mastodon.bida.im is part of the decentralized social network powered by Mastodon.
Un'istanza mastodon antifascista. autogestita, italofona con base a Bologna. Rispettosa di privacy e anonimato.

Server stats:

928
active users

Learn more

#riscatto

0 posts0 participants0 posts today
Redhotcyber<p>Il Tour di Taylor Swift a Rischio: Hacker chiede 2 Milioni a Ticketmaster per 170k Codici a Barre Rubati</p><p>Un <a href="https://mastodon.bida.im/tags/incidente" class="mention hashtag" rel="tag">#<span>incidente</span></a> cibernetico ha colpito Ticketmaster, con un attore malevolo che ha avanzato una richiesta di <a href="https://mastodon.bida.im/tags/riscatto" class="mention hashtag" rel="tag">#<span>riscatto</span></a>, <a href="https://mastodon.bida.im/tags/minacciando" class="mention hashtag" rel="tag">#<span>minacciando</span></a> di divulgare <a href="https://mastodon.bida.im/tags/dati" class="mention hashtag" rel="tag">#<span>dati</span></a> sensibili a meno che non venga pagata una somma di 2 milioni di dollari <a href="https://mastodon.bida.im/tags/USA" class="mention hashtag" rel="tag">#<span>USA</span></a>.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cti" class="mention hashtag" rel="tag">#<span>cti</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="tag">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="tag">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="tag">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/technology" class="mention hashtag" rel="tag">#<span>technology</span></a> <a href="https://mastodon.bida.im/tags/news" class="mention hashtag" rel="tag">#<span>news</span></a> <a href="https://mastodon.bida.im/tags/cyberthreatintelligence" class="mention hashtag" rel="tag">#<span>cyberthreatintelligence</span></a> <a href="https://mastodon.bida.im/tags/innovation" class="mention hashtag" rel="tag">#<span>innovation</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/engineering" class="mention hashtag" rel="tag">#<span>engineering</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="tag">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="tag">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/il-tour-di-taylor-swift-a-rischio-hacker-chiede-2-milioni-a-ticketmaster-per-170k-codici-a-barre-rubati/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/il-tour-d</span><span class="invisible">i-taylor-swift-a-rischio-hacker-chiede-2-milioni-a-ticketmaster-per-170k-codici-a-barre-rubati/</span></a></p>
Formula1.it :verified:<p><a href="https://mastodon.uno/tags/Ferrari" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ferrari</span></a> in cerca di <a href="https://mastodon.uno/tags/riscatto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>riscatto</span></a>: <a href="https://mastodon.uno/tags/aggiornamenti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aggiornamenti</span></a> alla <a href="https://mastodon.uno/tags/SF24" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SF24</span></a> in Spagna <a href="https://www.formula1.it/news/20261/1/ferrari-in-cerca-di-riscatto-aggiornamenti-alla-sf-24-in-spagna?utm_source=dlvr.it&amp;utm_medium=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">formula1.it/news/20261/1/ferra</span><span class="invisible">ri-in-cerca-di-riscatto-aggiornamenti-alla-sf-24-in-spagna?utm_source=dlvr.it&amp;utm_medium=mastodon</span></a></p>
Redhotcyber<p>Un Attacco Ransomware fa molto male! Un miliardo di dollari spesi dalla Change Healthcare</p><p>Tenendo in considerazione i 22 milioni di dollari pagati agli <a href="https://mastodon.bida.im/tags/aggressori" class="mention hashtag" rel="tag">#<span>aggressori</span></a> per il <a href="https://mastodon.bida.im/tags/riscatto" class="mention hashtag" rel="tag">#<span>riscatto</span></a>, a questi si sommano 850 milioni di dollari causati dalle successive <a href="https://mastodon.bida.im/tags/conseguenze" class="mention hashtag" rel="tag">#<span>conseguenze</span></a>. </p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="tag">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="tag">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="tag">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/innovation" class="mention hashtag" rel="tag">#<span>innovation</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/technology" class="mention hashtag" rel="tag">#<span>technology</span></a> <a href="https://mastodon.bida.im/tags/engineering" class="mention hashtag" rel="tag">#<span>engineering</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="tag">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="tag">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/un-attacco-ransomware-fa-molto-male-un-miliardo-di-dollari-spesi-dalla-change-healthcare/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/un-attacc</span><span class="invisible">o-ransomware-fa-molto-male-un-miliardo-di-dollari-spesi-dalla-change-healthcare/</span></a></p>
