<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <updated>2026-04-14T05:12:36Z</updated>
  <generator>https://yabu.me</generator>

  <title>Nostr notes by Redhotcyber</title>
  <author>
    <name>Redhotcyber</name>
  </author>
  <link rel="self" type="application/atom+xml" href="https://yabu.me/npub1294v0qgannh8uu6fm2phzta2tuwdnx3rqtlg6l8czup08hqv7nzs3etn48.rss" />
  <link href="https://yabu.me/npub1294v0qgannh8uu6fm2phzta2tuwdnx3rqtlg6l8czup08hqv7nzs3etn48" />
  <id>https://yabu.me/npub1294v0qgannh8uu6fm2phzta2tuwdnx3rqtlg6l8czup08hqv7nzs3etn48</id>
  <icon>https://mastodon.bida.im/system/accounts/avatars/109/298/289/284/581/576/original/a9d0a732e9233574.png</icon>
  <logo>https://mastodon.bida.im/system/accounts/avatars/109/298/289/284/581/576/original/a9d0a732e9233574.png</logo>




  <entry>
    <id>https://yabu.me/nevent1qqsw07m0zs85kacyvtp0x4x390uhfsh2wcfk49lzm4l69fsjvwegy4czypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v22sjxxw</id>
    
      <title type="html">🚨 Resta sempre aggiornato sulla cybersecurity 📌 Segui RHC ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsw07m0zs85kacyvtp0x4x390uhfsh2wcfk49lzm4l69fsjvwegy4czypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v22sjxxw" />
    <content type="html">
      🚨 Resta sempre aggiornato sulla cybersecurity&lt;br/&gt;&lt;br/&gt;📌 Segui RHC su Google Discover: &lt;a href=&#34;https://share.google/GOhPTverA7qkgtbkF&#34;&gt;https://share.google/GOhPTverA7qkgtbkF&lt;/a&gt; &lt;br/&gt;➡️ Scrolla fino in basso e clicca su “SEGUI”&lt;br/&gt;&lt;br/&gt;#RedHotCyber #cybersecurity #infosec #threatintelligence #hacking #RedHotCyber #securitynews #cyberthreats&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/303/008/966/900/459/original/f5177d2fb278055e.png&#34;&gt; 
    </content>
    <updated>2026-03-27T20:24:41Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsz4cmuxr9wtfv2cavjkg390qgg066vz0vsv22kwgc4rn93wz9drcgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v26y3l2a</id>
    
      <title type="html">La sicurezza informatica delle infrastrutture critiche nazionali ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsz4cmuxr9wtfv2cavjkg390qgg066vz0vsv22kwgc4rn93wz9drcgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v26y3l2a" />
    <content type="html">
      La sicurezza informatica delle infrastrutture critiche nazionali è a rischio: quali sono le vere minacce che si nascondono dietro i sistemi obsoleti…&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/cyber-security-e-critical-national-infrastructure-il-93-e-stato-colpito-negli-ultimi-12-mesi/&#34;&gt;https://www.redhotcyber.com/post/cyber-security-e-critical-national-infrastructure-il-93-e-stato-colpito-negli-ultimi-12-mesi/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/302/181/140/680/218/original/850f58c6b10a7df4.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-27T16:54:09Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsqeu2y5wzekag57ktammksp0kpp8ghvdu2mazfy0rh2rvkjc8j6dszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2d0qva3</id>
    
      <title type="html">IaB: Condannato a 6 anni e mezzo di carcere per aver facilitato ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsqeu2y5wzekag57ktammksp0kpp8ghvdu2mazfy0rh2rvkjc8j6dszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2d0qva3" />
    <content type="html">
      IaB: Condannato a 6 anni e mezzo di carcere per aver facilitato gli attacchi ransomware&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/iab-condannato-a-6-anni-e-mezzo-di-carcere-per-aver-facilitato-gli-attacchi-ransomware/&#34;&gt;https://www.redhotcyber.com/post/iab-condannato-a-6-anni-e-mezzo-di-carcere-per-aver-facilitato-gli-attacchi-ransomware/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #malware #ransomware #criminalitainformatica #sicurezzainformatica #reatiinformatici&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/300/503/923/734/263/original/f4d86565fc64a019.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-27T09:47:37Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqswfnmp2234zskn2j9pqvlc4qnv633c2ne3h0axezklx8du6nr33qgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2lvuuhn</id>
    
      <title type="html">Il DLP non è il Grande Fratello: il problema è la progettazione ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqswfnmp2234zskn2j9pqvlc4qnv633c2ne3h0axezklx8du6nr33qgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2lvuuhn" />
    <content type="html">
      Il DLP non è il Grande Fratello: il problema è la progettazione&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/il-dlp-non-e-il-grande-fratello-il-problema-e-la-progettazione/&#34;&gt;https://www.redhotcyber.com/post/il-dlp-non-e-il-grande-fratello-il-problema-e-la-progettazione/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #protezionedatidigitali #sicurezzainformatica #dlp #dataleakprevention #protezioneinformazioni #sicurezzadelleinformazioni&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/300/385/949/526/771/original/42d8bf92a8130c67.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-27T09:17:37Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsxg25xkx7ttx49wg4arvu0h74k36y08m3uj08urn6c4wg2yt2424gzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v20kj6lv</id>
    
