Giaroli S.A.S
Ransomware group called nightspire claims attack for Giaroli S.A.S. The target comes from Italy. We identify this attack with following hash code: 63823ac874df941496de488e8c00a53acf8e668695939847cb79e662e07aa9a7 (ID: 30492)Target victim website: giaroli.it
by RansomFeed - https://r.zerozone.it/post/MwjdUpRXhg1HC2qYB
Ransomware group called nightspire claims attack for Giaroli S.A.S. The target comes from Italy. We identify this attack with following hash code: 63823ac874df941496de488e8c00a53acf8e668695939847cb79e662e07aa9a7 (ID: 30492)Target victim website: giaroli.it
by RansomFeed - https://r.zerozone.it/post/MwjdUpRXhg1HC2qYB
Ransomfeed
paolidental.org
Ransomware group called lockbit5 claims attack for paolidental.org. The target comes from Italy. We identify this attack with following hash code: 30d30bd50c31c251b613e8dbd3a0d83caf1a2d8eff849ef79724351ecde7fc4c (ID: 30515)Target victim website: N/D
by RansomFeed - https://r.zerozone.it/post/8P09KPDkCMqNSfu0s
Ransomware group called lockbit5 claims attack for paolidental.org. The target comes from Italy. We identify this attack with following hash code: 30d30bd50c31c251b613e8dbd3a0d83caf1a2d8eff849ef79724351ecde7fc4c (ID: 30515)Target victim website: N/D
by RansomFeed - https://r.zerozone.it/post/8P09KPDkCMqNSfu0s
Ransomfeed
facsrl.net
Ransomware group called lockbit5 claims attack for facsrl.net. The target comes from Italy. We identify this attack with following hash code: 038b00dfd40a3802d3863055a60270ec2c08b891adb306bfce9e50d129724565 (ID: 30532)Target victim website: N/D
by RansomFeed - https://r.zerozone.it/post/M6H59up7J6XnHEntj
Ransomware group called lockbit5 claims attack for facsrl.net. The target comes from Italy. We identify this attack with following hash code: 038b00dfd40a3802d3863055a60270ec2c08b891adb306bfce9e50d129724565 (ID: 30532)Target victim website: N/D
by RansomFeed - https://r.zerozone.it/post/M6H59up7J6XnHEntj
Sintesi riepilogativa delle campagne malevole nella settimana del 7 – 13 marzo
In questa settimana, il CERT-AGID ha riscontrato ed analizzato, nello scenario italiano di suo riferimento un totale di 103 campagne malevole, di cui 70 con obiettivi italiani e 33 generiche che hanno comunque interessato l’Italia, mettendo a disposizione dei suoi enti accreditati i relativi 809 indicatori di compromissione (IoC) individuati.
by CERT-AgID - https://r.zerozone.it/post/KU0xDXtP6V62Xhzvj
In questa settimana, il CERT-AGID ha riscontrato ed analizzato, nello scenario italiano di suo riferimento un totale di 103 campagne malevole, di cui 70 con obiettivi italiani e 33 generiche che hanno comunque interessato l’Italia, mettendo a disposizione dei suoi enti accreditati i relativi 809 indicatori di compromissione (IoC) individuati.
by CERT-AgID - https://r.zerozone.it/post/KU0xDXtP6V62Xhzvj
CERT-AGID
Sintesi riepilogativa delle campagne malevole nella settimana del 7 – 13 marzo
In questa settimana, il CERT-AGID ha riscontrato ed analizzato, nello scenario italiano di suo riferimento un totale di 103 campagne malevole, di cui 70 con obiettivi italiani e 33 generiche che hanno comunque interessato l’Italia, mettendo a disposizione…
Inizia la mattanza occupazionale a causa dell'AI? Pronto a scommettere che nel giro di pochi mesi cambieranno idea. E voi?
https://www.repubblica.it/economia/2026/03/12/news/licenziamenti_ia_intelligenza_artificiale_investcloud-425215681/
https://www.repubblica.it/economia/2026/03/12/news/licenziamenti_ia_intelligenza_artificiale_investcloud-425215681/
la Repubblica
“Useremo soltanto l’IA”. E l’azienda manda a casa tutti gli informatici
La InvestCloud Italy di Venezia licenzia 37 dipendenti malgrado gli utili. L’impresa punta sull’intelligenza artificiale
👍1
Un attacco da parte di state-actors iraniani che merita di essere approfondito.
https://www.bleepingcomputer.com/news/security/stryker-attack-wiped-tens-of-thousands-of-devices-no-malware-needed/
https://www.bleepingcomputer.com/news/security/stryker-attack-wiped-tens-of-thousands-of-devices-no-malware-needed/
BleepingComputer
Stryker attack wiped tens of thousands of devices, no malware needed
Last week's cyberattack on medical technology giant Stryker was limited to its internal Microsoft environment and remotely wiped tens of thousands of employee devices.
