Studio Marchi - Studio Professionale Associato
Ransomware group called everest claims attack for Studio Marchi - Studio Professionale Associato. The target comes from Italy. We identify this attack with following hash code: f2c5eab48776082c6a02ecb4457b59aa5b58cbc71d0f6528e6e1a690f3eba40b (ID: 31949)Target victim website: N/D
by RansomFeed - https://r.zerozone.it/post/dnykPhxs7DQgKXc4u
Ransomware group called everest claims attack for Studio Marchi - Studio Professionale Associato. The target comes from Italy. We identify this attack with following hash code: f2c5eab48776082c6a02ecb4457b59aa5b58cbc71d0f6528e6e1a690f3eba40b (ID: 31949)Target victim website: N/D
by RansomFeed - https://r.zerozone.it/post/dnykPhxs7DQgKXc4u
Ransomfeed
zonaovest.to.it
Ransomware group called safepay claims attack for zonaovest.to.it. The target comes from Italy. We identify this attack with following hash code: d5fb10384e45f3cd060e416728b5d288d05c5f3ba7b9be8af51b739ffdff3274 (ID: 31944)Target victim website: zonaovest.to.it
by RansomFeed - https://r.zerozone.it/post/E7GHxb1df5D9afdZh
Ransomware group called safepay claims attack for zonaovest.to.it. The target comes from Italy. We identify this attack with following hash code: d5fb10384e45f3cd060e416728b5d288d05c5f3ba7b9be8af51b739ffdff3274 (ID: 31944)Target victim website: zonaovest.to.it
by RansomFeed - https://r.zerozone.it/post/E7GHxb1df5D9afdZh
Ransomfeed
Google Chrome silently installs a 4 GB AI model on your device without consent. At a billion-device scale the climate costs are insane. — That Privacy Guy!
https://www.thatprivacyguy.com/blog/chrome-silent-nano-install/
https://www.thatprivacyguy.com/blog/chrome-silent-nano-install/
That Privacy Guy!
Google Chrome silently installs a 4 GB AI model on your device without consent. At a billion-device scale the climate costs are…
Google Chrome is downloading a 4 GB Gemini Nano model onto users' machines without consent, with no opt-in, no opt-out short of enterprise tooling, and an automatic re-download every time the user deletes it. The pattern is identical to the Anthropic Claude…
SIT Group / Robusta
Ransomware group called medusalocker claims attack for SIT Group / Robusta. The target comes from Italy. We identify this attack with following hash code: 2e34ff1f53bc7984f0e78bb211bc6aa133222fd404cabb87f56cd68f7d6b210e (ID: 31978)Target victim website: sitgroup.it
by RansomFeed - https://r.zerozone.it/post/cqwuzDCX9udw2EbkV
Ransomware group called medusalocker claims attack for SIT Group / Robusta. The target comes from Italy. We identify this attack with following hash code: 2e34ff1f53bc7984f0e78bb211bc6aa133222fd404cabb87f56cd68f7d6b210e (ID: 31978)Target victim website: sitgroup.it
by RansomFeed - https://r.zerozone.it/post/cqwuzDCX9udw2EbkV
Ransomfeed
Mediaplex
Ransomware group called thegentlemen claims attack for Mediaplex. The target comes from Italy. We identify this attack with following hash code: e75343218a679c1c9b882d8074a5b80d2716f0d25632c3a9dce42931eea8760c (ID: 32009)Target victim website: mediaplexcnc.com
by RansomFeed - https://r.zerozone.it/post/Mq7WJ0xgtdFDQaPXK
Ransomware group called thegentlemen claims attack for Mediaplex. The target comes from Italy. We identify this attack with following hash code: e75343218a679c1c9b882d8074a5b80d2716f0d25632c3a9dce42931eea8760c (ID: 32009)Target victim website: mediaplexcnc.com
by RansomFeed - https://r.zerozone.it/post/Mq7WJ0xgtdFDQaPXK
Ransomfeed
Media Consulting
Ransomware group called thegentlemen claims attack for Media Consulting. The target comes from Italy. We identify this attack with following hash code: b3b0565cbdc7b500c30dfe5c7ab723a620efeee78396220444d3f36b6a3c0e51 (ID: 32020)Target victim website: mconweb.it
by RansomFeed - https://r.zerozone.it/post/20a1MpcVb8kxgtYNR
Ransomware group called thegentlemen claims attack for Media Consulting. The target comes from Italy. We identify this attack with following hash code: b3b0565cbdc7b500c30dfe5c7ab723a620efeee78396220444d3f36b6a3c0e51 (ID: 32020)Target victim website: mconweb.it