Redhotcyber<p>Report FBI: 12,5 miliardi di dollari è il valore del cybercrime nel 2023. Il 20% delle aziende denuncia il ransomware</p><p>Il panorama cibernetico odierno è minacciato da una moltitudine di attori malintenzionati che dispongono degli strumenti necessari per condurre <a href="https://mastodon.bida.im/tags/frodi" class="mention hashtag" rel="tag">#<span>frodi</span></a> su larga scala, trattenere i soldi e i <a href="https://mastodon.bida.im/tags/dati" class="mention hashtag" rel="tag">#<span>dati</span></a> in cambio di un <a href="https://mastodon.bida.im/tags/riscatto" class="mention hashtag" rel="tag">#<span>riscatto</span></a> e mettere a repentaglio la nostra sicurezza nazionale.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="tag">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="tag">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/web" class="mention hashtag" rel="tag">#<span>web</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="tag">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="tag">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="tag">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/report-fbi-125-miliardi-di-dollari-e-il-valore-del-cybercrime-nel-2023-il-20-delle-aziende-denuncia-il-ransomware/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/report-fb</span><span class="invisible">i-125-miliardi-di-dollari-e-il-valore-del-cybercrime-nel-2023-il-20-delle-aziende-denuncia-il-ransomware/</span></a></p>
Redhotcyber<p>Attacco Informatico all’ASP Basilicata rivendicato da Rhysida. 15 bitcoin al miglior offerente per i dati sanitari online</p><p>L’epilogo di un <a href="https://mastodon.bida.im/tags/attacco" class="mention hashtag" rel="tag">#<span>attacco</span></a> <a href="https://mastodon.bida.im/tags/ransomware" class="mention hashtag" rel="tag">#<span>ransomware</span></a> dove non è stato pagato un <a href="https://mastodon.bida.im/tags/riscatto" class="mention hashtag" rel="tag">#<span>riscatto</span></a> è la <a href="https://mastodon.bida.im/tags/pubblicazione" class="mention hashtag" rel="tag">#<span>pubblicazione</span></a> online dei <a href="https://mastodon.bida.im/tags/dati" class="mention hashtag" rel="tag">#<span>dati</span></a> o le aste <a href="https://mastodon.bida.im/tags/underground" class="mention hashtag" rel="tag">#<span>underground</span></a>. L’attacco alla <a href="https://mastodon.bida.im/tags/ASP" class="mention hashtag" rel="tag">#<span>ASP</span></a> <a href="https://mastodon.bida.im/tags/Basilicata" class="mention hashtag" rel="tag">#<span>Basilicata</span></a> è stato ufficializzato dalla ASP stessa verso la fine di Gennaio, quando si sono verificate problematiche di utilizzo del <a href="https://mastodon.bida.im/tags/sistema" class="mention hashtag" rel="tag">#<span>sistema</span></a> <a href="https://mastodon.bida.im/tags/sanitario" class="mention hashtag" rel="tag">#<span>sanitario</span></a>.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="tag">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="tag">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/web" class="mention hashtag" rel="tag">#<span>web</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="tag">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="tag">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="tag">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/attacco-informatico-allasp-basilicata-rivendicato-da-rhysida-15-bitcoin-al-miglior-offerente-per-i-dati-sanitari-online/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/attacco-i</span><span class="invisible">nformatico-allasp-basilicata-rivendicato-da-rhysida-15-bitcoin-al-miglior-offerente-per-i-dati-sanitari-online/</span></a></p>
Redhotcyber<p>E se accadesse anche in Italia? 2 milioni di pazienti ricattati dopo l’incidente all’ospedale Integris Health in Oklahoma</p><p>In effetti non è la prima volta che accade qualcosa di simile. Diversi anni fa, dopo un <a href="https://mastodon.bida.im/tags/attacco" class="mention hashtag" rel="tag">#<span>attacco</span></a> <a href="https://mastodon.bida.im/tags/ransomware" class="mention hashtag" rel="tag">#<span>ransomware</span></a> alla clinica <a href="https://mastodon.bida.im/tags/Vastaano" class="mention hashtag" rel="tag">#<span>Vastaano</span></a>, i <a href="https://mastodon.bida.im/tags/criminali" class="mention hashtag" rel="tag">#<span>criminali</span></a> <a href="https://mastodon.bida.im/tags/informatici" class="mention hashtag" rel="tag">#<span>informatici</span></a> contattarono i singoli <a href="https://mastodon.bida.im/tags/pazienti" class="mention hashtag" rel="tag">#<span>pazienti</span></a>. Chiesero loro il <a href="https://mastodon.bida.im/tags/pagamento" class="mention hashtag" rel="tag">#<span>pagamento</span></a> di 200 euro per rientrare in possesso delle cartelle <a href="https://mastodon.bida.im/tags/cliniche" class="mention hashtag" rel="tag">#<span>cliniche</span></a>, pena la loro <a href="https://mastodon.bida.im/tags/pubblicazione" class="mention hashtag" rel="tag">#<span>pubblicazione</span></a>. Questo a causa del fatto che l’azienda non voleva pagare il <a href="https://mastodon.bida.im/tags/riscatto" class="mention hashtag" rel="tag">#<span>riscatto</span></a>.