fosstodon.org is one of the many independent Mastodon servers you can use to participate in the fediverse.
Fosstodon is an invite only Mastodon instance that is open to those who are interested in technology; particularly free & open source software. If you wish to join, contact us for an invite.

Administered by:

Server stats:

10K
active users

#compromissione

0 posts0 participants0 posts today
Redhotcyber<p>LinkedIn sotto attacco! Massicce violazioni degli account è in corso. E’ il caso di valutare la MFA</p><p><a href="https://mastodon.bida.im/tags/LinkedIn" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LinkedIn</span></a> è stato preso di mira recentemente da un’ondata di <a href="https://mastodon.bida.im/tags/violazioni" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>violazioni</span></a> degli <a href="https://mastodon.bida.im/tags/account" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>account</span></a> che hanno portato al blocco di molti account per motivi di <a href="https://mastodon.bida.im/tags/sicurezza" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sicurezza</span></a> o alla <a href="https://mastodon.bida.im/tags/compromissione" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>compromissione</span></a> da parte dei malintenzionati.</p><p>Condividi questo post se hai trovato la news interessante.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/web" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>web</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/linkedin-sotto-attacco-una-serie-di-massicci-furti-degli-account-e-in-corso-forse-e-il-faso-di-valutare-la-mfa/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/linkedin-</span><span class="invisible">sotto-attacco-una-serie-di-massicci-furti-degli-account-e-in-corso-forse-e-il-faso-di-valutare-la-mfa/</span></a></p>
Redhotcyber<p>L’Italia coinvolta in 62 campagne malevole questa settimana. Il settore Banking svetta tra i più sfruttati</p><p>In questa settimana, il CERT-AgID ha riscontrato ed analizzato, nello scenario <a href="https://mastodon.bida.im/tags/Italiano" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Italiano</span></a> di suo riferimento, un totale di 62 <a href="https://mastodon.bida.im/tags/campagne" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>campagne</span></a> <a href="https://mastodon.bida.im/tags/malevole" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malevole</span></a>, di cui 60 con <a href="https://mastodon.bida.im/tags/obiettivi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>obiettivi</span></a> <a href="https://mastodon.bida.im/tags/Italiani" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Italiani</span></a> e due generiche che hanno comunque interessato l’<a href="https://mastodon.bida.im/tags/Italia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Italia</span></a>, mettendo a disposizione dei suoi enti accreditati i relativi 259 indicatori di <a href="https://mastodon.bida.im/tags/compromissione" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>compromissione</span></a> (<a href="https://mastodon.bida.im/tags/IOC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IOC</span></a>) individuati.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/litalia-coinvolta-in-62-campagne-malevole-questa-settimana-il-settore-banking-svetta-tra-i-piu-sfruttati/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/litalia-c</span><span class="invisible">oinvolta-in-62-campagne-malevole-questa-settimana-il-settore-banking-svetta-tra-i-piu-sfruttati/</span></a></p>
Redhotcyber<p>Mentre l’Italia fa l’influencer, 59 campagne malevole colpiscono il belpaese. Intesa San Paolo in pole position</p><p>Il <a href="https://mastodon.bida.im/tags/CERT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CERT</span></a>-<a href="https://mastodon.bida.im/tags/AgID" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AgID</span></a> ha pubblicato recentemente le statistiche delle campagne di <a href="https://mastodon.bida.im/tags/malspam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malspam</span></a> che hanno vista protagonista l’<a href="https://mastodon.bida.im/tags/Italia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Italia</span></a> nella settimana che va dal 15 al 21 aprile 2023. Nella passata settimana, il CERT-AgID ha riscontrato ed analizzato, nello scenario <a href="https://mastodon.bida.im/tags/Italiano" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Italiano</span></a> di suo riferimento, un totale di 59 <a href="https://mastodon.bida.im/tags/campagne" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>campagne</span></a> malevole di cui 58 con obiettivi <a href="https://mastodon.bida.im/tags/Italiani" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Italiani</span></a>.</p><p>Come di consueto sono stati inviati e messi a disposizione degli enti accreditati i relativi 470 <a href="https://mastodon.bida.im/tags/indicatori" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>indicatori</span></a> di <a href="https://mastodon.bida.im/tags/compromissione" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>compromissione</span></a> (<a href="https://mastodon.bida.im/tags/IOC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IOC</span></a>) individuati.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/mentre-litalia-fa-linfluencer-59-campagne-malevole-colpiscono-il-belpaese-intesa-san-paolo-in-pole-position/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/mentre-li</span><span class="invisible">talia-fa-linfluencer-59-campagne-malevole-colpiscono-il-belpaese-intesa-san-paolo-in-pole-position/</span></a></p>
