mastouille.fr est l'un des nombreux serveurs Mastodon indépendants que vous pouvez utiliser pour participer au fédiverse.
Mastouille est une instance Mastodon durable, ouverte, et hébergée en France.

Administré par :

Statistiques du serveur :

597
comptes actifs

#compromissione

0 message0 participant0 message aujourd’hui
Redhotcyber<p>LinkedIn sotto attacco! Massicce violazioni degli account è in corso. E’ il caso di valutare la MFA</p><p><a href="https://mastodon.bida.im/tags/LinkedIn" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LinkedIn</span></a> è stato preso di mira recentemente da un’ondata di <a href="https://mastodon.bida.im/tags/violazioni" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>violazioni</span></a> degli <a href="https://mastodon.bida.im/tags/account" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>account</span></a> che hanno portato al blocco di molti account per motivi di <a href="https://mastodon.bida.im/tags/sicurezza" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sicurezza</span></a> o alla <a href="https://mastodon.bida.im/tags/compromissione" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>compromissione</span></a> da parte dei malintenzionati.</p><p>Condividi questo post se hai trovato la news interessante.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/web" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>web</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/linkedin-sotto-attacco-una-serie-di-massicci-furti-degli-account-e-in-corso-forse-e-il-faso-di-valutare-la-mfa/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/linkedin-</span><span class="invisible">sotto-attacco-una-serie-di-massicci-furti-degli-account-e-in-corso-forse-e-il-faso-di-valutare-la-mfa/</span></a></p>
Redhotcyber<p>L’Italia coinvolta in 62 campagne malevole questa settimana. Il settore Banking svetta tra i più sfruttati</p><p>In questa settimana, il CERT-AgID ha riscontrato ed analizzato, nello scenario <a href="https://mastodon.bida.im/tags/Italiano" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Italiano</span></a> di suo riferimento, un totale di 62 <a href="https://mastodon.bida.im/tags/campagne" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>campagne</span></a> <a href="https://mastodon.bida.im/tags/malevole" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malevole</span></a>, di cui 60 con <a href="https://mastodon.bida.im/tags/obiettivi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>obiettivi</span></a> <a href="https://mastodon.bida.im/tags/Italiani" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Italiani</span></a> e due generiche che hanno comunque interessato l’<a href="https://mastodon.bida.im/tags/Italia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Italia</span></a>, mettendo a disposizione dei suoi enti accreditati i relativi 259 indicatori di <a href="https://mastodon.bida.im/tags/compromissione" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>compromissione</span></a> (<a href="https://mastodon.bida.im/tags/IOC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IOC</span></a>) individuati.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/litalia-coinvolta-in-62-campagne-malevole-questa-settimana-il-settore-banking-svetta-tra-i-piu-sfruttati/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/litalia-c</span><span class="invisible">oinvolta-in-62-campagne-malevole-questa-settimana-il-settore-banking-svetta-tra-i-piu-sfruttati/</span></a></p>
Redhotcyber<p>Mentre l’Italia fa l’influencer, 59 campagne malevole colpiscono il belpaese. Intesa San Paolo in pole position</p><p>Il <a href="https://mastodon.bida.im/tags/CERT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CERT</span></a>-<a href="https://mastodon.bida.im/tags/AgID" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AgID</span></a> ha pubblicato recentemente le statistiche delle campagne di <a href="https://mastodon.bida.im/tags/malspam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malspam</span></a> che hanno vista protagonista l’<a href="https://mastodon.bida.im/tags/Italia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Italia</span></a> nella settimana che va dal 15 al 21 aprile 2023. Nella passata settimana, il CERT-AgID ha riscontrato ed analizzato, nello scenario <a href="https://mastodon.bida.im/tags/Italiano" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Italiano</span></a> di suo riferimento, un totale di 59 <a href="https://mastodon.bida.im/tags/campagne" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>campagne</span></a> malevole di cui 58 con obiettivi <a href="https://mastodon.bida.im/tags/Italiani" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Italiani</span></a>.</p><p>Come di consueto sono stati inviati e messi a disposizione degli enti accreditati i relativi 470 <a href="https://mastodon.bida.im/tags/indicatori" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>indicatori</span></a> di <a href="https://mastodon.bida.im/tags/compromissione" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>compromissione</span></a> (<a href="https://mastodon.bida.im/tags/IOC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IOC</span></a>) individuati.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/mentre-litalia-fa-linfluencer-59-campagne-malevole-colpiscono-il-belpaese-intesa-san-paolo-in-pole-position/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/mentre-li</span><span class="invisible">talia-fa-linfluencer-59-campagne-malevole-colpiscono-il-belpaese-intesa-san-paolo-in-pole-position/</span></a></p>
