fosstodon.org is one of the many independent Mastodon servers you can use to participate in the fediverse.
Fosstodon is an invite only Mastodon instance that is open to those who are interested in technology; particularly free & open source software. If you wish to join, contact us for an invite.

Administered by:

Server stats:

8.8K
active users

#Capacità

0 posts0 participants0 posts today
Jacopo Ranieri<p>Le cinque marce del cavallo nato per trovare la sua strada sotto il cielo d’Islanda </p><p><a href="https://www.jacoporanieri.com/blog/?p=42466" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">jacoporanieri.com/blog/?p=4246</span><span class="invisible">6</span></a> </p><p><a href="https://mastodon.uno/tags/animali" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>animali</span></a> <a href="https://mastodon.uno/tags/cavalli" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cavalli</span></a> <a href="https://mastodon.uno/tags/razze" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>razze</span></a> <a href="https://mastodon.uno/tags/selezione" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selezione</span></a> <a href="https://mastodon.uno/tags/addestramento" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>addestramento</span></a> <a href="https://mastodon.uno/tags/equitazione" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>equitazione</span></a> <a href="https://mastodon.uno/tags/camminata" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>camminata</span></a> <a href="https://mastodon.uno/tags/trotto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>trotto</span></a> <a href="https://mastodon.uno/tags/galoppo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>galoppo</span></a> <a href="https://mastodon.uno/tags/ambio" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ambio</span></a> <a href="https://mastodon.uno/tags/competizioni" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>competizioni</span></a> <a href="https://mastodon.uno/tags/societ%C3%A0" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>società</span></a> <a href="https://mastodon.uno/tags/vichinghi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vichinghi</span></a> <a href="https://mastodon.uno/tags/medioevo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>medioevo</span></a> <a href="https://mastodon.uno/tags/caratteristiche" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>caratteristiche</span></a> <a href="https://mastodon.uno/tags/capacit%C3%A0" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>capacità</span></a> <a href="https://mastodon.uno/tags/zoccoli" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zoccoli</span></a> <a href="https://mastodon.uno/tags/quadrupedi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>quadrupedi</span></a> <a href="https://mastodon.uno/tags/Islanda" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Islanda</span></a> <a href="https://mastodon.uno/tags/europa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>europa</span></a> <a href="https://mastodon.uno/tags/storia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>storia</span></a> <a href="https://mastodon.uno/tags/tradizioni" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tradizioni</span></a></p>
Redhotcyber<p>Xehook Stealer: L’Ascesa e la Vendita di un Temibile Malware Stealer</p><p><a href="https://mastodon.bida.im/tags/Xehook" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Xehook</span></a> <a href="https://mastodon.bida.im/tags/Stealer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Stealer</span></a> è un sofisticato <a href="https://mastodon.bida.im/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> destinato ai <a href="https://mastodon.bida.im/tags/sistemi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sistemi</span></a> operativi Windows, scoperto per la prima volta nel gennaio 2024. Con un anno di vita, Xehook ha rapidamente guadagnato notorietà per le sue <a href="https://mastodon.bida.im/tags/capacit%C3%A0" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>capacità</span></a> avanzate di raccolta <a href="https://mastodon.bida.im/tags/dati" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dati</span></a> e il supporto per oltre 110 <a href="https://mastodon.bida.im/tags/criptovalute" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>criptovalute</span></a> e estensioni <a href="https://mastodon.bida.im/tags/2FA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>2FA</span></a>.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/innovation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>innovation</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>technology</span></a> <a href="https://mastodon.bida.im/tags/engineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>engineering</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/xehook-stealer-lascesa-e-la-vendita-di-un-temibile-malware-stealer" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/xehook-st</span><span class="invisible">ealer-lascesa-e-la-vendita-di-un-temibile-malware-stealer</span></a></p>