      <title type="html">Rete TELCO sotto assedio: BPFDoor è in scena per un attacco ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsxg25xkx7ttx49wg4arvu0h74k36y08m3uj08urn6c4wg2yt2424gzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v20kj6lv" />
    <content type="html">
      Rete TELCO sotto assedio: BPFDoor è in scena per un attacco senza precedenti&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/rete-telco-sotto-assedio-bpfdoor-e-in-scena-per-un-attacco-senza-precedenti/&#34;&gt;https://www.redhotcyber.com/post/rete-telco-sotto-assedio-bpfdoor-e-in-scena-per-un-attacco-senza-precedenti/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #malware #minaccesibernetica #sicurezzainformatica #gruppihacker #haccin Cina&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/300/030/037/243/874/original/761f4115fc03664d.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-27T07:47:06Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsduuuu4dft046qpnxwx4q4xljpmd2r5zmsqr5t62u2n5z2d7rlucczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v220th7j</id>
    
      <title type="html">🔴 Benvenuta Marilena in Red Hot Cyber Cyber Angels 🔴 🔗 ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsduuuu4dft046qpnxwx4q4xljpmd2r5zmsqr5t62u2n5z2d7rlucczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v220th7j" />
    <content type="html">
      🔴 Benvenuta Marilena in Red Hot Cyber Cyber Angels 🔴&lt;br/&gt;&lt;br/&gt;🔗 Seguitela attraverso Gli ultimi articoli su RHC : &lt;a href=&#34;https://www.redhotcyber.com/post/author/marilena-viotto/&#34;&gt;https://www.redhotcyber.com/post/author/marilena-viotto/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #rhccyberangels #hacking #benesseredigitale #it #cybercrime #cybersecurity&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/299/939/598/182/661/original/1d499f683b145bc6.png&#34;&gt; 
    </content>
    <updated>2026-03-27T07:24:06Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsp399s83ustkk6kju6je9sk3fll3u43q7meuepnqkm0aqwl52z3ygzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2p9rqvg</id>
    
      <title type="html">L’AI vuole entrare nell’energia nucleare: la tecnologia ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsp399s83ustkk6kju6je9sk3fll3u43q7meuepnqkm0aqwl52z3ygzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2p9rqvg" />
    <content type="html">
      L’AI vuole entrare nell’energia nucleare: la tecnologia c’è, ma il vero ostacolo è nascosto&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/lai-vuole-entrare-nellenergia-nucleare-la-tecnologia-ce-ma-il-vero-ostacolo-e-nascosto/&#34;&gt;https://www.redhotcyber.com/post/lai-vuole-entrare-nellenergia-nucleare-la-tecnologia-ce-ma-il-vero-ostacolo-e-nascosto/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #intelligenzaartificiale #energianucleare #digitaltwins #automazionedocumentale #tecnologiedigitali #settoreenergetico&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/299/923/869/221/923/original/2257d46b78c9c065.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-27T07:20:06Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8kvf3jtr90kakcgu5ez89kqm42ckk3hphtr9u4jmdgd24kxsd0yszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2m9tl56</id>
    
      <title type="html">🚀 RHC Conference 2026: Workshop &amp;#34;Hands On&amp;#34; di Lunedì ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8kvf3jtr90kakcgu5ez89kqm42ckk3hphtr9u4jmdgd24kxsd0yszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2m9tl56" />
    <content type="html">
      🚀 RHC Conference 2026: Workshop &amp;#34;Hands On&amp;#34; di Lunedì 18 Maggio&lt;br/&gt;&lt;br/&gt;Di seguito le informazioni sull&amp;#39;evento:&lt;br/&gt;&lt;br/&gt;📍Quando: Lunedì 18 Maggio 2026 (Mattina workshop &amp;#34;hands-on&amp;#34; e pomeriggio workshop &amp;#34;skill-on&amp;#34;)&lt;br/&gt;📍Dove: Teatro Italia, Via Bari 18, Roma (Metro Piazza Bologna)&lt;br/&gt;📍Programma: &lt;a href=&#34;https://www.redhotcyber.com/linksSk2L/programma-rhc-conf-2026&#34;&gt;https://www.redhotcyber.com/linksSk2L/programma-rhc-conf-2026&lt;/a&gt;&lt;br/&gt;📍Iscriviti ai Workshop di lunedì 18 maggio : &lt;a href=&#34;https://rhc-conference-2026-workshop.eventbrite.it&#34;&gt;https://rhc-conference-2026-workshop.eventbrite.it&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #rhcconference #conferenza #informationsecurity #ethicalhacking #dataprotection #hacking #cybersecurity #cybercrime #cybersecurityawareness #cybersecuritytraining #cybersecuritynews #privacy #infosecurity&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/299/744/950/303/426/original/bda87cb99fd4777f.jpeg&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/299/744/962/963/235/original/dd027b1d189e232d.jpeg&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/299/744/989/683/967/original/44da69ece18cff89.jpeg&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/299/745/002/660/929/original/e15d54d4c360ca04.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-27T06:34:37Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsxrumyv6ekgpel9lp2u4efyfwtpwfxg95y388xrztc0ap8ax2vmmqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v22j667g</id>
    