"The CRA is an EU regulation that entered into force December 10, 2024. If you sell any product with digital elements on the EU market (software, hardware, IoT, anything with a network connection), you must comply. Vulnerability reporting starts September 2026. Full compliance by December 2027."
https://it.linkedin.com/posts/giuliano-peritore_un-altro-primato-del-delirio-regolamentare-activity-7439060608164995072-FATJ?utm_source=li_share&utm_content=feedcontent&utm_medium=g_dt_web&utm_campaign=copy
https://it.linkedin.com/posts/giuliano-peritore_un-altro-primato-del-delirio-regolamentare-activity-7439060608164995072-FATJ?utm_source=li_share&utm_content=feedcontent&utm_medium=g_dt_web&utm_campaign=copy
LinkedIn
Un altro primato del delirio regolamentare europeo che affligge ed affliggerà il mondo ICT. Un afflato normativo che entra come…
Un altro primato del delirio regolamentare europeo che affligge ed affliggerà il mondo ICT. Un afflato normativo che entra come un elefante nella cristalleria del mondo open source. Un carico di compliance che di certo non andrà a remunerare chi crea, chi…
MiroFish
Cos'è? Qui un video che lo spiega => https://www.tiktok.com/@simonerizzo98/video/7618672756107922710
https://github.com/666ghj/MiroFish/
Cos'è? Qui un video che lo spiega => https://www.tiktok.com/@simonerizzo98/video/7618672756107922710
https://github.com/666ghj/MiroFish/
GitHub
GitHub - 666ghj/MiroFish: A Simple and Universal Swarm Intelligence Engine, Predicting Anything. 简洁通用的群体智能引擎,预测万物
A Simple and Universal Swarm Intelligence Engine, Predicting Anything. 简洁通用的群体智能引擎,预测万物 - 666ghj/MiroFish
Reflex Angelo
Ransomware group called akira claims attack for Reflex Angelo. The target comes from Italy. We identify this attack with following hash code: 285a52bba3bdb8bafeddc7b3573cc4aaf75977de76fd09127e0b78cba62e6c96 (ID: 30656)Target victim website: N/D
by RansomFeed - https://r.zerozone.it/post/8rAT7q0W9FB4H6aHg
Ransomware group called akira claims attack for Reflex Angelo. The target comes from Italy. We identify this attack with following hash code: 285a52bba3bdb8bafeddc7b3573cc4aaf75977de76fd09127e0b78cba62e6c96 (ID: 30656)Target victim website: N/D
by RansomFeed - https://r.zerozone.it/post/8rAT7q0W9FB4H6aHg
Ransomfeed
Arca Service
Ransomware group called qilin claims attack for Arca Service. The target comes from Italy. We identify this attack with following hash code: b9d9e94cde76fa812fbaad4d2e22e202c6a60ddec25bc387a453e6e277a57b44 (ID: 30659)Target victim website: N/D
by RansomFeed - https://r.zerozone.it/post/Zjr3PB3CD6gZB24Cn
Ransomware group called qilin claims attack for Arca Service. The target comes from Italy. We identify this attack with following hash code: b9d9e94cde76fa812fbaad4d2e22e202c6a60ddec25bc387a453e6e277a57b44 (ID: 30659)Target victim website: N/D
by RansomFeed - https://r.zerozone.it/post/Zjr3PB3CD6gZB24Cn
Ransomfeed
Flexform
Ransomware group called dragonforce claims attack for Flexform. The target comes from Italy. We identify this attack with following hash code: 82981640741ca980ed12a794093b7b4f143af1cfbd9526f327a96e9c3c6745d8 (ID: 30666)Target victim website: N/D
by RansomFeed - https://r.zerozone.it/post/MvZQc2tzkANxvm8Rn
Ransomware group called dragonforce claims attack for Flexform. The target comes from Italy. We identify this attack with following hash code: 82981640741ca980ed12a794093b7b4f143af1cfbd9526f327a96e9c3c6745d8 (ID: 30666)Target victim website: N/D
by RansomFeed - https://r.zerozone.it/post/MvZQc2tzkANxvm8Rn
Ransomfeed
❤1
Tecnocap Group
Ransomware group called coinbasecartel claims attack for Tecnocap Group. The target comes from Italy. We identify this attack with following hash code: 49923163efae74c222bd7164e717ade81d8f041b3087d5aec9c0cb42bcfdb602 (ID: 30675)Target victim website: tecnocapgroup.com