Redhotcyber<p>innovazione mortale: Taiwan sviluppa devastanti droni autonomi suicidi</p><p><a href="https://mastodon.bida.im/tags/Taiwan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Taiwan</span></a> sta lavorando attivamente per <a href="https://mastodon.bida.im/tags/sviluppare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sviluppare</span></a> un nuovo <a href="https://mastodon.bida.im/tags/drone" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>drone</span></a> <a href="https://mastodon.bida.im/tags/suicida" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>suicida</span></a> in grado di effettuare attacchi sia manuali che <a href="https://mastodon.bida.im/tags/autonomi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>autonomi</span></a>.&nbsp; </p><p>Questo sviluppo mira a migliorare le <a href="https://mastodon.bida.im/tags/capacit%C3%A0" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>capacità</span></a> di <a href="https://mastodon.bida.im/tags/guerra" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>guerra</span></a> asimmetrica di fronte alla crescente pressione dell’Esercito popolare di liberazione (PLA).</p><p>Il nuovo velivolo è una variante più potente del Loitering Unmanned Aircraft Type 1, ispirato al drone americano Switchblade 300, che si è dimostrato efficace nei conflitti militari.&nbsp; </p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/web" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>web</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/innovazione-mortale-taiwan-sviluppa-devastanti-droni-autonomi-suicidi/" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/innovazio</span><span class="invisible">ne-mortale-taiwan-sviluppa-devastanti-droni-autonomi-suicidi/</span></a></p>
Redhotcyber<p>Dalle formiche alle IA. Le capacità Emergenti nei Large Language Models</p><p>Sia il mondo <a href="https://mastodon.bida.im/tags/naturale" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>naturale</span></a> che il campo dell’<a href="https://mastodon.bida.im/tags/intelligenza" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>intelligenza</span></a> <a href="https://mastodon.bida.im/tags/artificiale" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>artificiale</span></a> presentano numerosi casi di <a href="https://mastodon.bida.im/tags/capacit%C3%A0" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>capacità</span></a> emergenti. Quando i singoli componenti interagiscono all’interno di un <a href="https://mastodon.bida.im/tags/sistema" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sistema</span></a>, producono <a href="https://mastodon.bida.im/tags/comportamenti" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>comportamenti</span></a> e <a href="https://mastodon.bida.im/tags/modelli" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>modelli</span></a> che non sono stati progettati esplicitamente.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/web" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>web</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/capacita-emergenti-nei-large-language-models/" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/capacita-</span><span class="invisible">emergenti-nei-large-language-models/</span></a></p>
Redhotcyber<p>Storia dell’intelligenza artificiale. Dagli anni 50 ai nostri giorni.</p><p>L’<a href="https://mastodon.bida.im/tags/intelligenza" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>intelligenza</span></a> <a href="https://mastodon.bida.im/tags/artificiale" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>artificiale</span></a> (<a href="https://mastodon.bida.im/tags/IA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IA</span></a>) è una disciplina che mira a sviluppare <a href="https://mastodon.bida.im/tags/sistemi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sistemi</span></a> in grado di emulare alcune delle <a href="https://mastodon.bida.im/tags/capacit%C3%A0" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>capacità</span></a> <a href="https://mastodon.bida.im/tags/cognitive" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cognitive</span></a> umane. Nel corso degli anni, l’IA ha attraversato diverse fasi, con periodi di fervida attività seguiti da momenti di rallentamento. In questo articolo esploreremo la <a href="https://mastodon.bida.im/tags/storia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>storia</span></a> dell’intelligenza artificiale e i suoi momenti cruciali.</p><p>Scopriamo l'avvincente storia della IA, a cura di Francesco Conti.</p><p>Condividi questo post se hai trovato la news interessante.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/web" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>web</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/storia-dellintelligenza-artificiale-dagli-anni-50-ai-nostri-giorni/" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/storia-de</span><span class="invisible">llintelligenza-artificiale-dagli-anni-50-ai-nostri-giorni/</span></a></p>
