mastodon.bida.im is part of the decentralized social network powered by Mastodon.
Un'istanza mastodon antifascista. autogestita, italofona con base a Bologna. Rispettosa di privacy e anonimato.

Server stats:

918
active users

Learn more

#attaccante

0 posts0 participants0 posts today
Redhotcyber<p>M-Trends 2024: Il Dwell Time Si Riduce, Ma L’Attacco di Ransomware Cresce</p><p>Il “<a href="https://mastodon.bida.im/tags/dwelltime" class="mention hashtag" rel="tag">#<span>dwelltime</span></a>” è un termine chiave che si riferisce al periodo di tempo che intercorre tra il momento in cui un <a href="https://mastodon.bida.im/tags/attaccante" class="mention hashtag" rel="tag">#<span>attaccante</span></a> riesce a infiltrarsi in un <a href="https://mastodon.bida.im/tags/sistema" class="mention hashtag" rel="tag">#<span>sistema</span></a> e il momento in cui viene rilevato.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="tag">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="tag">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="tag">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/innovation" class="mention hashtag" rel="tag">#<span>innovation</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/technology" class="mention hashtag" rel="tag">#<span>technology</span></a> <a href="https://mastodon.bida.im/tags/engineering" class="mention hashtag" rel="tag">#<span>engineering</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="tag">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="tag">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/m-trends-2024-il-dwell-time-si-riduce-ma-lattacco-di-ransomware-cresce/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/m-trends-</span><span class="invisible">2024-il-dwell-time-si-riduce-ma-lattacco-di-ransomware-cresce/</span></a></p>
Redhotcyber<p>Looney Tunables: il bug di Linux che apre milioni di sistemi al root takeover</p><p>Il termine “root takeover” (in <a href="https://mastodon.bida.im/tags/Italiano" class="mention hashtag" rel="tag">#<span>Italiano</span></a>, “acquisizione del root”) si riferisce a una situazione in cui un utente <a href="https://mastodon.bida.im/tags/malintenzionato" class="mention hashtag" rel="tag">#<span>malintenzionato</span></a> o un <a href="https://mastodon.bida.im/tags/attaccante" class="mention hashtag" rel="tag">#<span>attaccante</span></a> ottiene il pieno controllo dell’account “<a href="https://mastodon.bida.im/tags/root" class="mention hashtag" rel="tag">#<span>root</span></a>” o “<a href="https://mastodon.bida.im/tags/superutente" class="mention hashtag" rel="tag">#<span>superutente</span></a>” su un <a href="https://mastodon.bida.im/tags/sistema" class="mention hashtag" rel="tag">#<span>sistema</span></a> <a href="https://mastodon.bida.im/tags/informatico" class="mention hashtag" rel="tag">#<span>informatico</span></a> o su una rete.In molti <a href="https://mastodon.bida.im/tags/sistemi" class="mention hashtag" rel="tag">#<span>sistemi</span></a> Unix-like, tra cui <a href="https://mastodon.bida.im/tags/Linux" class="mention hashtag" rel="tag">#<span>Linux</span></a>. </p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="tag">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="tag">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/web" class="mention hashtag" rel="tag">#<span>web</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="tag">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="tag">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="tag">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/looney-tunables-il-bug-di-linux-che-apre-milioni-di-sistemi-al-root-takeover/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/looney-tu</span><span class="invisible">nables-il-bug-di-linux-che-apre-milioni-di-sistemi-al-root-takeover/</span></a></p>
Redhotcyber<p>Cosa sono i bug di sicurezza. Un viaggio PoC, exploit, programmi di bug bounty e lavoro</p><p>Un <a href="https://mastodon.bida.im/tags/bug" class="mention hashtag" rel="tag">#<span>bug</span></a> di sicurezza, anche noto come <a href="https://mastodon.bida.im/tags/bug" class="mention hashtag" rel="tag">#<span>bug</span></a> di sicurezza <a href="https://mastodon.bida.im/tags/informatica" class="mention hashtag" rel="tag">#<span>informatica</span></a>, è un tipo di errore o di difetto nel <a href="https://mastodon.bida.im/tags/software" class="mention hashtag" rel="tag">#<span>software</span></a> che può essere sfruttato da un <a href="https://mastodon.bida.im/tags/attaccante" class="mention hashtag" rel="tag">#<span>attaccante</span></a> per compromettere la sicurezza di un <a href="https://mastodon.bida.im/tags/sistema" class="mention hashtag" rel="tag">#<span>sistema</span></a> <a href="https://mastodon.bida.im/tags/informatico" class="mention hashtag" rel="tag">#<span>informatico</span></a>.</p><p>Con questo articolo ci addentreremo nel comprendere coso sono i bug di sicurezza, da chi e come vengono <a href="https://mastodon.bida.im/tags/rilevati" class="mention hashtag" rel="tag">#<span>rilevati</span></a>, il processo di <a href="https://mastodon.bida.im/tags/identificazione" class="mention hashtag" rel="tag">#<span>identificazione</span></a> degli stessi passando da <a href="https://mastodon.bida.im/tags/PoC" class="mention hashtag" rel="tag">#<span>PoC</span></a> ed <a href="https://mastodon.bida.im/tags/exploit" class="mention hashtag" rel="tag">#<span>exploit</span></a> e per ultimo, andramo a scoprire come guadagnare scoprendo bug di sicurezza facendo questa attività come <a href="https://mastodon.bida.im/tags/lavoro" class="mention hashtag" rel="tag">#<span>lavoro</span></a>.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p> <a href="https://www.redhotcyber.com/post/cosa-sono-i-bug-di-sicurezza-un-viaggio-poc-exploit-programmi-di-bug-bounty-e-lavoro/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/cosa-sono</span><span class="invisible">-i-bug-di-sicurezza-un-viaggio-poc-exploit-programmi-di-bug-bounty-e-lavoro/</span></a></p>