Redhotcyber<p>I risultati di Bing possono essere falsificati utilizzando la falla di sicurezza BingBang</p><p>Gli esperti di sicurezza hanno scoperto un bug di sicurezza, al quale è stato dato il nome di <a href="https://mastodon.bida.im/tags/BingBang" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BingBang</span></a>. </p><p>Hanno scoperto che una configurazione errata di Azure Active Directory (<a href="https://mastodon.bida.im/tags/AAD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AAD</span></a>) potrebbe portare alla <a href="https://mastodon.bida.im/tags/compromissione" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>compromissione</span></a> delle <a href="https://mastodon.bida.im/tags/SERP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SERP</span></a> di Bing[.]com, agli attacchi <a href="https://mastodon.bida.im/tags/XSS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>XSS</span></a> e alla compromissione degli account utente di Office 365.</p><p>Il <a href="https://mastodon.bida.im/tags/bug" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bug</span></a> ha fatto guadagnare ai <a href="https://mastodon.bida.im/tags/ricercatori" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ricercatori</span></a> una ricompensa di 40.000 dollari.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/i-risultati-di-bing-possono-essere-falsificati-utilizzando-la-falla-di-sicurezza-bingbang/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/i-risulta</span><span class="invisible">ti-di-bing-possono-essere-falsificati-utilizzando-la-falla-di-sicurezza-bingbang/</span></a></p>
Redhotcyber<p>Dati della Banca Popolare di Sondrio online. In vendita 4270 dipendenti e l’accesso al server di posta</p><p>Un <a href="https://mastodon.bida.im/tags/criminale" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>criminale</span></a> <a href="https://mastodon.bida.im/tags/informatico" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informatico</span></a> all’interno del noto <a href="https://mastodon.bida.im/tags/forum" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>forum</span></a> <a href="https://mastodon.bida.im/tags/underground" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>underground</span></a> in lingua russa <a href="https://mastodon.bida.im/tags/XSS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>XSS</span></a>, ha pubblicato oggi un post che rivendica una <a href="https://mastodon.bida.im/tags/compromissione" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>compromissione</span></a> dell’<a href="https://mastodon.bida.im/tags/infrastruttura" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infrastruttura</span></a> IT della Banca Popolare di Sondrio.</p><p>Nello specifico, il <a href="https://mastodon.bida.im/tags/criminale" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>criminale</span></a> riporta che ha avuto accesso al <a href="https://mastodon.bida.im/tags/server" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>server</span></a> di posta, alle <a href="https://mastodon.bida.im/tags/email" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>email</span></a> e alle <a href="https://mastodon.bida.im/tags/password" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>password</span></a> aziendali, e ad avere <a href="https://mastodon.bida.im/tags/informazioni" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informazioni</span></a> personali di 4270 dipendenti.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/dati-online-della-banca-popolare-di-sondrio-in-vendita-4270-dipendenti-e-laccesso-al-server-di-posta/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/dati-onli</span><span class="invisible">ne-della-banca-popolare-di-sondrio-in-vendita-4270-dipendenti-e-laccesso-al-server-di-posta/</span></a></p>
Redhotcyber<p>Microsoft: solo 2 ore occorrono per violare un account di posta elettronica aziendale</p><p>Il team di <a href="https://mastodon.bida.im/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> Security <a href="https://mastodon.bida.im/tags/Intelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Intelligence</span></a> ha recentemente indagato sugli attacchi di <a href="https://mastodon.bida.im/tags/compromissione" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>compromissione</span></a> della posta elettronica aziendale (<a href="https://mastodon.bida.im/tags/BEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BEC</span></a>) e ha scoperto che gli aggressori agiscono rapidamente, con alcuni passaggi che richiedono solo pochi minuti.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/microsoft-solo-2-ore-occorrono-per-violare-un-account-di-posta-elettronica-aziendale/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/microsoft</span><span class="invisible">-solo-2-ore-occorrono-per-violare-un-account-di-posta-elettronica-aziendale/</span></a></p>
Redhotcyber<p>11.000 siti WordPress sono stati infettati da una backdoor</p><p>Gli <a href="https://mastodon.bida.im/tags/esperti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>esperti</span></a> di Sucuri hanno scoperto che gli aggressori utilizzano oltre 70 domini fake per ridurre la lunghezza delle <a href="https://mastodon.bida.im/tags/URL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>URL</span></a>, i quali hanno infettato oltre 10.800 siti <a href="https://mastodon.bida.im/tags/WordPress" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WordPress</span></a> con <a href="https://mastodon.bida.im/tags/adware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>adware</span></a>.</p><p>I primi dettagli su questa <a href="https://mastodon.bida.im/tags/campagna" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>campagna</span></a> dannosa sono <a href="https://mastodon.bida.im/tags/apparsi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apparsi</span></a> a novembre 2022, quando gli stessi <a href="https://mastodon.bida.im/tags/ricercatori" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ricercatori</span></a> di Sucuri hanno notato la <a href="https://mastodon.bida.im/tags/compromissione" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>compromissione</span></a> di 15.000 siti WordPress. </p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/11-000-siti-wordpress-sono-stati-infettati-da-una-backdoor/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/11-000-si</span><span class="invisible">ti-wordpress-sono-stati-infettati-da-una-backdoor/</span></a></p>