</p><p>Successivamente la <a href="https://mastodon.bida.im/tags/clinica" class="mention hashtag" rel="tag">#<span>clinica</span></a> fallì e fu una tra le prime aziende che vennero chiuse dopo un <a href="https://mastodon.bida.im/tags/attacco" class="mention hashtag" rel="tag">#<span>attacco</span></a> <a href="https://mastodon.bida.im/tags/ransomware" class="mention hashtag" rel="tag">#<span>ransomware</span></a>.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="tag">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="tag">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/web" class="mention hashtag" rel="tag">#<span>web</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="tag">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="tag">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="tag">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a></p><p><a href="https://www.redhotcyber.com/post/e-se-succedesse-anche-in-italia-2-milioni-di-pazienti-ricattati-dopo-lincidente-allospedale-integris-health-in-oklahoma/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/e-se-succ</span><span class="invisible">edesse-anche-in-italia-2-milioni-di-pazienti-ricattati-dopo-lincidente-allospedale-integris-health-in-oklahoma/</span></a></p>
Redhotcyber<p>Australia: i privati possono pagare i riscatti ransomware, purché li segnalino alle autorità</p><p>Il <a href="https://mastodon.bida.im/tags/governo" class="mention hashtag" rel="tag">#<span>governo</span></a> <a href="https://mastodon.bida.im/tags/australiano" class="mention hashtag" rel="tag">#<span>australiano</span></a> ha abbandonato il piano di vietare il pagamento del <a href="https://mastodon.bida.im/tags/riscatto" class="mention hashtag" rel="tag">#<span>riscatto</span></a> in caso di attacchi <a href="https://mastodon.bida.im/tags/ransomware" class="mention hashtag" rel="tag">#<span>ransomware</span></a>. Si prevede invece di introdurre l’obbligo di <a href="https://mastodon.bida.im/tags/segnalare" class="mention hashtag" rel="tag">#<span>segnalare</span></a> tali incidenti alle autorità competenti.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="tag">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="tag">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/web" class="mention hashtag" rel="tag">#<span>web</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="tag">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="tag">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="tag">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/australia-i-privati-possono-pagare-i-riscatti-ransomware-purche-li-segnalino-alle-autorita/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/australia</span><span class="invisible">-i-privati-possono-pagare-i-riscatti-ransomware-purche-li-segnalino-alle-autorita/</span></a></p>
Redhotcyber<p>Chi ha colpito i Casinò di Las Vegas? Giallo attorno a BlackCat e Scattered Spider</p><p>Due gruppi <a href="https://mastodon.bida.im/tags/criminali" class="mention hashtag" rel="tag">#<span>criminali</span></a> <a href="https://mastodon.bida.im/tags/ransomware" class="mention hashtag" rel="tag">#<span>ransomware</span></a> sono stati recentemente collegati ad <a href="https://mastodon.bida.im/tags/attacchi" class="mention hashtag" rel="tag">#<span>attacchi</span></a> <a href="https://mastodon.bida.im/tags/informatici" class="mention hashtag" rel="tag">#<span>informatici</span></a> contro due importanti operatori di <a href="https://mastodon.bida.im/tags/hotel" class="mention hashtag" rel="tag">#<span>hotel</span></a> e casinò di <a href="https://mastodon.bida.im/tags/LasVegas" class="mention hashtag" rel="tag">#<span>LasVegas</span></a>, costringendo uno di loro a lottare per riottenere l’accesso ai propri <a href="https://mastodon.bida.im/tags/sistemi" class="mention hashtag" rel="tag">#<span>sistemi</span></a> e l’altro a pagare un <a href="https://mastodon.bida.im/tags/riscatto" class="mention hashtag" rel="tag">#<span>riscatto</span></a> multimilionario.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="tag">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="tag">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/web" class="mention hashtag" rel="tag">#<span>web</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="tag">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="tag">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="tag">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/chi-ha-colpito-i-casino-di-las-vegas-giallo-attorno-a-blackcat-e-scattered-spider/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/chi-ha-co</span><span class="invisible">lpito-i-casino-di-las-vegas-giallo-attorno-a-blackcat-e-scattered-spider/</span></a></p>