Redhotcyber<p>Alla scoperta degli Advanced Persistent Threat (APT). Il braccio armato digitale dei cyber regimi</p><p>In un’era caratterizzata da <a href="https://mastodon.bida.im/tags/progressi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>progressi</span></a> <a href="https://mastodon.bida.im/tags/tecnologici" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tecnologici</span></a> senza precedenti, il <a href="https://mastodon.bida.im/tags/panorama" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>panorama</span></a> della <a href="https://mastodon.bida.im/tags/sicurezza" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sicurezza</span></a> globale si confronta con una <a href="https://mastodon.bida.im/tags/minaccia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>minaccia</span></a> in continua <a href="https://mastodon.bida.im/tags/evoluzione" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>evoluzione</span></a>.</p><p>Le forme tradizionali di <a href="https://mastodon.bida.im/tags/guerra" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>guerra</span></a> <a href="https://mastodon.bida.im/tags/asimmetrica" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>asimmetrica</span></a> e <a href="https://mastodon.bida.im/tags/guerriglia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>guerriglia</span></a> hanno trovato un nuovo alleato nel regno digitale, dove la convergenza di <a href="https://mastodon.bida.im/tags/ideologie" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ideologie</span></a> estremiste e sofisticate <a href="https://mastodon.bida.im/tags/capacit%C3%A0" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>capacità</span></a> informatiche ha dato vita al preoccupante fenomeno del <a href="https://mastodon.bida.im/tags/cyberterrorismo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberterrorismo</span></a>. </p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/web" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>web</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/alla-scoperta-degli-advanced-persistent-threat-apt-il-braccio-armato-digitale-dei-cyber-regimi/" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/alla-scop</span><span class="invisible">erta-degli-advanced-persistent-threat-apt-il-braccio-armato-digitale-dei-cyber-regimi/</span></a></p>
Redhotcyber<p>Google utilizzerò i tuoi dati per addestrare le AI. Lo formalizza nella sua nuova policy sulla privacy</p><p>Google sta prestando sempre più attenzione allo sviluppo dell’<a href="https://mastodon.bida.im/tags/intelligenza" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>intelligenza</span></a> <a href="https://mastodon.bida.im/tags/artificiale" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>artificiale</span></a> ogni mese. In un’informativa sulla <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> aggiornata datata 1 luglio 2023, l’azienda sottolinea la sua <a href="https://mastodon.bida.im/tags/capacit%C3%A0" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>capacità</span></a> di utilizzare i <a href="https://mastodon.bida.im/tags/dati" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dati</span></a> degli utenti per addestrare i suoi <a href="https://mastodon.bida.im/tags/modelli" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>modelli</span></a> di <a href="https://mastodon.bida.im/tags/intelligenza" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>intelligenza</span></a> <a href="https://mastodon.bida.im/tags/artificiale" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>artificiale</span></a> (<a href="https://mastodon.bida.im/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a>).</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/web" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>web</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/google-utilizzero-i-tuoi-dati-per-addestrare-le-ai-lo-formalizza-nella-sua-nuova-policy-sulla-privacy/" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/google-ut</span><span class="invisible">ilizzero-i-tuoi-dati-per-addestrare-le-ai-lo-formalizza-nella-sua-nuova-policy-sulla-privacy/</span></a></p>
Redhotcyber<p>Mercedes-Benz l’interfaccia vocale del futuro con ChatGPT rivoluziona i comandi vocali della tua auto!</p><p><a href="https://mastodon.bida.im/tags/MercedesBenz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MercedesBenz</span></a> porta l’esperienza di <a href="https://mastodon.bida.im/tags/guida" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>guida</span></a> a un nuovo livello con l’integrazione di <a href="https://mastodon.bida.im/tags/ChatGPT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ChatGPT</span></a>, rendendo disponibili le straordinarie <a href="https://mastodon.bida.im/tags/capacit%C3%A0" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>capacità</span></a> di questo assistente anche nelle auto dei suoi clienti. Grazie a questa <a href="https://mastodon.bida.im/tags/innovazione" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>innovazione</span></a>, gli utenti possono ampliare le loro interazioni con le loro Mercedes-Benz, godendo di un’<a href="https://mastodon.bida.im/tags/esperienza" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>esperienza</span></a> di guida ancora più coinvolgente.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/mercedes-benz-linterfaccia-vocale-del-futuro-con-chatgpt/" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/mercedes-</span><span class="invisible">benz-linterfaccia-vocale-del-futuro-con-chatgpt/</span></a></p>
