Redhotcyber<p>Attacco informatico alla Yamaha. La cybergang BlackByte pubblica i primi samples</p><p>La banda di <a href="https://mastodon.bida.im/tags/criminali" class="mention hashtag" rel="tag">#<span>criminali</span></a> <a href="https://mastodon.bida.im/tags/informatici" class="mention hashtag" rel="tag">#<span>informatici</span></a> di <a href="https://mastodon.bida.im/tags/BlackByte" class="mention hashtag" rel="tag">#<span>BlackByte</span></a>, rivendica all’interno del proprio Data Leak Site (<a href="https://mastodon.bida.im/tags/DLS" class="mention hashtag" rel="tag">#<span>DLS</span></a>) un <a href="https://mastodon.bida.im/tags/attacco" class="mention hashtag" rel="tag">#<span>attacco</span></a> <a href="https://mastodon.bida.im/tags/informatico" class="mention hashtag" rel="tag">#<span>informatico</span></a> al colosso <a href="https://mastodon.bida.im/tags/Yamaha" class="mention hashtag" rel="tag">#<span>Yamaha</span></a>.</p><p>I <a href="https://mastodon.bida.im/tags/ransomware" class="mention hashtag" rel="tag">#<span>ransomware</span></a>, come sappiamo, sono <a href="https://mastodon.bida.im/tags/malware" class="mention hashtag" rel="tag">#<span>malware</span></a> che criptano i file <a href="https://mastodon.bida.im/tags/sensibili" class="mention hashtag" rel="tag">#<span>sensibili</span></a> dell’utente o dell’azienda, rendendoli inaccessibili fino al pagamento di un <a href="https://mastodon.bida.im/tags/riscatto" class="mention hashtag" rel="tag">#<span>riscatto</span></a>. Questo tipo di <a href="https://mastodon.bida.im/tags/attacco" class="mention hashtag" rel="tag">#<span>attacco</span></a> è spietato e priva le vittime dell’accesso ai propri <a href="https://mastodon.bida.im/tags/dati" class="mention hashtag" rel="tag">#<span>dati</span></a> critici, costringendole a fare scelte difficili tra la perdita dei <a href="https://mastodon.bida.im/tags/dati" class="mention hashtag" rel="tag">#<span>dati</span></a> o il pagamento dei <a href="https://mastodon.bida.im/tags/criminali" class="mention hashtag" rel="tag">#<span>criminali</span></a> <a href="https://mastodon.bida.im/tags/informatici" class="mention hashtag" rel="tag">#<span>informatici</span></a>.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/attacco-informatico-alla-yamaha-la-cybergang-blackbyte-pubblica-i-primi-samples/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/attacco-i</span><span class="invisible">nformatico-alla-yamaha-la-cybergang-blackbyte-pubblica-i-primi-samples/</span></a></p>