Redhotcyber<p>La Federcalcio Olandese (KNVB) paga 1 milione di dollari di riscatto a LockBit</p><p>La Federcalcio olandese (<a href="https://mastodon.bida.im/tags/KNVB" class="mention hashtag" rel="tag">#<span>KNVB</span></a>) ha deciso di pagare un <a href="https://mastodon.bida.im/tags/riscatto" class="mention hashtag" rel="tag">#<span>riscatto</span></a> ai <a href="https://mastodon.bida.im/tags/criminali" class="mention hashtag" rel="tag">#<span>criminali</span></a> <a href="https://mastodon.bida.im/tags/informatici" class="mention hashtag" rel="tag">#<span>informatici</span></a> di <a href="https://mastodon.bida.im/tags/LockBit" class="mention hashtag" rel="tag">#<span>LockBit</span></a> per impedire la fuga di <a href="https://mastodon.bida.im/tags/dati" class="mention hashtag" rel="tag">#<span>dati</span></a> personali dei suoi membri. </p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="tag">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="tag">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/web" class="mention hashtag" rel="tag">#<span>web</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="tag">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="tag">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="tag">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/la-federcalcio-olandese-knvb-paga-1-milione-di-dollari-di-riscatto-a-lockbit/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/la-federc</span><span class="invisible">alcio-olandese-knvb-paga-1-milione-di-dollari-di-riscatto-a-lockbit/</span></a></p>
Redhotcyber<p>600.000 dollari è il riscatto medio per un ransomware, nel 2022 era due volte inferiore. Diminuisce la percentuale dei pagamenti</p><p>Gli <a href="https://mastodon.bida.im/tags/esperti" class="mention hashtag" rel="tag">#<span>esperti</span></a> di sicurezza <a href="https://mastodon.bida.im/tags/informatica" class="mention hashtag" rel="tag">#<span>informatica</span></a> hanno pubblicato quest’anno un rapporto dettagliato sulle varie tendenze e cambiamenti nel panorama dei <a href="https://mastodon.bida.im/tags/ransomware" class="mention hashtag" rel="tag">#<span>ransomware</span></a>. Secondo i <a href="https://mastodon.bida.im/tags/ricercatori" class="mention hashtag" rel="tag">#<span>ricercatori</span></a>, il <a href="https://mastodon.bida.im/tags/riscatto" class="mention hashtag" rel="tag">#<span>riscatto</span></a> medio richiesto dal <a href="https://mastodon.bida.im/tags/ransomware" class="mention hashtag" rel="tag">#<span>ransomware</span></a> è di 600.000 dollari. È interessante notare che alla fine dello scorso anno questo valore era circa due volte inferiore.</p><p>Condividi questo post se hai trovato la news interessante.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="tag">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="tag">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/web" class="mention hashtag" rel="tag">#<span>web</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="tag">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="tag">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="tag">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/600-000-dollari-e-il-riscatto-medio-per-un-ransomware-nel-2022-era-due-volte-inferiore-ma-diminuisce-la-percentuale-dei-pagamenti/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/600-000-d</span><span class="invisible">ollari-e-il-riscatto-medio-per-un-ransomware-nel-2022-era-due-volte-inferiore-ma-diminuisce-la-percentuale-dei-pagamenti/</span></a></p>