      <title type="html">Gli attacchi informatici si evolvono: le API sono nel mirino ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsxrumyv6ekgpel9lp2u4efyfwtpwfxg95y388xrztc0ap8ax2vmmqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v22j667g" />
    <content type="html">
      Gli attacchi informatici si evolvono: le API sono nel mirino degli aggressori&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/gli-attacchi-informatici-si-evolvono-le-api-sono-nel-mirino-degli-aggressori/&#34;&gt;https://www.redhotcyber.com/post/gli-attacchi-informatici-si-evolvono-le-api-sono-nel-mirino-degli-aggressori/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #akamai #rapportosullostatointernet #sicurezzainformatica #attacchidDos #abusoapi #attacchiweb #infrastrutturaaziendale&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/299/715/446/318/658/original/764f1be4895101f1.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-27T06:27:06Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsq232c852d8euxlp74rh89hje0cfsxujqt7eg3hk8gpushplfz6cgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v27z6at0</id>
    
      <title type="html">Ransomware in evoluzione: il 57% delle aziende colpite, subisce ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsq232c852d8euxlp74rh89hje0cfsxujqt7eg3hk8gpushplfz6cgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v27z6at0" />
    <content type="html">
      Ransomware in evoluzione: il 57% delle aziende colpite, subisce una nuova estorsione&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/ransomware-in-evoluzione-il-57-delle-aziende-colpite-ora-subisce-doppia-o-tripla-estorsione/&#34;&gt;https://www.redhotcyber.com/post/ransomware-in-evoluzione-il-57-delle-aziende-colpite-ora-subisce-doppia-o-tripla-estorsione/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #ransomware #attacchimirati #zerotrust #resilienzaoperativa #malware #ddos #insider #sicurezzainformatica&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/299/674/161/413/882/original/7141aa5db177e8e3.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-27T06:16:36Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs06c75zntlmlxhj0w5ny7ruav5njuacj52a9w8xcqckandtuuzyjczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2p5w8wn</id>
    
      <title type="html">OpenAI chiude Sora: il futuro dell’AI non è più Video! ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs06c75zntlmlxhj0w5ny7ruav5njuacj52a9w8xcqckandtuuzyjczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2p5w8wn" />
    <content type="html">
      OpenAI chiude Sora: il futuro dell’AI non è più Video! Scopriamo cosa sta accadendo&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/openai-chiude-sora-il-futuro-dellai-non-e-piu-video-scopriamo-cosa-sta-accadendo/&#34;&gt;https://www.redhotcyber.com/post/openai-chiude-sora-il-futuro-dellai-non-e-piu-video-scopriamo-cosa-sta-accadendo/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #openai #intelligenzaartificiale #soraplatform #generazionevideoai #monetizzazione #riskichilegali #copyright #robotica #agentiautonomi #probleminormativi #reputazioneonline #tecnologia&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/295/765/252/747/091/original/e5ef1eadab1a1b83.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-26T13:42:31Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs2smvxl0y83h6ydsl7phxy88sez9pg8f32dmcc6tgggqfdlhgfh9szypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2cnkh52</id>
    
      <title type="html">Il Ransomware è ora Democratico! TeamPCP e BreachForums assieme ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs2smvxl0y83h6ydsl7phxy88sez9pg8f32dmcc6tgggqfdlhgfh9szypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2cnkh52" />
    <content type="html">
      Il Ransomware è ora Democratico! TeamPCP e BreachForums assieme per elevare il RaaS&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/il-ransomware-e-ora-democratico-teampcp-e-breachforums-assieme-per-elevare-il-raas/&#34;&gt;https://www.redhotcyber.com/post/il-ransomware-e-ora-democratico-teampcp-e-breachforums-assieme-per-elevare-il-raas/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybercrime #ransomware #sicurezzainformatica #hacking #malware #attacchinformatici #vulnerabilita #supplychain&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/295/678/744/728/550/original/9112ad36c52ea1d5.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-26T13:20:31Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8u7tupyg4fa8fjgrfaxqj6rt7lx6l7603lk7vc5y0und4lx6m5vqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2phwt0d</id>
    
      <title type="html">Attacco informatico all’ospedale Papardo di Messina. Urzì: La ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8u7tupyg4fa8fjgrfaxqj6rt7lx6l7603lk7vc5y0und4lx6m5vqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2phwt0d" />
    <content type="html">
      Attacco informatico all’ospedale Papardo di Messina. Urzì: La Sicilia sempre più esposta&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/attacco-informatico-allospedale-papardo-di-messina-la-sicilia-sempre-piu-esposta/&#34;&gt;https://www.redhotcyber.com/post/attacco-informatico-allospedale-papardo-di-messina-la-sicilia-sempre-piu-esposta/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Succede tutto in fretta. I #sistemi si fermano e, nel giro di poco, l’intera macchina sanitaria inizia a rallentare fino a bloccarsi. &lt;br/&gt;&lt;br/&gt;All’ospedale Papardo di Messina è andata così, come riportato da Messina Today. Un #attacco #informatico ha mandato fuori uso terminali, #database e #piattaforme interne, creando problemi immediati: prenotazioni più lente, difficoltà operative e una #gestione dei pazienti decisamente più complicata. &lt;br/&gt;&lt;br/&gt;A cura di Chiara Nardini&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #attacchinformatico #cybersecurity #hacking #malware #ransomware #ospedalipapardo #messina #problemidisicurezza #gestionepazienti #prenotazionionline #sicurezzainformatica #attacchihacker&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/295/566/683/158/717/original/3d7a962fd4114dbe.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-26T12:52:01Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8gp6vwapdzkefky2645zmr8s08w5647z8w92qs9s2mrv2u5q95jszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2g63tvu</id>
    