Redhotcyber<p>Cybercrime e Phishing: componenti XLL di Excel come vettore iniziale di attacco</p><p>Gli analisti di <a href="https://mastodon.bida.im/tags/CiscoTalos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CiscoTalos</span></a> affermano che dopo che <a href="https://mastodon.bida.im/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> ha iniziato a bloccare le <a href="https://mastodon.bida.im/tags/macro" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>macro</span></a> <a href="https://mastodon.bida.im/tags/VBA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VBA</span></a> nei documenti Office scaricati da Internet, tali documenti (contrassegnati come Mark Of The Web) hanno costretto gli <a href="https://mastodon.bida.im/tags/aggressori" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aggressori</span></a> a ripensare le loro catene di <a href="https://mastodon.bida.im/tags/attacco" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>attacco</span></a>. </p><p>Ad esempio, i criminali informatii utilizzano sempre più i file dei componenti aggiuntivi di <a href="https://mastodon.bida.im/tags/Excel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Excel</span></a> (.<a href="https://mastodon.bida.im/tags/XLL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>XLL</span></a>) come vettore di <a href="https://mastodon.bida.im/tags/compromissione" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>compromissione</span></a> iniziale.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecurity</span></a></p><p><a href="https://lnkd.in/d_ghTBKj" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">lnkd.in/d_ghTBKj</span><span class="invisible"></span></a></p>
Redhotcyber<p>Quali aziende italiane verranno violate? Gli IAB si evolvono in e-commerce underground</p><p>In effetti la domanda è posta male in quanto queste aziende sono state già violate e non se ne sono accorte (o “probabilmente” accorte), anche se il reale danno ancora non è stato perpretrato.</p><p>Ma andiamo con ordine.</p><p>Iniziamo col dire che è compito della cyber threat <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>intelligence</span></a> (CTI) andare a scandagliare i meandri delle <a href="https://mastodon.bida.im/tags/underground" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>underground</span></a> alla ricerca di possibili trecce di eventi <a href="https://mastodon.bida.im/tags/malevoli" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malevoli</span></a> che possono palesare una futura <a href="https://mastodon.bida.im/tags/compromissione" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>compromissione</span></a> di una specifica <a href="https://mastodon.bida.im/tags/organizzazione" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>organizzazione</span></a>.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecurity</span></a></p><p><a href="https://lnkd.in/dQuiBPDT" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">lnkd.in/dQuiBPDT</span><span class="invisible"></span></a></p>
Redhotcyber<p>Uscite le regole YARA per le versioni non ufficiali di Cobalt Strike</p><p>Google <a href="https://mastodon.bida.im/tags/Cloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cloud</span></a> Threat <a href="https://mastodon.bida.im/tags/Intelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Intelligence</span></a> ha annunciato il rilascio delle regole <a href="https://mastodon.bida.im/tags/YARA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>YARA</span></a>, nonché una raccolta di indicatori di <a href="https://mastodon.bida.im/tags/compromissione" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>compromissione</span></a> <a href="https://mastodon.bida.im/tags/VirusTotal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VirusTotal</span></a>, che dovrebbero facilitare rilevare le componenti <a href="https://mastodon.bida.im/tags/CobaltStrike" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CobaltStrike</span></a> malevole.</p><p>Cobalt Strike è uno strumento commerciale legittimo creato per attività di <a href="https://mastodon.bida.im/tags/PenetrtionTest" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PenetrtionTest</span></a>/#RedTeam ed è incentrato sulla fase di post-sfruttamento.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecurity</span></a></p><p><a href="https://lnkd.in/dGsTbR7j" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">lnkd.in/dGsTbR7j</span><span class="invisible"></span></a></p>
Redhotcyber<p>F5 risolve due pericolose RCE che possono portare alla compromissione di BIG-IP e BIG-IQ</p><p>Gli sviluppatori di <a href="https://mastodon.bida.im/tags/F5" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>F5</span></a> hanno rilasciato <a href="https://mastodon.bida.im/tags/correzioni" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>correzioni</span></a> per i prodotti <a href="https://mastodon.bida.im/tags/BIGIP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BIGIP</span></a> e <a href="https://mastodon.bida.im/tags/BIGIQ" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BIGIQ</span></a>. Le <a href="https://mastodon.bida.im/tags/patch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>patch</span></a> hanno risolto due gravi <a href="https://mastodon.bida.im/tags/vulnerabilit%C3%A0" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilità</span></a> che potevano consentire agli aggressori non autenticati di eseguire in remoto codice arbitrario (<a href="https://mastodon.bida.im/tags/RCE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RCE</span></a>) su <a href="https://mastodon.bida.im/tags/endpoint" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>endpoint</span></a> vulnerabili.</p><p>Fortunatamente, lo sfruttamento di entrambi i problemi richiede il rispetto di determinate condizioni, il che rende difficile sfruttare queste <a href="https://mastodon.bida.im/tags/vulnerabilit%C3%A0" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilità</span></a>. Tuttavia, F5 avverte che uno sfruttamento riuscito può portare alla completa <a href="https://mastodon.bida.im/tags/compromissione" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>compromissione</span></a> dei dispositivi.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecurity</span></a></p><p><a href="https://lnkd.in/dgRMZV5C" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">lnkd.in/dgRMZV5C</span><span class="invisible"></span></a></p>