Redhotcyber<p>Attacco informatico all’Università di Salerno. Rhysida pubblica dei samples e vende per 12 bitcoin l’intero lotto</p><p>Come avevamo riportato in <a href="https://mastodon.bida.im/tags/anteprima" class="mention hashtag" rel="tag">#<span>anteprima</span></a> qualche settimana fa, l‘attacco <a href="https://mastodon.bida.im/tags/ransomware" class="mention hashtag" rel="tag">#<span>ransomware</span></a> all’<a href="https://mastodon.bida.im/tags/universit%C3%A0" class="mention hashtag" rel="tag">#<span>università</span></a> di <a href="https://mastodon.bida.im/tags/Salerno" class="mention hashtag" rel="tag">#<span>Salerno</span></a> è stato effettuato dalla <a href="https://mastodon.bida.im/tags/cybergang" class="mention hashtag" rel="tag">#<span>cybergang</span></a> <a href="https://mastodon.bida.im/tags/Rhysida" class="mention hashtag" rel="tag">#<span>Rhysida</span></a>.</p><p>La cybergang Rhysida è solita mettere in vendita i <a href="https://mastodon.bida.im/tags/dati" class="mention hashtag" rel="tag">#<span>dati</span></a> esfiltrati dalle aziende che non hanno pagato il <a href="https://mastodon.bida.im/tags/riscatto" class="mention hashtag" rel="tag">#<span>riscatto</span></a> per la decifratura del <a href="https://mastodon.bida.im/tags/ransomware" class="mention hashtag" rel="tag">#<span>ransomware</span></a>, al miglior offerente. Il prezzo di partenza per questa asta <a href="https://mastodon.bida.im/tags/underground" class="mention hashtag" rel="tag">#<span>underground</span></a> è stato fissato a 12 bitcoin, che al cambio attuale sono circa 310.000 euro.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="tag">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="tag">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/web" class="mention hashtag" rel="tag">#<span>web</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="tag">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="tag">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="tag">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/attacco-informatico-alluniversita-di-salerno-rhysida-pubblica-dei-samples-e-vende-per-12-bitcoin-lintero-lotto/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/attacco-i</span><span class="invisible">nformatico-alluniversita-di-salerno-rhysida-pubblica-dei-samples-e-vende-per-12-bitcoin-lintero-lotto/</span></a></p>
Redhotcyber<p>Un ricercatore di sicurezza ha una soluzione per il ransomware. Ma occorre una analisi da parte di Microsoft</p><p>Il <a href="https://mastodon.bida.im/tags/ransomware" class="mention hashtag" rel="tag">#<span>ransomware</span></a> <a href="https://mastodon.bida.im/tags/crittografa" class="mention hashtag" rel="tag">#<span>crittografa</span></a> i file sul <a href="https://mastodon.bida.im/tags/computer" class="mention hashtag" rel="tag">#<span>computer</span></a> della vittima e richiede un <a href="https://mastodon.bida.im/tags/riscatto" class="mention hashtag" rel="tag">#<span>riscatto</span></a> per ripristinarli. Tali <a href="https://mastodon.bida.im/tags/virus" class="mention hashtag" rel="tag">#<span>virus</span></a> possono causare enormi danni sia ai singoli utenti che alle grandi organizzazioni. Ma c’è un modo per proteggersi da loro? </p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="tag">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="tag">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/web" class="mention hashtag" rel="tag">#<span>web</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="tag">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="tag">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="tag">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/un-ricercatore-di-sicurezza-ha-una-soluzione-per-il-ransomware-ma-occorre-una-analisi-da-parte-di-microsoft/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/un-ricerc</span><span class="invisible">atore-di-sicurezza-ha-una-soluzione-per-il-ransomware-ma-occorre-una-analisi-da-parte-di-microsoft/</span></a></p>
Redhotcyber<p>CL0P continua. PwC, EY e Sony, dopo il colosso Shell, colpite con la vulnerabilità di MOVEit</p><p>Due delle Big Four delle società di contabilità, <a href="https://mastodon.bida.im/tags/PwC" class="mention hashtag" rel="tag">#<span>PwC</span></a> ed <a href="https://mastodon.bida.im/tags/EY" class="mention hashtag" rel="tag">#<span>EY</span></a>, hanno iniziato a indagare sulle violazioni dei <a href="https://mastodon.bida.im/tags/dati" class="mention hashtag" rel="tag">#<span>dati</span></a> relative alle attività del gruppo di hacker <a href="https://mastodon.bida.im/tags/Cl0P" class="mention hashtag" rel="tag">#<span>Cl0P</span></a>, riferisce <a href="https://mastodon.bida.im/tags/Bloomberg" class="mention hashtag" rel="tag">#<span>Bloomberg</span></a>.</p><p>Gli hacker hanno chiesto un <a href="https://mastodon.bida.im/tags/riscatto" class="mention hashtag" rel="tag">#<span>riscatto</span></a> alle aziende per non pubblicare i propri <a href="https://mastodon.bida.im/tags/dati" class="mention hashtag" rel="tag">#<span>dati</span></a> interni. Il gruppo ha sfruttato una <a href="https://mastodon.bida.im/tags/vulnerabilit%C3%A0" class="mention hashtag" rel="tag">#<span>vulnerabilità</span></a> nel <a href="https://mastodon.bida.im/tags/software" class="mention hashtag" rel="tag">#<span>software</span></a> di trasferimento file MOVEit Transfer di Progress Software che è stata scoperta nel maggio 2021.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="tag">#<span>online</span></a></p><p><a href="https://www.redhotcyber.com/post/cl0p-continua-pwc-ey-e-sony-dopo-il-colosso-shell-colpite-con-la-vulnerabilita-di-moveit/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/cl0p-cont</span><span class="invisible">inua-pwc-ey-e-sony-dopo-il-colosso-shell-colpite-con-la-vulnerabilita-di-moveit/</span></a></p>