Redhotcyber<p>L'hacker non è un criminale informatico. L'Hacking è un percorso, non una destinazione</p><p>Molto spesso leggiamo sui <a href="https://mastodon.bida.im/tags/titoli" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>titoli</span></a> dei <a href="https://mastodon.bida.im/tags/giornali" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>giornali</span></a> "attacco hacker" oppure "gli <a href="https://mastodon.bida.im/tags/hacker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacker</span></a> tengono sotto scacco l'Italia" ma sono tutti titoli errati nella loro sostanza.</p><p>Come sempre abbiamo detto su queste pagine, "hacking" è una "<a href="https://mastodon.bida.im/tags/capacit%C3%A0" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>capacità</span></a>" e non un <a href="https://mastodon.bida.im/tags/aggettivo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>aggettivo</span></a> negativo di una persona. Come in tutte le "capacità", c'è chi la può usare a fin di bene o a fin di male.</p><p>A cura di Massimiliano Brolli.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecurity</span></a></p><p><a href="https://www.youtube.com/watch?v=ycUoxnWDcPY" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">youtube.com/watch?v=ycUoxnWDcP</span><span class="invisible">Y</span></a></p>
Redhotcyber<p>La prima base station 5G Russa è stata creata. Più sanzioni si fanno, più tecnologia si crea.</p><p>Vietare qualcosa, alla lunga potrebbe non pagare, in quanto le <a href="https://mastodon.bida.im/tags/nazioni" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nazioni</span></a> si <a href="https://mastodon.bida.im/tags/organizzano" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>organizzano</span></a> e creano le proprie <a href="https://mastodon.bida.im/tags/tecnologie" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tecnologie</span></a>, soprattutto se ne hanno le <a href="https://mastodon.bida.im/tags/capacit%C3%A0" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>capacità</span></a>, eliminando di fatto il controllo nei <a href="https://mastodon.bida.im/tags/mercati" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mercati</span></a> e sull’<a href="https://mastodon.bida.im/tags/economia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>economia</span></a> in specifici settori tecnologicamente avanzati.</p><p>Nello specifico, lo Skoltech Institute, con il supporto della Fondazione <a href="https://mastodon.bida.im/tags/NTI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NTI</span></a> della Federazione Russa, ha sviluppato la prima <a href="https://mastodon.bida.im/tags/stazione" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>stazione</span></a> <a href="https://mastodon.bida.im/tags/radiobase" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>radiobase</span></a> domestica di quinta generazione (<a href="https://mastodon.bida.im/tags/5G" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>5G</span></a>). </p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/la-prima-base-station-5g-russa-e-stata-creata-piu-sanzioni-si-fanno-piu-tecnologia-si-crea/" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/la-prima-</span><span class="invisible">base-station-5g-russa-e-stata-creata-piu-sanzioni-si-fanno-piu-tecnologia-si-crea/</span></a></p>
Redhotcyber<p>Vulkan Files: così la Federazione Russa ha orchestrato le moderne guerre cibernetiche</p><p>Tradizionalmente, l’FSB, il GRU e l’SVR della <a href="https://mastodon.bida.im/tags/Federazione" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Federazione</span></a> <a href="https://mastodon.bida.im/tags/Russa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russa</span></a> sono sospettosi l’uno dell’altro e raramente comunicano ed evitano di utilizzare gli stessi <a href="https://mastodon.bida.im/tags/software" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>software</span></a>. A tal punto che nel 2016, il <a href="https://mastodon.bida.im/tags/GRU" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GRU</span></a> e l’<a href="https://mastodon.bida.im/tags/SVR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SVR</span></a> avevano entrambi, senza consultarsi a vicenda, <a href="https://mastodon.bida.im/tags/hackerato" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackerato</span></a> le e-mail del Partito Democratico degli <a href="https://mastodon.bida.im/tags/statiuniti" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>statiuniti</span></a>.