      <title type="html">Typosquatting: la trappola invisibile che svuota i conti con un ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8gp6vwapdzkefky2645zmr8s08w5647z8w92qs9s2mrv2u5q95jszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2g63tvu" />
    <content type="html">
      Typosquatting: la trappola invisibile che svuota i conti con un refuso&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/typosquatting-la-trappola-invisibile-che-svuota-i-conti-con-un-refuso/&#34;&gt;https://www.redhotcyber.com/post/typosquatting-la-trappola-invisibile-che-svuota-i-conti-con-un-refuso/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #typosquatting #ciberpirateria #sicurezzainformatica #hacking #malware #phishing #brandhijacking #dominiomografi&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/295/246/175/853/000/original/0171b232957db687.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-26T11:30:30Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs9m7wjah7te5m4cj99tjx4uyc4m7y4ae898vwpvz5tq9rga5rplggzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2p8xqpz</id>
    
      <title type="html">Una vulnerabilità Critica in Dell RecoverPoint Semina il Caos. ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs9m7wjah7te5m4cj99tjx4uyc4m7y4ae898vwpvz5tq9rga5rplggzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2p8xqpz" />
    <content type="html">
      Una vulnerabilità Critica in Dell RecoverPoint Semina il Caos. Il malware GRIMBOLT in azione&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/una-vulnerabilita-critica-in-dell-recoverpoint-semina-il-caos-il-malware-grimbolt-in-azione/&#34;&gt;https://www.redhotcyber.com/post/una-vulnerabilita-critica-in-dell-recoverpoint-semina-il-caos-il-malware-grimbolt-in-azione/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #malware #ransomware #vulnerabilita #zeroday #dellrecoverpoint #macchinevirtuali #accessoRoot&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/294/628/770/815/930/original/9272062f498e6b3c.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-26T08:53:29Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8y6ts0zaxlkgpnwkh0d7qxh5numw4ea5z8tdnhcjl8nv8pe82t5szypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2mhu8kt</id>
    
      <title type="html">Node.js rischia il crash remoto: aggiornamento urgente già ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8y6ts0zaxlkgpnwkh0d7qxh5numw4ea5z8tdnhcjl8nv8pe82t5szypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2mhu8kt" />
    <content type="html">
      Node.js rischia il crash remoto: aggiornamento urgente già disponibile&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/node-js-rischia-il-crash-remoto-aggiornamento-urgente-gia-disponibile/&#34;&gt;https://www.redhotcyber.com/post/node-js-rischia-il-crash-remoto-aggiornamento-urgente-gia-disponibile/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #nodejs #sicurezzainformatica #tls #http2 #webcrypto #vulnerabilita #cybersecurity #hacking #malware #sicurezzadelsistema&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/294/178/496/476/645/original/01bda5678dfec19b.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-26T06:58:59Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsvtp5rlm3zmsf8rk5q7hulj635ynnh6f0j5ulttljnume8ry5eumqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2ehl5c0</id>
    
      <title type="html">🚀 Workshop &amp;#34;Hands On&amp;#34; di Lunedì 18 Maggio 📍Quando: ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsvtp5rlm3zmsf8rk5q7hulj635ynnh6f0j5ulttljnume8ry5eumqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2ehl5c0" />
    <content type="html">
      🚀 Workshop &amp;#34;Hands On&amp;#34; di Lunedì 18 Maggio&lt;br/&gt;📍Quando: Lunedì 18 Maggio 2026 al Teatro Italia, Roma &lt;br/&gt;📍Programma: &lt;a href=&#34;https://www.redhotcyber.com/linksSk2L/programma-rhc-conf-2026&#34;&gt;https://www.redhotcyber.com/linksSk2L/programma-rhc-conf-2026&lt;/a&gt;&lt;br/&gt;📍Iscriviti ai Workshop di lunedì 18 maggio : &lt;a href=&#34;https://rhc-conference-2026-workshop.eventbrite.it&#34;&gt;https://rhc-conference-2026-workshop.eventbrite.it&lt;/a&gt;&lt;br/&gt;#redhotcyber #rhcconference #conferenza #informationsecurity&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/294/101/814/946/048/original/c5d6177fedf78cf8.jpeg&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/294/101/827/729/200/original/2c3d699dee35bbb6.jpeg&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/294/101/841/407/803/original/372d92e57655f85a.jpeg&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/294/101/853/931/203/original/76558383146887bf.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-26T06:39:29Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsqenlq5g4ampr8s4xsrdfqnm6sw23jegkflnj43tth34nahtzw46qzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2nsmsx3</id>
    
      <title type="html">Pioggia di bug da Mozilla scoperti dalle AI. Tre da score 10 e 14 ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsqenlq5g4ampr8s4xsrdfqnm6sw23jegkflnj43tth34nahtzw46qzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2nsmsx3" />
    <content type="html">
      Pioggia di bug da Mozilla scoperti dalle AI. Tre da score 10 e 14 da 9.8&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/pioggia-di-bug-da-mozilla-scoperti-dalle-ai-tre-da-score-10-e-14-da-9-8/&#34;&gt;https://www.redhotcyber.com/post/pioggia-di-bug-da-mozilla-scoperti-dalle-ai-tre-da-score-10-e-14-da-9-8/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #malware #ransomware #vulnerabilita #bugbounty #intelligenzaartificiale #sicherheitinformatica&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/294/088/047/619/097/original/294ca63ecea20e3a.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-26T06:35:58Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsww54ezva6qegenusvfeyd8ad3wnd6se2yck4rym72lqwtkmwwqyszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2f544w8</id>
    