Redhotcyber<p>Anche Norton rimane vittima di CL0P. Le vittime sono ormai oltre 80</p><p><a href="https://mastodon.bida.im/tags/NortonLifeLock" class="mention hashtag" rel="tag">#<span>NortonLifeLock</span></a> , noto in tutto il mondo per il suo <a href="https://mastodon.bida.im/tags/software" class="mention hashtag" rel="tag">#<span>software</span></a> antivirus <a href="https://mastodon.bida.im/tags/Norton" class="mention hashtag" rel="tag">#<span>Norton</span></a> <a href="https://mastodon.bida.im/tags/Antivirus" class="mention hashtag" rel="tag">#<span>Antivirus</span></a>, è stata preso di mira dal gruppo di hacker <a href="https://mastodon.bida.im/tags/ransomware" class="mention hashtag" rel="tag">#<span>ransomware</span></a> Clop. </p><p>I <a href="https://mastodon.bida.im/tags/criminali" class="mention hashtag" rel="tag">#<span>criminali</span></a> <a href="https://mastodon.bida.im/tags/informatici" class="mention hashtag" rel="tag">#<span>informatici</span></a> hanno pubblicato la compromissione sul loro blog <a href="https://mastodon.bida.im/tags/underground" class="mention hashtag" rel="tag">#<span>underground</span></a> e minacciano di rilasciare i <a href="https://mastodon.bida.im/tags/dati" class="mention hashtag" rel="tag">#<span>dati</span></a> rubati a meno che la società non paghi il <a href="https://mastodon.bida.im/tags/riscatto" class="mention hashtag" rel="tag">#<span>riscatto</span></a>.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/anche-norton-rimane-vittima-di-cl0p-le-vittime-sono-ormai-oltre-80/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/anche-nor</span><span class="invisible">ton-rimane-vittima-di-cl0p-le-vittime-sono-ormai-oltre-80/</span></a></p>
Redhotcyber<p>Attacco informatico alla Yamaha. La cybergang BlackByte pubblica i primi samples</p><p>La banda di <a href="https://mastodon.bida.im/tags/criminali" class="mention hashtag" rel="tag">#<span>criminali</span></a> <a href="https://mastodon.bida.im/tags/informatici" class="mention hashtag" rel="tag">#<span>informatici</span></a> di <a href="https://mastodon.bida.im/tags/BlackByte" class="mention hashtag" rel="tag">#<span>BlackByte</span></a>, rivendica all’interno del proprio Data Leak Site (<a href="https://mastodon.bida.im/tags/DLS" class="mention hashtag" rel="tag">#<span>DLS</span></a>) un <a href="https://mastodon.bida.im/tags/attacco" class="mention hashtag" rel="tag">#<span>attacco</span></a> <a href="https://mastodon.bida.im/tags/informatico" class="mention hashtag" rel="tag">#<span>informatico</span></a> al colosso <a href="https://mastodon.bida.im/tags/Yamaha" class="mention hashtag" rel="tag">#<span>Yamaha</span></a>.</p><p>I <a href="https://mastodon.bida.im/tags/ransomware" class="mention hashtag" rel="tag">#<span>ransomware</span></a>, come sappiamo, sono <a href="https://mastodon.bida.im/tags/malware" class="mention hashtag" rel="tag">#<span>malware</span></a> che criptano i file <a href="https://mastodon.bida.im/tags/sensibili" class="mention hashtag" rel="tag">#<span>sensibili</span></a> dell’utente o dell’azienda, rendendoli inaccessibili fino al pagamento di un <a href="https://mastodon.bida.im/tags/riscatto" class="mention hashtag" rel="tag">#<span>riscatto</span></a>. Questo tipo di <a href="https://mastodon.bida.im/tags/attacco" class="mention hashtag" rel="tag">#<span>attacco</span></a> è spietato e priva le vittime dell’accesso ai propri <a href="https://mastodon.bida.im/tags/dati" class="mention hashtag" rel="tag">#<span>dati</span></a> critici, costringendole a fare scelte difficili tra la perdita dei <a href="https://mastodon.bida.im/tags/dati" class="mention hashtag" rel="tag">#<span>dati</span></a> o il pagamento dei <a href="https://mastodon.bida.im/tags/criminali" class="mention hashtag" rel="tag">#<span>criminali</span></a> <a href="https://mastodon.bida.im/tags/informatici" class="mention hashtag" rel="tag">#<span>informatici</span></a>.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/attacco-informatico-alla-yamaha-la-cybergang-blackbyte-pubblica-i-primi-samples/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/attacco-i</span><span class="invisible">nformatico-alla-yamaha-la-cybergang-blackbyte-pubblica-i-primi-samples/</span></a></p>