by RansomFeed - https://r.zerozone.it/post/ZpfBQA6ywnmYhz5G6
Ransomware group called coinbasecartel claims attack for Tecnocap Group. The target comes from Italy. We identify this attack with following hash code: 49923163efae74c222bd7164e717ade81d8f041b3087d5aec9c0cb42bcfdb602 (ID: 30675)Target victim website: tecnocapgroup.com
by RansomFeed - https://r.zerozone.it/post/ZpfBQA6ywnmYhz5G6
Ransomfeed
Ariston
Ransomware group called coinbasecartel claims attack for Ariston. The target comes from Italy. We identify this attack with following hash code: fa072fe37491e2f6653ee895e21807e5e779ef6b65a955893dbdd0e165899daa (ID: 30673)Target victim website: ariston.com
by RansomFeed - https://r.zerozone.it/post/Gmj7xKzbn21HyxsRB
Ransomware group called coinbasecartel claims attack for Ariston. The target comes from Italy. We identify this attack with following hash code: fa072fe37491e2f6653ee895e21807e5e779ef6b65a955893dbdd0e165899daa (ID: 30673)Target victim website: ariston.com
by RansomFeed - https://r.zerozone.it/post/Gmj7xKzbn21HyxsRB
Ransomfeed
Sintesi riepilogativa delle campagne malevole nella settimana del 14 – 20 marzo
In questa settimana, il CERT-AGID ha riscontrato ed analizzato, nello scenario italiano di suo riferimento un totale di 103 campagne malevole, di cui 66 con obiettivi italiani e 37 generiche che hanno comunque interessato l’Italia, mettendo a disposizione dei suoi enti accreditati i relativi 764 indicatori di compromissione (IoC) individuati.
by CERT-AgID - https://r.zerozone.it/post/Ak71JD4UY0pmeJtD2
In questa settimana, il CERT-AGID ha riscontrato ed analizzato, nello scenario italiano di suo riferimento un totale di 103 campagne malevole, di cui 66 con obiettivi italiani e 37 generiche che hanno comunque interessato l’Italia, mettendo a disposizione dei suoi enti accreditati i relativi 764 indicatori di compromissione (IoC) individuati.
by CERT-AgID - https://r.zerozone.it/post/Ak71JD4UY0pmeJtD2
CERT-AGID
Sintesi riepilogativa delle campagne malevole nella settimana del 14 – 20 marzo
In questa settimana, il CERT-AGID ha riscontrato ed analizzato, nello scenario italiano di suo riferimento un totale di 103 campagne malevole, di cui 66 con obiettivi italiani e 37 generiche che hanno comunque interessato l’Italia, mettendo a disposizione…
AGENCAVI SRL
Ransomware group called qilin claims attack for AGENCAVI SRL. The target comes from Italy. We identify this attack with following hash code: ecb06778998bd0208cc037df8f46d8baa711c3e3834112e3573b2a852ef29fe6 (ID: 30719)Target victim website: www.agencavi.com
by RansomFeed - https://r.zerozone.it/post/v25mYrY0JAZ847zuc
Ransomware group called qilin claims attack for AGENCAVI SRL. The target comes from Italy. We identify this attack with following hash code: ecb06778998bd0208cc037df8f46d8baa711c3e3834112e3573b2a852ef29fe6 (ID: 30719)Target victim website: www.agencavi.com
by RansomFeed - https://r.zerozone.it/post/v25mYrY0JAZ847zuc
Ransomfeed
sidercentersas.com
Ransomware group called lockbit5 claims attack for sidercentersas.com. The target comes from Italy. We identify this attack with following hash code: 4a570e66a0f1c96c2f962daf26840734e023ebc0d15a6c5984539bc6193fa675 (ID: 30750)Target victim website: N/D
by RansomFeed - https://r.zerozone.it/post/nqFvdhEqwuhBzNe4n
Ransomware group called lockbit5 claims attack for sidercentersas.com. The target comes from Italy. We identify this attack with following hash code: 4a570e66a0f1c96c2f962daf26840734e023ebc0d15a6c5984539bc6193fa675 (ID: 30750)Target victim website: N/D
by RansomFeed - https://r.zerozone.it/post/nqFvdhEqwuhBzNe4n
Ransomfeed