by RansomFeed - https://r.zerozone.it/post/20a1MpcVb8kxgtYNR
Ransomfeed
Rete giudiziaria in tilt in tutt'Italia. Colpito anche il ministero
https://www.ilfoglio.it/giustizia/2026/05/06/news/rete-giudiziaria-in-tilt-su-tutto-il-territorio-nazionale-colpito-anche-il-ministero--398417
https://www.ilfoglio.it/giustizia/2026/05/06/news/rete-giudiziaria-in-tilt-su-tutto-il-territorio-nazionale-colpito-anche-il-ministero--398417
www.ilfoglio.it
Rete giudiziaria in tilt in tutt'Italia. Colpito anche il ministero
Nella mattinata di mercoledì il sistema informatico della Giustizia ha subito un’interruzione che ha colpito tutti gli uffici del territorio nazionale e quelli del ministero centrale, con gravissime ripercussioni sull’attività istituzionale. Non si escludono…
Quasi la metà dei genitori italiani dà il cellulare ai figli prima dei 10 anni - Notizie - Ansa.it
https://www.ansa.it/sito/notizie/cronaca/2026/05/07/censis-per-8-su-10-oggi-e-piu-difficile-essere-genitore_f0f37871-48bb-4e98-b4fd-51234a3762fd.html
https://www.ansa.it/sito/notizie/cronaca/2026/05/07/censis-per-8-su-10-oggi-e-piu-difficile-essere-genitore_f0f37871-48bb-4e98-b4fd-51234a3762fd.html
ANSA.it
La dura vita del genitore, più difficile farlo ora che in passato
La ricerca del Censis, uno su tre lamenta gli elevati costi per mantenere i figli (ANSA)
Complastex.com
Ransomware group called qilin claims attack for Complastex.com. The target comes from Italy. We identify this attack with following hash code: a4f0209b6b59e00e9c3b6dc45b499f7cc9145998f243c2b387f07e41e5cf9d15 (ID: 32059)Target victim website: N/D
by RansomFeed - https://r.zerozone.it/post/DCQEcGtdQcGu9fskh
Ransomware group called qilin claims attack for Complastex.com. The target comes from Italy. We identify this attack with following hash code: a4f0209b6b59e00e9c3b6dc45b499f7cc9145998f243c2b387f07e41e5cf9d15 (ID: 32059)Target victim website: N/D
by RansomFeed - https://r.zerozone.it/post/DCQEcGtdQcGu9fskh
Ransomfeed
DATAMATIC
Ransomware group called thegentlemen claims attack for DATAMATIC. The target comes from Italy. We identify this attack with following hash code: 2fefde65716548e65d31ba851382a47d396c145349b2a499abd1cc41e65c212c (ID: 32045)Target victim website: datamatic.it
by RansomFeed - https://r.zerozone.it/post/NTqjRCa9RCAfxMMJZ
Ransomware group called thegentlemen claims attack for DATAMATIC. The target comes from Italy. We identify this attack with following hash code: 2fefde65716548e65d31ba851382a47d396c145349b2a499abd1cc41e65c212c (ID: 32045)Target victim website: datamatic.it
by RansomFeed - https://r.zerozone.it/post/NTqjRCa9RCAfxMMJZ
Ransomfeed
soavegel.it
Ransomware group called safepay claims attack for soavegel.it. The target comes from Italy. We identify this attack with following hash code: b688810c86214ed300e842f81f0594428763d27b520a0dc1cc11f06873c47dd5 (ID: 32060)Target victim website: soavegel.it
by RansomFeed - https://r.zerozone.it/post/U0ZYnPB603MpHBm1f
Ransomware group called safepay claims attack for soavegel.it. The target comes from Italy. We identify this attack with following hash code: b688810c86214ed300e842f81f0594428763d27b520a0dc1cc11f06873c47dd5 (ID: 32060)Target victim website: soavegel.it
by RansomFeed - https://r.zerozone.it/post/U0ZYnPB603MpHBm1f
Ransomfeed
Inox Market Service SpA
Ransomware group called qilin claims attack for Inox Market Service SpA. The target comes from Italy. We identify this attack with following hash code: 24ffc57334f58e8b1877dc7b85a3e26fa7844bb77dd2a0ec91e83f1d5cfeba14 (ID: 32056)Target victim website: N/D
by RansomFeed - https://r.zerozone.it/post/q2KD2En6ERMgHcJ5c
Ransomware group called qilin claims attack for Inox Market Service SpA. The target comes from Italy. We identify this attack with following hash code: 24ffc57334f58e8b1877dc7b85a3e26fa7844bb77dd2a0ec91e83f1d5cfeba14 (ID: 32056)Target victim website: N/D
by RansomFeed - https://r.zerozone.it/post/q2KD2En6ERMgHcJ5c