Redhotcyber<p>Il ransomware MalasLocker costringe le vittime a donare in beneficenza</p><p>Il <a href="https://mastodon.bida.im/tags/ransomware" class="mention hashtag" rel="tag">#<span>ransomware</span></a> sta diventando una forma di <a href="https://mastodon.bida.im/tags/hacktivismo" class="mention hashtag" rel="tag">#<span>hacktivismo</span></a> <a href="https://mastodon.bida.im/tags/cibernetico" class="mention hashtag" rel="tag">#<span>cibernetico</span></a>? In questo caso la risposta potrebbe essere si.</p><p>Una nuova operazione <a href="https://mastodon.bida.im/tags/ransomware" class="mention hashtag" rel="tag">#<span>ransomware</span></a> chiamata <a href="https://mastodon.bida.im/tags/MalasLocker" class="mention hashtag" rel="tag">#<span>MalasLocker</span></a>, attiva dalla fine di marzo di quest’anno, effettua attacchi <a href="https://mastodon.bida.im/tags/informatici" class="mention hashtag" rel="tag">#<span>informatici</span></a> sui server <a href="https://mastodon.bida.im/tags/Zimbra" class="mention hashtag" rel="tag">#<span>Zimbra</span></a>. Tuttavia, invece di chiedere il solito <a href="https://mastodon.bida.im/tags/riscatto" class="mention hashtag" rel="tag">#<span>riscatto</span></a> in <a href="https://mastodon.bida.im/tags/criptovaluta" class="mention hashtag" rel="tag">#<span>criptovaluta</span></a>, chiede alle vittime di effettuare delle <a href="https://mastodon.bida.im/tags/donazioni" class="mention hashtag" rel="tag">#<span>donazioni</span></a> in <a href="https://mastodon.bida.im/tags/beneficienza" class="mention hashtag" rel="tag">#<span>beneficienza</span></a> per fornire alle vittime un <a href="https://mastodon.bida.im/tags/decryptor" class="mention hashtag" rel="tag">#<span>decryptor</span></a> e prevenire la fuga di <a href="https://mastodon.bida.im/tags/dati" class="mention hashtag" rel="tag">#<span>dati</span></a>.</p><p>Siete d&#39;accordo o meno? Scrivetelo sotto nei commenti 👇</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/malaslocker-il-ransomware-altruista-sta-nascendo-una-nuova-minaccia-cyber-con-unanima/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/malaslock</span><span class="invisible">er-il-ransomware-altruista-sta-nascendo-una-nuova-minaccia-cyber-con-unanima/</span></a></p>
Redhotcyber<p>The Smashing Pumpkins pagano il riscatto ai criminali che minacciavano di pubblicare il loro nuovo album online prima dell’uscita</p><p>Il nuovo album della <a href="https://mastodon.bida.im/tags/rockband" class="mention hashtag" rel="tag">#<span>rockband</span></a> americana The Smashing Pumpkins chiamato “ATUM: A Rock Opera in Three Acts”, composto da tre parti di 11 tracce ciascuna, è finalmente andato in vendita sui servizi di <a href="https://mastodon.bida.im/tags/streaming" class="mention hashtag" rel="tag">#<span>streaming</span></a> musicale. </p><p>La prima parte è stata rilasciata a novembre dello scorso anno, la seconda a gennaio di quest’anno e l’ultima l’altro giorno, il 5 maggio.</p><p>Corgan è stato costretto ad accettare, pagando un <a href="https://mastodon.bida.im/tags/riscatto" class="mention hashtag" rel="tag">#<span>riscatto</span></a> di tasca propria, per non deludere i propri fan.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/the-smashing-pumpkins-pagano-il-riscatto-ai-criminali-che-minacciavano-di-pubblicare-il-loro-nuovo-album-online-prima-delluscita/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/the-smash</span><span class="invisible">ing-pumpkins-pagano-il-riscatto-ai-criminali-che-minacciavano-di-pubblicare-il-loro-nuovo-album-online-prima-delluscita/</span></a></p>
Redhotcyber<p>Incidente informatico alla ASL1 Abruzzo. La situazione è grave, ma c’è poca comunicazione</p><p>L’<a href="https://mastodon.bida.im/tags/Asl" class="mention hashtag" rel="tag">#<span>Asl</span></a> dell’<a href="https://mastodon.bida.im/tags/Aquila" class="mention hashtag" rel="tag">#<span>Aquila</span></a> è stata recentemente attaccata da un gruppo di <a href="https://mastodon.bida.im/tags/hacker" class="mention hashtag" rel="tag">#<span>hacker</span></a> <a href="https://mastodon.bida.im/tags/criminali" class="mention hashtag" rel="tag">#<span>criminali</span></a>, che hanno rubato <a href="https://mastodon.bida.im/tags/dati" class="mention hashtag" rel="tag">#<span>dati</span></a> sensibili per oltre 500 gigabyte, compresi <a href="https://mastodon.bida.im/tags/referti" class="mention hashtag" rel="tag">#<span>referti</span></a>, <a href="https://mastodon.bida.im/tags/analisi" class="mention hashtag" rel="tag">#<span>analisi</span></a>, <a href="https://mastodon.bida.im/tags/cartellecliniche" class="mention hashtag" rel="tag">#<span>cartellecliniche</span></a> ed <a href="https://mastodon.bida.im/tags/esami" class="mention hashtag" rel="tag">#<span>esami</span></a> medici.