Il Blog di Michele Pinassi
309 subscribers
373 photos
17 videos
119 files
8.33K links
Parliamo di tecnologia, politica e cybersecurity.

Post automatici e rassegna personale.
Download Telegram
Arca Service
Ransomware group called qilin claims attack for Arca Service. The target comes from Italy. We identify this attack with following hash code: b9d9e94cde76fa812fbaad4d2e22e202c6a60ddec25bc387a453e6e277a57b44 (ID: 30659)Target victim website: N/D

by RansomFeed - https://r.zerozone.it/post/Zjr3PB3CD6gZB24Cn
Flexform
Ransomware group called dragonforce claims attack for Flexform. The target comes from Italy. We identify this attack with following hash code: 82981640741ca980ed12a794093b7b4f143af1cfbd9526f327a96e9c3c6745d8 (ID: 30666)Target victim website: N/D

by RansomFeed - https://r.zerozone.it/post/MvZQc2tzkANxvm8Rn
1
Tecnocap Group
Ransomware group called coinbasecartel claims attack for Tecnocap Group. The target comes from Italy. We identify this attack with following hash code: 49923163efae74c222bd7164e717ade81d8f041b3087d5aec9c0cb42bcfdb602 (ID: 30675)Target victim website: tecnocapgroup.com

by RansomFeed - https://r.zerozone.it/post/ZpfBQA6ywnmYhz5G6
Ariston
Ransomware group called coinbasecartel claims attack for Ariston. The target comes from Italy. We identify this attack with following hash code: fa072fe37491e2f6653ee895e21807e5e779ef6b65a955893dbdd0e165899daa (ID: 30673)Target victim website: ariston.com

by RansomFeed - https://r.zerozone.it/post/Gmj7xKzbn21HyxsRB
Sintesi riepilogativa delle campagne malevole nella settimana del 14 – 20 marzo
In questa settimana, il CERT-AGID ha riscontrato ed analizzato, nello scenario italiano di suo riferimento un totale di 103 campagne malevole, di cui 66 con obiettivi italiani e 37 generiche che hanno comunque interessato l’Italia, mettendo a disposizione dei suoi enti accreditati i relativi 764 indicatori di compromissione (IoC) individuati.

by CERT-AgID - https://r.zerozone.it/post/Ak71JD4UY0pmeJtD2
AGENCAVI SRL
Ransomware group called qilin claims attack for AGENCAVI SRL. The target comes from Italy. We identify this attack with following hash code: ecb06778998bd0208cc037df8f46d8baa711c3e3834112e3573b2a852ef29fe6 (ID: 30719)Target victim website: www.agencavi.com

by RansomFeed - https://r.zerozone.it/post/v25mYrY0JAZ847zuc
sidercentersas.com
Ransomware group called lockbit5 claims attack for sidercentersas.com. The target comes from Italy. We identify this attack with following hash code: 4a570e66a0f1c96c2f962daf26840734e023ebc0d15a6c5984539bc6193fa675 (ID: 30750)Target victim website: N/D

by RansomFeed - https://r.zerozone.it/post/nqFvdhEqwuhBzNe4n
isoledilcappotti.it
Ransomware group called lockbit5 claims attack for isoledilcappotti.it. The target comes from Italy. We identify this attack with following hash code: 8ca4fd647ab8fdee001c6b4287b716a8bc9b1ac00375a61bfa423a483d2f6b94 (ID: 30759)Target victim website: N/D

by RansomFeed - https://r.zerozone.it/post/ZFAEHu1vSa2PeyrVN
OVHCloud 😢
"Secondo i giudici, chi ricopre ruoli delicati o ha la gestione diretta delle finanze aziendali deve mantenere un livello di soglia critica molto elevato. La sentenza chiarisce che il concetto di incolpevole affidamento non può trovare applicazione quando l’anomalia del messaggio ricevuto era facilmente individuabile. Se un dipendente ignora segnali sospetti, come un indirizzo di posta elettronica leggermente alterato o una richiesta insolita che deroga alle procedure standard, la sua condotta viene classificata come imprudente e, di conseguenza, passibile di sanzione disciplinare espulsiva."

https://www.thesocialpost.it/2026/03/23/apri-mail-perdi-lavoro-sentenza-cassazione/
esprinet.com
Ransomware group called ALP-001 claims attack for esprinet.com. The target comes from Italy. We identify this attack with following hash code: d85f634d5d81647994732c214112b1d1e6a08cb873ea4094130b1d2c982d1599 (ID: 30836)Target victim website: esprinet.com

by RansomFeed - https://r.zerozone.it/post/vgvFmBFNV4rvWnw9d