Redhotcyber<p>I risultati di Bing possono essere falsificati utilizzando la falla di sicurezza BingBang</p><p>Gli esperti di sicurezza hanno scoperto un bug di sicurezza, al quale è stato dato il nome di <a href="https://mastodon.bida.im/tags/BingBang" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BingBang</span></a>. </p><p>Hanno scoperto che una configurazione errata di Azure Active Directory (<a href="https://mastodon.bida.im/tags/AAD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AAD</span></a>) potrebbe portare alla <a href="https://mastodon.bida.im/tags/compromissione" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>compromissione</span></a> delle <a href="https://mastodon.bida.im/tags/SERP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SERP</span></a> di Bing[.]com, agli attacchi <a href="https://mastodon.bida.im/tags/XSS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>XSS</span></a> e alla compromissione degli account utente di Office 365.</p><p>Il <a href="https://mastodon.bida.im/tags/bug" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bug</span></a> ha fatto guadagnare ai <a href="https://mastodon.bida.im/tags/ricercatori" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ricercatori</span></a> una ricompensa di 40.000 dollari.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/i-risultati-di-bing-possono-essere-falsificati-utilizzando-la-falla-di-sicurezza-bingbang/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/i-risulta</span><span class="invisible">ti-di-bing-possono-essere-falsificati-utilizzando-la-falla-di-sicurezza-bingbang/</span></a></p>
Redhotcyber<p>Dati della Banca Popolare di Sondrio online. In vendita 4270 dipendenti e l’accesso al server di posta</p><p>Un <a href="https://mastodon.bida.im/tags/criminale" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>criminale</span></a> <a href="https://mastodon.bida.im/tags/informatico" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informatico</span></a> all’interno del noto <a href="https://mastodon.bida.im/tags/forum" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>forum</span></a> <a href="https://mastodon.bida.im/tags/underground" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>underground</span></a> in lingua russa <a href="https://mastodon.bida.im/tags/XSS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>XSS</span></a>, ha pubblicato oggi un post che rivendica una <a href="https://mastodon.bida.im/tags/compromissione" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>compromissione</span></a> dell’<a href="https://mastodon.bida.im/tags/infrastruttura" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infrastruttura</span></a> IT della Banca Popolare di Sondrio.</p><p>Nello specifico, il <a href="https://mastodon.bida.im/tags/criminale" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>criminale</span></a> riporta che ha avuto accesso al <a href="https://mastodon.bida.im/tags/server" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>server</span></a> di posta, alle <a href="https://mastodon.bida.im/tags/email" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>email</span></a> e alle <a href="https://mastodon.bida.im/tags/password" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>password</span></a> aziendali, e ad avere <a href="https://mastodon.bida.im/tags/informazioni" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informazioni</span></a> personali di 4270 dipendenti.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/dati-online-della-banca-popolare-di-sondrio-in-vendita-4270-dipendenti-e-laccesso-al-server-di-posta/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/dati-onli</span><span class="invisible">ne-della-banca-popolare-di-sondrio-in-vendita-4270-dipendenti-e-laccesso-al-server-di-posta/</span></a></p>
Redhotcyber<p>Microsoft: solo 2 ore occorrono per violare un account di posta elettronica aziendale</p><p>Il team di <a href="https://mastodon.bida.im/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> Security <a href="https://mastodon.bida.im/tags/Intelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Intelligence</span></a> ha recentemente indagato sugli attacchi di <a href="https://mastodon.bida.im/tags/compromissione" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>compromissione</span></a> della posta elettronica aziendale (<a href="https://mastodon.bida.im/tags/BEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BEC</span></a>) e ha scoperto che gli aggressori agiscono rapidamente, con alcuni passaggi che richiedono solo pochi minuti.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/microsoft-solo-2-ore-occorrono-per-violare-un-account-di-posta-elettronica-aziendale/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/microsoft</span><span class="invisible">-solo-2-ore-occorrono-per-violare-un-account-di-posta-elettronica-aziendale/</span></a></p>
Redhotcyber<p>11.000 siti WordPress sono stati infettati da una backdoor</p><p>Gli <a href="https://mastodon.bida.im/tags/esperti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>esperti</span></a> di Sucuri hanno scoperto che gli aggressori utilizzano oltre 70 domini fake per ridurre la lunghezza delle <a href="https://mastodon.bida.im/tags/URL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>URL</span></a>, i quali hanno infettato oltre 10.800 siti <a href="https://mastodon.bida.im/tags/WordPress" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WordPress</span></a> con <a href="https://mastodon.bida.im/tags/adware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>adware</span></a>.</p><p>I primi dettagli su questa <a href="https://mastodon.bida.im/tags/campagna" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>campagna</span></a> dannosa sono <a href="https://mastodon.bida.im/tags/apparsi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apparsi</span></a> a novembre 2022, quando gli stessi <a href="https://mastodon.bida.im/tags/ricercatori" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ricercatori</span></a> di Sucuri hanno notato la <a href="https://mastodon.bida.im/tags/compromissione" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>compromissione</span></a> di 15.000 siti WordPress. </p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/11-000-siti-wordpress-sono-stati-infettati-da-una-backdoor/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/11-000-si</span><span class="invisible">ti-wordpress-sono-stati-infettati-da-una-backdoor/</span></a></p>