</p><p>Dall’inizio degli anni 2010, i servizi di sicurezza russi hanno tentato di “aumentare” le proprie <a href="https://mastodon.bida.im/tags/capacit%C3%A0" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>capacità</span></a> <a href="https://mastodon.bida.im/tags/informatiche" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informatiche</span></a> a un ritmo rapido, senza avere sempre i mezzi interni per realizzare le proprie <a href="https://mastodon.bida.im/tags/ambizioni" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ambizioni</span></a>.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/vulkan-files-cosi-la-federazione-russa-ha-orchestrato-le-moderne-guerre-cibernetiche/" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/vulkan-fi</span><span class="invisible">les-cosi-la-federazione-russa-ha-orchestrato-le-moderne-guerre-cibernetiche/</span></a></p>
Redhotcyber<p>Le principali aziende di robotica che utilizzano l’intelligenza artificiale di fronte alle sfide operative <br> <br>La <a href="https://mastodon.bida.im/tags/tecnologia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tecnologia</span></a> <a href="https://mastodon.bida.im/tags/robotica" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>robotica</span></a> sta diventando sempre più diffusa in molti settori <a href="https://mastodon.bida.im/tags/industriali" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>industriali</span></a> di tutto il mondo grazie alla sua <a href="https://mastodon.bida.im/tags/capacit%C3%A0" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>capacità</span></a> di ridurre i costi <a href="https://mastodon.bida.im/tags/operativi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>operativi</span></a>, aumentare la <a href="https://mastodon.bida.im/tags/produttivit%C3%A0" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>produttività</span></a> e migliorare la <a href="https://mastodon.bida.im/tags/qualit%C3%A0" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>qualità</span></a> dei <a href="https://mastodon.bida.im/tags/prodotti" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>prodotti</span></a>. <br> <br>Le aziende di robotica stanno incorporando l’<a href="https://mastodon.bida.im/tags/intelligenza" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>intelligenza</span></a> <a href="https://mastodon.bida.im/tags/artificiale" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>artificiale</span></a> (<a href="https://mastodon.bida.im/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a>) nelle <a href="https://mastodon.bida.im/tags/macchine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>macchine</span></a> per aiutare le aziende e i loro dipendenti attraverso l’automazione in settori che vanno dalla produzione al servizio clienti. <br> <br>A cura di Alessia Tomaselli. <br> <br><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecurity</span></a> <br> <br><a href="https://www.redhotcyber.com/post/le-principali-aziende-di-robotica-che-utilizzano-lintelligenza-artificiale-di-fronte-alle-sfide-operative/" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/le-princi</span><span class="invisible">pali-aziende-di-robotica-che-utilizzano-lintelligenza-artificiale-di-fronte-alle-sfide-operative/</span></a></p>
Redhotcyber<p>Cani e camerieri in versione smart robot: i nuovi lanci di Oppo e Hyundai</p><p>Gli smart robot sono entrati ormai da tempo nella nostra quotidianità e interessano sempre più ambiti di <a href="https://mastodon.bida.im/tags/applicazione" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>applicazione</span></a>.</p><p>Ci aiutano a pulire, a cucinare, semplificando e velocizzando molte attività giornaliere; oppure, nelle industrie, a razionalizzare e aumentare la <a href="https://mastodon.bida.im/tags/capacit%C3%A0" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>capacità</span></a> <a href="https://mastodon.bida.im/tags/produttiva" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>produttiva</span></a>.</p><p>Proprio in questi giorni sono stati lanciati due nuovi <a href="https://mastodon.bida.im/tags/robot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>robot</span></a> intelligenti, uno da <a href="https://mastodon.bida.im/tags/Oppo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Oppo</span></a> e uno da <a href="https://mastodon.bida.im/tags/Hyundai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hyundai</span></a>.</p><p>Due prodotti che probabilmente presto si aggiungeranno alla lista di quelli che fanno parte della nostra quotidianità.</p><p>Ma vediamo nello specifico di cosa si tratta.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecurity</span></a></p><p><a href="https://lnkd.in/dEDV-6A2" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="">lnkd.in/dEDV-6A2</span><span class="invisible"></span></a></p>