Ransomfeed
studioubertazzi.it
Ransomware group called safepay claims attack for studioubertazzi.it. The target comes from Italy. We identify this attack with following hash code: f674f31b197cb5f82b9efdc05d3885a563a1989283a23d81d6a738690ba9f573 (ID: 32062)Target victim website: studioubertazzi.it
by RansomFeed - https://r.zerozone.it/post/4WjBMTHcKmErXp7rt
Ransomware group called safepay claims attack for studioubertazzi.it. The target comes from Italy. We identify this attack with following hash code: f674f31b197cb5f82b9efdc05d3885a563a1989283a23d81d6a738690ba9f573 (ID: 32062)Target victim website: studioubertazzi.it
by RansomFeed - https://r.zerozone.it/post/4WjBMTHcKmErXp7rt
Ransomfeed
IPE
Ransomware group called thegentlemen claims attack for IPE. The target comes from Italy. We identify this attack with following hash code: aab5463d309ca6c8ac5ef74480461d800019f2841d70747855b3424db4143d8f (ID: 32047)Target victim website: ipesrl.com
by RansomFeed - https://r.zerozone.it/post/7pXcn8ZQ2Mz4YM16v
Ransomware group called thegentlemen claims attack for IPE. The target comes from Italy. We identify this attack with following hash code: aab5463d309ca6c8ac5ef74480461d800019f2841d70747855b3424db4143d8f (ID: 32047)Target victim website: ipesrl.com
by RansomFeed - https://r.zerozone.it/post/7pXcn8ZQ2Mz4YM16v
Ransomfeed
Linux 内核提权 Dirty Frag
Linux Kernel 是当前服务器与云主机最广泛使用的开源操作系统内核,承载企业核心业务、容器底座、虚拟化平台等关键负载。其优势在于开源透明、社区维护活跃、生态完善,被绝大多数 Linux 发行版(Ubuntu、Red Hat Enterprise Linux、CentOS、Fedora、openSUSE 等)采用作为底层内核。 近期,Linux Kernel 中被披露存在一个名为 "Dirty Frag" 的本地权限提升漏洞。 该漏洞由内核中两个独立的页缓存写入漏洞组合而成: xfrm-ESP(esp4 / esp6)模块漏洞:影响范围自 2017 年起的内核版本(commit cac2661c53f3 之后),覆盖范围广,但在部分发行版(如 Ubuntu)受 AppArmor 策略限制无法直接触发 RxRPC(rxrpc)模块漏洞:无需命名空间权限即可触发,但 rxrpc 内核模块并非所有发行版默认加载。
by SeeBug - https://r.zerozone.it/post/Vxfcm2tz8VVusC7b5
Linux Kernel 是当前服务器与云主机最广泛使用的开源操作系统内核,承载企业核心业务、容器底座、虚拟化平台等关键负载。其优势在于开源透明、社区维护活跃、生态完善,被绝大多数 Linux 发行版(Ubuntu、Red Hat Enterprise Linux、CentOS、Fedora、openSUSE 等)采用作为底层内核。 近期,Linux Kernel 中被披露存在一个名为 "Dirty Frag" 的本地权限提升漏洞。 该漏洞由内核中两个独立的页缓存写入漏洞组合而成: xfrm-ESP(esp4 / esp6)模块漏洞:影响范围自 2017 年起的内核版本(commit cac2661c53f3 之后),覆盖范围广,但在部分发行版(如 Ubuntu)受 AppArmor 策略限制无法直接触发 RxRPC(rxrpc)模块漏洞:无需命名空间权限即可触发,但 rxrpc 内核模块并非所有发行版默认加载。
by SeeBug - https://r.zerozone.it/post/Vxfcm2tz8VVusC7b5
www.seebug.org
Linux 内核提权 Dirty Frag - Dirty Frag - Knownsec Seebug Vulnerability Platform
Introduction:Linux Kernel 是当前服务器与云主机最广泛使用的开源操作系统内核,承载企业核心业务、容器底座、虚拟化平台等关键负载。其优势在于开源透明、社区维护活跃、生态完善,被绝大多数 Linux 发行版(Ubuntu、Red Hat Enterprise Linux、CentOS、Fedora、openSUSE 等)采用作为底层内核。
近期,Linux Kernel 中被披露存在一个名为 "Dirty Frag" 的本地权限提升漏洞。
该漏洞由内核中两个独立的页缓存写入漏洞组合而成:…
近期,Linux Kernel 中被披露存在一个名为 "Dirty Frag" 的本地权限提升漏洞。
该漏洞由内核中两个独立的页缓存写入漏洞组合而成:…
Sintesi riepilogativa delle campagne malevole nella settimana del 2 – 8 maggio
In questa settimana, il CERT-AGID ha riscontrato ed analizzato, nello scenario italiano di suo riferimento un totale di 116 campagne malevole, di cui 78 con obiettivi italiani e 38 generiche che hanno comunque interessato l’Italia, mettendo a disposizione dei suoi enti accreditati i relativi 854 indicatori di compromissione (IoC) individuati.
by CERT-AgID - https://r.zerozone.it/post/dQdYcBQqHwFRXSWPc
In questa settimana, il CERT-AGID ha riscontrato ed analizzato, nello scenario italiano di suo riferimento un totale di 116 campagne malevole, di cui 78 con obiettivi italiani e 38 generiche che hanno comunque interessato l’Italia, mettendo a disposizione dei suoi enti accreditati i relativi 854 indicatori di compromissione (IoC) individuati.
by CERT-AgID - https://r.zerozone.it/post/dQdYcBQqHwFRXSWPc
CERT-AGID
Sintesi riepilogativa delle campagne malevole nella settimana del 2 – 8 maggio
In questa settimana, il CERT-AGID ha riscontrato ed analizzato, nello scenario italiano di suo riferimento un totale di 116 campagne malevole, di cui 78 con obiettivi italiani e 38 generiche che hanno comunque interessato l’Italia, mettendo a disposizione…