>",
"contentMap": {
"it": "<p>Il malware si nasconde dentro le APP fake di Netflix, avverte Kaspersky Lab</p><p>Molto spesso, i <a href=\"https://mastodon.bida.im/tags/Trojan\" class=\"mention hashtag\" rel=\"tag\">#<span>Trojan</span></a> si travestono da servizi di <a href=\"https://mastodon.bida.im/tags/streaming\" class=\"mention hashtag\" rel=\"tag\">#<span>streaming</span></a>.</p><p><a href=\"https://mastodon.bida.im/tags/Ransomware\" class=\"mention hashtag\" rel=\"tag\">#<span>Ransomware</span></a>, <a href=\"https://mastodon.bida.im/tags/spyware\" class=\"mention hashtag\" rel=\"tag\">#<span>spyware</span></a> e <a href=\"https://mastodon.bida.im/tags/downloader\" class=\"mention hashtag\" rel=\"tag\">#<span>downloader</span></a> sono cablati in false <a href=\"https://mastodon.bida.im/tags/app\" class=\"mention hashtag\" rel=\"tag\">#<span>app</span></a> Netflix, Disney+ e altro ancora. Un’altra mossa popolare è il <a href=\"https://mastodon.bida.im/tags/phishing\" class=\"mention hashtag\" rel=\"tag\">#<span>phishing</span></a> emulando piattaforme note. Gli <a href=\"https://mastodon.bida.im/tags/esperti\" class=\"mention hashtag\" rel=\"tag\">#<span>esperti</span></a> di <a href=\"https://mastodon.bida.im/tags/KasperskyLab\" class=\"mention hashtag\" rel=\"tag\">#<span>KasperskyLab</span></a> hanno aggiornato le statistiche dall’inizio dell’anno alla fine di settembre.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dBmudzvH\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dBmudzvH</span><span class=\"invisible\"></span></a></p>"
},
"attachment": [
{
"type": "Document",
"mediaType": "image/jpeg",
"url": "https://mastodon.bida.im/system/media_attachments/files/109/298/353/776/411/254/original/a9fb2b152318d7fd.jpg",
"name": null,
"blurhash": "UECsU2x9Emr:4U01ofxu_1_3nNRQITNdIUs:",
"width": 1079,
"height": 614
}
],
"tag": [
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/trojan",
"name": "#trojan"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/streaming",
"name": "#streaming"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/ransomware",
"name": "#ransomware"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/spyware",
"name": "#spyware"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/downloader",
"name": "#downloader"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/app",
"name": "#app"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/phishing",
"name": "#phishing"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/esperti",
"name": "#esperti"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/kasperskylab",
"name": "#kasperskylab"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/redhotcyber",
"name": "#redhotcyber"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/informationsecurity",
"name": "#informationsecurity"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/ethicalhacking",
"name": "#ethicalhacking"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/dataprotection",
"name": "#dataprotection"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/hacking",
"name": "#hacking"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybersecurity",
"name": "#cybersecurity"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybercrime",
"name": "#cybercrime"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/CyberSecurityAwareness",
"name": "#CyberSecurityAwareness"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybersecuritytraining",
"name": "#cybersecuritytraining"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/CyberSecurityNews",
"name": "#CyberSecurityNews"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/privacy",
"name": "#privacy"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/infosecurity",
"name": "#infosecurity"
}
],
"replies": {
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109298354665040101/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://mastodon.bida.im/users/redhotcyber/statuses/109298354665040101/replies?only_other_accounts=true&page=true",
"partOf": "https://mastodon.bida.im/users/redhotcyber/statuses/109298354665040101/replies",
"items": []
}
}
}
},
{
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109298326943320529/activity",
"type": "Create",
"actor": "https://mastodon.bida.im/users/redhotcyber",
"published": "2022-11-06T18:41:55Z",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://mastodon.bida.im/users/redhotcyber/followers"
],
"object": {
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109298326943320529",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2022-11-06T18:41:55Z",
"url": "https://mastodon.bida.im/@redhotcyber/109298326943320529",
"attributedTo": "https://mastodon.bida.im/users/redhotcyber",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://mastodon.bida.im/users/redhotcyber/followers"
],
"sensitive": false,
"atomUri": "https://mastodon.bida.im/users/redhotcyber/statuses/109298326943320529",
"inReplyToAtomUri": null,