</p><p>Uno dei file è stato pubblicato nelle <a href="https://mastodon.bida.im/tags/underground" class="mention hashtag" rel="tag">#<span>underground</span></a> (con link nel <a href="https://mastodon.bida.im/tags/clearweb" class="mention hashtag" rel="tag">#<span>clearweb</span></a>) come elemento di pressione verso l’azienda sanitaria violata, opera del gruppo <a href="https://mastodon.bida.im/tags/ransomware" class="mention hashtag" rel="tag">#<span>ransomware</span></a> Monti, che richiede un <a href="https://mastodon.bida.im/tags/riscatto" class="mention hashtag" rel="tag">#<span>riscatto</span></a> in cambio della restituzione delle <a href="https://mastodon.bida.im/tags/informazioni" class="mention hashtag" rel="tag">#<span>informazioni</span></a>.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/incidente-informatico-alla-asl1-abruzzo-la-situazione-e-grave-ma-ce-poca-comunicazione/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/incidente</span><span class="invisible">-informatico-alla-asl1-abruzzo-la-situazione-e-grave-ma-ce-poca-comunicazione/</span></a></p>
Redhotcyber<p>La nuova cybergang RaaS RTM Locker promette di rimanere nell’ombra ma colpire massivamente</p><p>Piccole e medie imprese tremate, sta arrivando <a href="https://mastodon.bida.im/tags/RTMLocker" class="mention hashtag" rel="tag">#<span>RTMLocker</span></a>.</p><p>I <a href="https://mastodon.bida.im/tags/ricercatori" class="mention hashtag" rel="tag">#<span>ricercatori</span></a> di sicurezza <a href="https://mastodon.bida.im/tags/informatica" class="mention hashtag" rel="tag">#<span>informatica</span></a> hanno dettagliato le tattiche di un nuova <a href="https://mastodon.bida.im/tags/cybergang" class="mention hashtag" rel="tag">#<span>cybergang</span></a> emergente chiamata RTM <a href="https://mastodon.bida.im/tags/Locker" class="mention hashtag" rel="tag">#<span>Locker</span></a> (“Read The Manual” Locker).</p><p>Si tratta di una operazione di <a href="https://mastodon.bida.im/tags/Ransomware" class="mention hashtag" rel="tag">#<span>Ransomware</span></a>-as-a-Service (<a href="https://mastodon.bida.im/tags/RaaS" class="mention hashtag" rel="tag">#<span>RaaS</span></a>) la quale esegue attacchi <a href="https://mastodon.bida.im/tags/informatici" class="mention hashtag" rel="tag">#<span>informatici</span></a> per profitto. RTM Locker utilizza gli <a href="https://mastodon.bida.im/tags/affiliati" class="mention hashtag" rel="tag">#<span>affiliati</span></a> per riscuotere il <a href="https://mastodon.bida.im/tags/riscatto" class="mention hashtag" rel="tag">#<span>riscatto</span></a> dalle vittime e tutti i partner devono rispettare le rigide regole del gruppo.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/la-nuova-cybergang-raas-rtm-locker-promette-di-rimanere-nellombra-ma-colpire-massivamente/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/la-nuova-</span><span class="invisible">cybergang-raas-rtm-locker-promette-di-rimanere-nellombra-ma-colpire-massivamente/</span></a></p>
Redhotcyber<p>Attacco informatico all’italiana Comacchio da parte di LockBit. I samples sono online</p><p>La famigerata banda <a href="https://mastodon.bida.im/tags/ransomware" class="mention hashtag" rel="tag">#<span>ransomware</span></a> <a href="https://mastodon.bida.im/tags/Lockbit" class="mention hashtag" rel="tag">#<span>Lockbit</span></a>, rivendica un nuovo <a href="https://mastodon.bida.im/tags/attacco" class="mention hashtag" rel="tag">#<span>attacco</span></a> ad un’altra <a href="https://mastodon.bida.im/tags/organizzazione" class="mention hashtag" rel="tag">#<span>organizzazione</span></a> <a href="https://mastodon.bida.im/tags/Italiana" class="mention hashtag" rel="tag">#<span>Italiana</span></a>. Oggi è il turno della Comacchio che si trova a fare i conti con il <a href="https://mastodon.bida.im/tags/ransomware" class="mention hashtag" rel="tag">#<span>ransomware</span></a>.</p><p>LockBit 3.0 avvia il consueto <a href="https://mastodon.bida.im/tags/countdown" class="mention hashtag" rel="tag">#<span>countdown</span></a>, fissato tra 20gg ovvero il 2 Maggio alle 12:20ora UTC per pubblicare i <a href="https://mastodon.bida.im/tags/dati" class="mention hashtag" rel="tag">#<span>dati</span></a> dell’azienda, qualora l’organizzazione non acconsentirà alle sue richieste.</p><p>Questa volta non vengono pubblicate <a href="https://mastodon.bida.im/tags/informazioni" class="mention hashtag" rel="tag">#<span>informazioni</span></a> sull’estensione del countdown o sulla richiesta di <a href="https://mastodon.bida.im/tags/riscatto" class="mention hashtag" rel="tag">#<span>riscatto</span></a>. </p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/attacco-informatico-allitaliana-comacchio-da-parte-di-lockbit-i-samples-sono-online/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/attacco-i</span><span class="invisible">nformatico-allitaliana-comacchio-da-parte-di-lockbit-i-samples-sono-online/</span></a></p>