      <title type="html">Le minacce informatiche stanno cambiando: l’era degli attacchi ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsww54ezva6qegenusvfeyd8ad3wnd6se2yck4rym72lqwtkmwwqyszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2f544w8" />
    <content type="html">
      Le minacce informatiche stanno cambiando: l’era degli attacchi guidati dall’IA è ora!&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/le-minacce-informatiche-stanno-cambiando-lera-degli-attacchi-guidati-dallia-e-ora/&#34;&gt;https://www.redhotcyber.com/post/le-minacce-informatiche-stanno-cambiando-lera-degli-attacchi-guidati-dallia-e-ora/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #malware #ransomware #intelligenzaartificiale #sicherheitainformatica #minacceinformatiche&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/293/981/887/590/140/original/6126280e7c0e0a4e.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-26T06:08:59Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsxnxkrd8rghwqea8e3rpdjk6fdn6t093gn2jen5ufzuwmhrqg38zszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v293vey7</id>
    
      <title type="html">PornHub e la Guerra dei Clic: è sfida tra norme, sorveglianza di ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsxnxkrd8rghwqea8e3rpdjk6fdn6t093gn2jen5ufzuwmhrqg38zszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v293vey7" />
    <content type="html">
      PornHub e la Guerra dei Clic: è sfida tra norme, sorveglianza di stato e VPN&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/pornhub-e-la-guerra-dei-clic-e-sfida-tra-norme-sorveglianza-di-stato-e-vpn/&#34;&gt;https://www.redhotcyber.com/post/pornhub-e-la-guerra-dei-clic-e-sfida-tra-norme-sorveglianza-di-stato-e-vpn/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #pornhub #sicurezzainternet #libertadiparola #protezioneminori #dirittoprivacy #navigazioneonline #sicurezzadigital&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/291/563/414/639/522/original/cf32110ec63f357c.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-25T19:53:55Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsylz4x87ujl6wgszchmen59lgky5e6rkfjrw4gqrnqx4fpva9pyhqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2q788xr</id>
    
      <title type="html">Google usa Gemini per spiare il Dark Web: sicurezza rivoluzionata ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsylz4x87ujl6wgszchmen59lgky5e6rkfjrw4gqrnqx4fpva9pyhqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2q788xr" />
    <content type="html">
      Google usa Gemini per spiare il Dark Web: sicurezza rivoluzionata o nuova minaccia?&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/google-usa-gemini-per-spiare-il-dark-web-sicurezza-rivoluzionata-o-nuova-minaccia/&#34;&gt;https://www.redhotcyber.com/post/google-usa-gemini-per-spiare-il-dark-web-sicurezza-rivoluzionata-o-nuova-minaccia/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #darkweb #gemini #googlesicurezza #monitoraggiodarkweb #minacceinformatiche #profilaziendale&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/290/395/461/430/785/original/935e6e86200b0ef0.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-25T14:56:54Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsvd5pgg5m5yzhdnh903g29lprz437s05d425xt0r66y363zsn50kczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2lz4rdx</id>
    
      <title type="html">Tecnologia quantistica: acceleratore della rivoluzione digitale ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsvd5pgg5m5yzhdnh903g29lprz437s05d425xt0r66y363zsn50kczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2lz4rdx" />
    <content type="html">
      Tecnologia quantistica: acceleratore della rivoluzione digitale in Europa&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/tecnologia-quantistica-acceleratore-della-rivoluzione-digitale-in-europa/&#34;&gt;https://www.redhotcyber.com/post/tecnologia-quantistica-acceleratore-della-rivoluzione-digitale-in-europa/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #sicurezzainformatica #cybersecurity #quantumeurope #strategiequantistiche #transizioneobbligatoria&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/289/923/557/911/850/original/82f46c50c1f56f42.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-25T12:56:53Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsqp9gqjyy4lcn2wg2tejcdyyzzz5cdu8sqqg2mymwp8qqnw2trjhqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2d4m0uq</id>
    
      <title type="html">L’AI non ha ancora distrutto posti di lavoro… ma sta ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsqp9gqjyy4lcn2wg2tejcdyyzzz5cdu8sqqg2mymwp8qqnw2trjhqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2d4m0uq" />
    <content type="html">
      L’AI non ha ancora distrutto posti di lavoro… ma sta cambiando tutto silenziosamente&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/lai-non-ha-ancora-distrutto-posti-di-lavoro-ma-sta-cambiando-tutto-silenziosamente/&#34;&gt;https://www.redhotcyber.com/post/lai-non-ha-ancora-distrutto-posti-di-lavoro-ma-sta-cambiando-tutto-silenziosamente/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #intelligenzaartificiale #mercatoDelLavoro #cambiamentosilenzioso #lavorointelligente #giovanielavoro #ruolilavorativi&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/289/054/491/267/065/original/d5ae1cb83c0de290.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-25T09:15:52Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsw88td8eqjcygfs6r8pzqwq3kuncuztcguxgspf5fw9tq8tq22a4qzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v25wkfpn</id>
    
      <title type="html">Esce Kali 2026.1! innovazione e novità, ma la stabilità alla ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsw88td8eqjcygfs6r8pzqwq3kuncuztcguxgspf5fw9tq8tq22a4qzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v25wkfpn" />
    <content type="html">
      Esce Kali 2026.1! innovazione e novità, ma la stabilità alla fine, conta più delle novità&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/esce-kali-2026-1-innovazione-e-novita-ma-la-stabilita-alla-fine-conta-piu-delle-novita/&#34;&gt;https://www.redhotcyber.com/post/esce-kali-2026-1-innovazione-e-novita-ma-la-stabilita-alla-fine-conta-piu-delle-novita/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #kaliLinux #cybersecurity #hacking #linux #nuovaversione #kalilinux20261 #backtrack&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/288/543/241/582/253/original/ca06e54be35b93d6.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-25T07:05:52Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsqwyt3yf3yffjqkr770xcwywpdmw4xq0jpxalvqzyjv2lpp4z5mtgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2u4r8ny</id>
    