"conversation": "tag:mastodon.bida.im,2022-11-06:objectId=41428235:objectType=Conversation",
"content": "<p>Anche le gang ransomware piangono. Yanluowang è stata compromessa. Le chat sono online</p><p>Gli esperti di sicurezza segnalano una violazione del gruppo <a href=\"https://mastodon.bida.im/tags/Yanluowang\" class=\"mention hashtag\" rel=\"tag\">#<span>Yanluowang</span></a>, che ha compromesso <a href=\"https://mastodon.bida.im/tags/Cisco\" class=\"mention hashtag\" rel=\"tag\">#<span>Cisco</span></a> quest'estate. Secondo gli <a href=\"https://mastodon.bida.im/tags/esperti\" class=\"mention hashtag\" rel=\"tag\">#<span>esperti</span></a>, le chat interne del gruppo sono trapelate in rete, dimostrando che Yanluowang è composto da membri di <a href=\"https://mastodon.bida.im/tags/lingua\" class=\"mention hashtag\" rel=\"tag\">#<span>lingua</span></a> russa.</p><p>Questa è una sfumatura interessante, dal momento che inizialmente molti credevano che Yanluowang fosse un gruppo cinese. Tuttavia, qualche tempo fa questa opinione ha iniziato a cambiare, poiché a settembre il collettivo si era associato alla <a href=\"https://mastodon.bida.im/tags/EvilCorp\" class=\"mention hashtag\" rel=\"tag\">#<span>EvilCorp</span></a>.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dp__HXdd\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dp__HXdd</span><span class=\"invisible\"></span></a></p>",
"contentMap": {
"it": "<p>Anche le gang ransomware piangono. Yanluowang è stata compromessa. Le chat sono online</p><p>Gli esperti di sicurezza segnalano una violazione del gruppo <a href=\"https://mastodon.bida.im/tags/Yanluowang\" class=\"mention hashtag\" rel=\"tag\">#<span>Yanluowang</span></a>, che ha compromesso <a href=\"https://mastodon.bida.im/tags/Cisco\" class=\"mention hashtag\" rel=\"tag\">#<span>Cisco</span></a> quest'estate. Secondo gli <a href=\"https://mastodon.bida.im/tags/esperti\" class=\"mention hashtag\" rel=\"tag\">#<span>esperti</span></a>, le chat interne del gruppo sono trapelate in rete, dimostrando che Yanluowang è composto da membri di <a href=\"https://mastodon.bida.im/tags/lingua\" class=\"mention hashtag\" rel=\"tag\">#<span>lingua</span></a> russa.</p><p>Questa è una sfumatura interessante, dal momento che inizialmente molti credevano che Yanluowang fosse un gruppo cinese. Tuttavia, qualche tempo fa questa opinione ha iniziato a cambiare, poiché a settembre il collettivo si era associato alla <a href=\"https://mastodon.bida.im/tags/EvilCorp\" class=\"mention hashtag\" rel=\"tag\">#<span>EvilCorp</span></a>.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://lnkd.in/dp__HXdd\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/dp__HXdd</span><span class=\"invisible\"></span></a></p>"
},
"attachment": [
{
"type": "Document",
"mediaType": "image/jpeg",
"url": "https://mastodon.bida.im/system/media_attachments/files/109/298/324/153/517/505/original/4602abc2014b05ef.jpg",
"name": null,
"blurhash": "UE3n,,g|M3k9P7l6xZbuqLeVS_j?VaZQm:e;",
"width": 1080,
"height": 655
}
],
"tag": [
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/Yanluowang",
"name": "#Yanluowang"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cisco",
"name": "#cisco"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/esperti",
"name": "#esperti"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/lingua",
"name": "#lingua"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/evilcorp",
"name": "#evilcorp"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/redhotcyber",
"name": "#redhotcyber"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/informationsecurity",
"name": "#informationsecurity"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/ethicalhacking",
"name": "#ethicalhacking"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/dataprotection",
"name": "#dataprotection"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/hacking",
"name": "#hacking"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybersecurity",
"name": "#cybersecurity"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybercrime",
"name": "#cybercrime"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/CyberSecurityAwareness",
"name": "#CyberSecurityAwareness"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/cybersecuritytraining",
"name": "#cybersecuritytraining"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/CyberSecurityNews",
"name": "#CyberSecurityNews"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/privacy",
"name": "#privacy"
},
{
"type": "Hashtag",
"href": "https://mastodon.bida.im/tags/infosecurity",
"name": "#infosecurity"
}
],
"replies": {
"id": "https://mastodon.bida.im/users/redhotcyber/statuses/109298326943320529/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://mastodon.bida.im/users/redhotcyber/statuses/109298326943320529/replies?only_other_accounts=true&page=true",
"partOf": "https://mastodon.bida.im/users/redhotcyber/statuses/109298326943320529/replies",
"items": []
}
}
}
}
]
}