Redhotcyber<p>Cybercrime e Phishing: componenti XLL di Excel come vettore iniziale di attacco</p><p>Gli analisti di <a href="https://mastodon.bida.im/tags/CiscoTalos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CiscoTalos</span></a> affermano che dopo che <a href="https://mastodon.bida.im/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> ha iniziato a bloccare le <a href="https://mastodon.bida.im/tags/macro" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>macro</span></a> <a href="https://mastodon.bida.im/tags/VBA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VBA</span></a> nei documenti Office scaricati da Internet, tali documenti (contrassegnati come Mark Of The Web) hanno costretto gli <a href="https://mastodon.bida.im/tags/aggressori" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aggressori</span></a> a ripensare le loro catene di <a href="https://mastodon.bida.im/tags/attacco" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>attacco</span></a>. </p><p>Ad esempio, i criminali informatii utilizzano sempre più i file dei componenti aggiuntivi di <a href="https://mastodon.bida.im/tags/Excel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Excel</span></a> (.<a href="https://mastodon.bida.im/tags/XLL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>XLL</span></a>) come vettore di <a href="https://mastodon.bida.im/tags/compromissione" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>compromissione</span></a> iniziale.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecurity</span></a></p><p><a href="https://lnkd.in/d_ghTBKj" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">lnkd.in/d_ghTBKj</span><span class="invisible"></span></a></p>
Redhotcyber<p>Quali aziende italiane verranno violate? Gli IAB si evolvono in e-commerce underground</p><p>In effetti la domanda è posta male in quanto queste aziende sono state già violate e non se ne sono accorte (o “probabilmente” accorte), anche se il reale danno ancora non è stato perpretrato.</p><p>Ma andiamo con ordine.</p><p>Iniziamo col dire che è compito della cyber threat <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>intelligence</span></a> (CTI) andare a scandagliare i meandri delle <a href="https://mastodon.bida.im/tags/underground" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>underground</span></a> alla ricerca di possibili trecce di eventi <a href="https://mastodon.bida.im/tags/malevoli" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malevoli</span></a> che possono palesare una futura <a href="https://mastodon.bida.im/tags/compromissione" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>compromissione</span></a> di una specifica <a href="https://mastodon.bida.im/tags/organizzazione" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>organizzazione</span></a>.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecurity</span></a></p><p><a href="https://lnkd.in/dQuiBPDT" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">lnkd.in/dQuiBPDT</span><span class="invisible"></span></a></p>
Redhotcyber<p>Uscite le regole YARA per le versioni non ufficiali di Cobalt Strike</p><p>Google <a href="https://mastodon.bida.im/tags/Cloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cloud</span></a> Threat <a href="https://mastodon.bida.im/tags/Intelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Intelligence</span></a> ha annunciato il rilascio delle regole <a href="https://mastodon.bida.im/tags/YARA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>YARA</span></a>, nonché una raccolta di indicatori di <a href="https://mastodon.bida.im/tags/compromissione" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>compromissione</span></a> <a href="https://mastodon.bida.im/tags/VirusTotal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VirusTotal</span></a>, che dovrebbero facilitare rilevare le componenti <a href="https://mastodon.bida.im/tags/CobaltStrike" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CobaltStrike</span></a> malevole.</p><p>Cobalt Strike è uno strumento commerciale legittimo creato per attività di <a href="https://mastodon.bida.im/tags/PenetrtionTest" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PenetrtionTest</span></a>/#RedTeam ed è incentrato sulla fase di post-sfruttamento.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecurity</span></a></p><p><a href="https://lnkd.in/dGsTbR7j" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">lnkd.in/dGsTbR7j</span><span class="invisible"></span></a></p>
Redhotcyber<p>F5 risolve due pericolose RCE che possono portare alla compromissione di BIG-IP e BIG-IQ</p><p>Gli sviluppatori di <a href="https://mastodon.bida.im/tags/F5" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>F5</span></a> hanno rilasciato <a href="https://mastodon.bida.im/tags/correzioni" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>correzioni</span></a> per i prodotti <a href="https://mastodon.bida.im/tags/BIGIP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BIGIP</span></a> e <a href="https://mastodon.bida.im/tags/BIGIQ" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BIGIQ</span></a>. Le <a href="https://mastodon.bida.im/tags/patch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>patch</span></a> hanno risolto due gravi <a href="https://mastodon.bida.im/tags/vulnerabilit%C3%A0" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilità</span></a> che potevano consentire agli aggressori non autenticati di eseguire in remoto codice arbitrario (<a href="https://mastodon.bida.im/tags/RCE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RCE</span></a>) su <a href="https://mastodon.bida.im/tags/endpoint" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>endpoint</span></a> vulnerabili.</p><p>Fortunatamente, lo sfruttamento di entrambi i problemi richiede il rispetto di determinate condizioni, il che rende difficile sfruttare queste <a href="https://mastodon.bida.im/tags/vulnerabilit%C3%A0" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilità</span></a>. Tuttavia, F5 avverte che uno sfruttamento riuscito può portare alla completa <a href="https://mastodon.bida.im/tags/compromissione" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>compromissione</span></a> dei dispositivi.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecurity</span></a></p><p><a href="https://lnkd.in/dgRMZV5C" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">lnkd.in/dgRMZV5C</span><span class="invisible"></span></a></p>