      <title type="html">Il cloud non è libero: la verità nascosta dietro gli ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsqwyt3yf3yffjqkr770xcwywpdmw4xq0jpxalvqzyjv2lpp4z5mtgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2u4r8ny" />
    <content type="html">
      Il cloud non è libero: la verità nascosta dietro gli hyperscaler, l’intelligence e la geopolitica&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/il-cloud-non-e-libero-la-verita-nascosta-dietro-gli-hyperscaler-lintelligence-e-la-geopolitica/&#34;&gt;https://www.redhotcyber.com/post/il-cloud-non-e-libero-la-verita-nascosta-dietro-gli-hyperscaler-lintelligence-e-la-geopolitica/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cloudfirst #geopatriation #cloudneutralita #assetstrategico #crisideiLimiti #dipendenzadallestero #interferenzestraniere&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/288/444/926/643/701/original/7b378be62a435c0d.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-25T06:40:51Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsgj8vaxp80v22y8zf7rt5uxv0fx40j4ex7fwvgapmkp8w25t2mkfgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2qeljza</id>
    
      <title type="html">🚀 RHC Conference 2026: Workshop &amp;#34;Hands On&amp;#34; di Lunedì ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsgj8vaxp80v22y8zf7rt5uxv0fx40j4ex7fwvgapmkp8w25t2mkfgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2qeljza" />
    <content type="html">
      🚀 RHC Conference 2026: Workshop &amp;#34;Hands On&amp;#34; di Lunedì 18 Maggio&lt;br/&gt;&lt;br/&gt;Di seguito le informazioni sull&amp;#39;evento:&lt;br/&gt;&lt;br/&gt;📍Quando: Lunedì 18 Maggio 2026 (Mattina workshop &amp;#34;hands-on&amp;#34; e pomeriggio workshop &amp;#34;skill-on&amp;#34;)&lt;br/&gt;📍Dove: Teatro Italia, Via Bari 18, Roma (Metro Piazza Bologna)&lt;br/&gt;📍Programma: &lt;a href=&#34;https://www.redhotcyber.com/linksSk2L/programma-rhc-conf-2026&#34;&gt;https://www.redhotcyber.com/linksSk2L/programma-rhc-conf-2026&lt;/a&gt;&lt;br/&gt;📍Iscriviti ai Workshop di lunedì 18 maggio : &lt;a href=&#34;https://rhc-conference-2026-workshop.eventbrite.it&#34;&gt;https://rhc-conference-2026-workshop.eventbrite.it&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #rhcconference #conferenza #informationsecurity #ethicalhacking #dataprotection #hacking #cybersecurity #cybercrime #cybersecurityawareness #cybersecuritytraining #cybersecuritynews #privacy #infosecurity&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/288/425/264/421/337/original/3ece5a87bddc0f05.jpeg&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/288/425/296/551/969/original/e3ad544650dfb68f.jpeg&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/288/425/312/304/326/original/1510b748b8d5f5c7.jpeg&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/288/425/322/971/077/original/777e2bfd9386cd87.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-25T06:35:52Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsvpek2xm3s5fkzhrk35dz9srtvlxh96a39gglhnhnvt329nzlsenqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2wnpjxm</id>
    
      <title type="html">Abbiamo perso il controllo dei robot domestici: migliaia di ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsvpek2xm3s5fkzhrk35dz9srtvlxh96a39gglhnhnvt329nzlsenqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2wnpjxm" />
    <content type="html">
      Abbiamo perso il controllo dei robot domestici: migliaia di utenti spiati dentro casa&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/abbiamo-perso-il-controllo-dei-robot-domestici-migliaia-gli-spiati-dentro-casa/&#34;&gt;https://www.redhotcyber.com/post/abbiamo-perso-il-controllo-dei-robot-domestici-migliaia-gli-spiati-dentro-casa/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #sicurezzainformatica #hacking #robotaspirapolvere #cybersecurity #vulnerabilita #datipersonali #sorveglianza #informatica&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/288/401/663/347/096/original/fe2d445b24eb93a3.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-25T06:29:51Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsvvupft45362pc2yhulg90dh8plq0hhf6x5t47u8vl2j07mml8fwczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2897t6t</id>
    
      <title type="html">Il più grande supply chain attack è servito! 1000 ambienti SaaS ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsvvupft45362pc2yhulg90dh8plq0hhf6x5t47u8vl2j07mml8fwczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2897t6t" />
    <content type="html">
      Il più grande supply chain attack è servito! 1000 ambienti SaaS Compromessi&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/il-piu-grande-supply-chain-attack-e-servito-1000-ambienti-saas-compromessi/&#34;&gt;https://www.redhotcyber.com/post/il-piu-grande-supply-chain-attack-e-servito-1000-ambienti-saas-compromessi/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #malware #ransomware #supplychain #attacchinformatici #sicurezzainformatica #furtoinformatico&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/288/356/445/334/762/original/cc11f400320e0839.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-25T06:18:21Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs04ul83cjhxxwej8w3lvett4f6f8fuxgn48dpxjs5rg26k5ukzr9szypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v28ajf98</id>
    
      <title type="html">Apocalisse nello spazio: come l’AI potrebbe distruggere ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs04ul83cjhxxwej8w3lvett4f6f8fuxgn48dpxjs5rg26k5ukzr9szypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v28ajf98" />
    <content type="html">
      Apocalisse nello spazio: come l’AI potrebbe distruggere l’internet satellitare in 24 ore&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/apocalisse-nello-spazio-come-lai-potrebbe-distruggere-linternet-satellitare-in-24-ore/&#34;&gt;https://www.redhotcyber.com/post/apocalisse-nello-spazio-come-lai-potrebbe-distruggere-linternet-satellitare-in-24-ore/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #sicurezzainformatica #attacchinformatici #intelligenzaartificiale #cybersecurity #hacking #malware #satelliti #spazio&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/285/597/776/168/440/original/f0057cf325e47fe4.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-24T18:36:47Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsv29ghj0gyy79q2svjq8dk3v2uf54zurg2ffl0ac9y69l0p9lcqmszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v24wz2j8</id>
    
      <title type="html">Handala, il sequestro dei domini e la guerra cyber che unisce ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsv29ghj0gyy79q2svjq8dk3v2uf54zurg2ffl0ac9y69l0p9lcqmszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v24wz2j8" />
    <content type="html">
      Handala, il sequestro dei domini e la guerra cyber che unisce leak, minacce e repressione transnazionale&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/handala-il-sequestro-dei-domini-e-la-guerra-cyber-che-unisce-leak-minacce-e-repressione-transnazionale/&#34;&gt;https://www.redhotcyber.com/post/handala-il-sequestro-dei-domini-e-la-guerra-cyber-che-unisce-leak-minacce-e-repressione-transnazionale/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #iran #ministerodellintelligence #statiuniti #dipartimentodigiustizia #sicurezzainformatica&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/284/832/887/182/216/original/729e81c970f3cf8b.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-24T15:22:16Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqszsdhl89kt72n97gha7zrxwya5xcfa3yv5zcwu6v7zw66x3ud46sgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2kezapv</id>
    
      <title type="html">Droni e robot: non è l’AI il vero problema, ma la connessione ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqszsdhl89kt72n97gha7zrxwya5xcfa3yv5zcwu6v7zw66x3ud46sgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2kezapv" />
    <content type="html">
      Droni e robot: non è l’AI il vero problema, ma la connessione&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/la-sfida-della-comunicazione-nei-droni-e-robot-autonomi/&#34;&gt;https://www.redhotcyber.com/post/la-sfida-della-comunicazione-nei-droni-e-robot-autonomi/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #comunicazione #droni #robot #trasmissionedati #wireless #canaleradio #dispositiviautonomi #intelligenzaartificiale&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/284/728/683/101/813/original/92fee9ed95d62254.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-24T14:55:46Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsgfs6lpcam0apvu0gkmrwcfu0x8xa8h8jyrp3s3peevjygvvsgpdczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2ezvwea</id>
    
      <title type="html">Morto Leonid Radvinsky, il miliardario fondatore di OnlyFans: ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsgfs6lpcam0apvu0gkmrwcfu0x8xa8h8jyrp3s3peevjygvvsgpdczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2ezvwea" />
    <content type="html">
      Morto Leonid Radvinsky, il miliardario fondatore di OnlyFans: aveva 43 anni&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/morto-leonid-radvinsky-il-miliardario-fondatore-di-onlyfans-aveva-43-anni/&#34;&gt;https://www.redhotcyber.com/post/morto-leonid-radvinsky-il-miliardario-fondatore-di-onlyfans-aveva-43-anni/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #onlyfans #leonidradvinsky #imprenditore #ucciso #ucraina #statunitense #monetizzazione #contenuti #malattia&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/283/543/033/010/909/original/11dde4993617f795.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-24T09:54:14Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8y48mvyfwl84hk8eln0aw9qvxdwhm02du4gus5ph3uxx80wfck8szypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v29g28h7</id>
    
      <title type="html">IIS fuori supporto: 500.000 istanze su internet esposte agli ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8y48mvyfwl84hk8eln0aw9qvxdwhm02du4gus5ph3uxx80wfck8szypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v29g28h7" />
    <content type="html">
      IIS fuori supporto: 500.000 istanze su internet esposte agli attacchi informatici&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/iis-fuori-supporto-500-000-istanze-su-internet-esposte-agli-attacchi-informatici/&#34;&gt;https://www.redhotcyber.com/post/iis-fuori-supporto-500-000-istanze-su-internet-esposte-agli-attacchi-informatici/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #microsoftiis #obsoletcenza #infrastrutturadigitale #sicurezzainformatica #problemistrutturali&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/283/181/245/505/662/original/6dfa98da12e3afd8.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-24T08:22:14Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsgqj47v0llyd4fq4phk2p48jlp09rz4f5evch2ejune8s0jpl4thqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2m6kd5n</id>
    
      <title type="html">Israele sotto attacco invisibile: quando il cyber colpisce prima ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsgqj47v0llyd4fq4phk2p48jlp09rz4f5evch2ejune8s0jpl4thqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2m6kd5n" />
    <content type="html">
      Israele sotto attacco invisibile: quando il cyber colpisce prima la mente e poi i computer&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/israele-sotto-attacco-invisibile-quando-il-cyber-colpisce-prima-la-mente-e-poi-i-computer/&#34;&gt;https://www.redhotcyber.com/post/israele-sotto-attacco-invisibile-quando-il-cyber-colpisce-prima-la-mente-e-poi-i-computer/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #malware #spearphishing #phishing #sicurezzainformatica #attaccinformatici&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/282/778/160/951/879/original/eb55054ce76e6930.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-24T06:39:43Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsvpqf5tvhjvmavfn2pff6y9mye5ws4jggwlsk03x9dc464cys6kngzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2sxs4vs</id>
    
      <title type="html">🚀 RHC Conference 2026: Workshop &amp;#34;Hands On&amp;#34; di Lunedì ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsvpqf5tvhjvmavfn2pff6y9mye5ws4jggwlsk03x9dc464cys6kngzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2sxs4vs" />
    <content type="html">
      🚀 RHC Conference 2026: Workshop &amp;#34;Hands On&amp;#34; di Lunedì 18 Maggio&lt;br/&gt;&lt;br/&gt;Di seguito le informazioni sull&amp;#39;evento:&lt;br/&gt;&lt;br/&gt;📍Quando: Lunedì 18 Maggio 2026 (Mattina workshop &amp;#34;hands-on&amp;#34; e pomeriggio workshop &amp;#34;skill-on&amp;#34;)&lt;br/&gt;📍Dove: Teatro Italia, Via Bari 18, Roma (Metro Piazza Bologna)&lt;br/&gt;📍Programma: &lt;a href=&#34;https://www.redhotcyber.com/linksSk2L/programma-rhc-conf-2026&#34;&gt;https://www.redhotcyber.com/linksSk2L/programma-rhc-conf-2026&lt;/a&gt;&lt;br/&gt;📍Iscriviti ai Workshop di lunedì 18 maggio : &lt;a href=&#34;https://rhc-conference-2026-workshop.eventbrite.it&#34;&gt;https://rhc-conference-2026-workshop.eventbrite.it&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #rhcconference #conferenza #informationsecurity #ethicalhacking #dataprotection #hacking #cybersecurity #cybercrime #cybersecurityawareness #cybersecuritytraining #cybersecuritynews #privacy #infosecurity&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/282/685/751/639/854/original/ff264d847017c1d1.jpeg&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/282/685/764/724/946/original/4e17093fc0366bac.jpeg&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/282/685/776/168/044/original/5469622e8f526248.jpeg&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/282/685/788/381/213/original/f80b6cd1d144aca5.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-24T06:16:14Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsy42ct99tn09nwnl24s7lvyvlmxj96q5l4amus6uf8jm0x2junfdszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2rxyq3z</id>
    
      <title type="html">I robot ora leggono la mente: correggono gli errori prima che ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsy42ct99tn09nwnl24s7lvyvlmxj96q5l4amus6uf8jm0x2junfdszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2rxyq3z" />
    <content type="html">
      I robot ora leggono la mente: correggono gli errori prima che questi accadano&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/i-robot-iniziano-leggono-la-tua-mente-correggono-gli-errori-prima-che-accadano/&#34;&gt;https://www.redhotcyber.com/post/i-robot-iniziano-leggono-la-tua-mente-correggono-gli-errori-prima-che-accadano/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #robotica #intelligenzaartificiale #interfacciecervellocomputer #controlloadattivo #sicurezzarobotica #efficienza&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/282/628/725/738/478/original/e376df3acb4fd248.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-24T06:01:43Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs2tg5jfqvuukceu7mzqhyqajuzjnrmyv6tq0ht3y7uvdk9d422pkszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2qdlevz</id>
    
      <title type="html">UniFi Network Application: Ubiquiti tappa due falle critiche, una ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs2tg5jfqvuukceu7mzqhyqajuzjnrmyv6tq0ht3y7uvdk9d422pkszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2qdlevz" />
    <content type="html">
      UniFi Network Application: Ubiquiti tappa due falle critiche, una da CVSS 10&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/unifi-network-application-ubiquiti-tappa-due-falle-critiche-una-da-cvss-10/&#34;&gt;https://www.redhotcyber.com/post/unifi-network-application-ubiquiti-tappa-due-falle-critiche-una-da-cvss-10/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #vulnerabilita #unifi #networksecurity #sicurezzainformatica #path traversal #aggiornamentidisicurezza&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/282/609/068/285/962/original/1b9d428b3f6766ea.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-24T05:56:43Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqstg8saje2llh5n28ws6dd9n94t4yudjf27e9s0dy73rn88n98lqmszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v20qkcpa</id>
    
      <title type="html">Vulnerabilità Critiche NetScaler: il rischio invisibile e la ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqstg8saje2llh5n28ws6dd9n94t4yudjf27e9s0dy73rn88n98lqmszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v20qkcpa" />
    <content type="html">
      Vulnerabilità Critiche NetScaler: il rischio invisibile e la patch urgente&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/vulnerabilita-critiche-netscaler-il-rischio-invisibile-e-la-patch-urgente/&#34;&gt;https://www.redhotcyber.com/post/vulnerabilita-critiche-netscaler-il-rischio-invisibile-e-la-patch-urgente/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #netscaler #vulnerabilita #sicurezzainformatica #cve2026 #malware&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/279/934/955/143/695/original/127e13bcbc950266.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-23T18:36:39Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs2hmvsecg6c5d685c5w0jehavxtelg29q6z4jl9t2dsf5lv7lj9lczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v270afu9</id>
    
      <title type="html">Chi conosce la signora sulla destra? #redhotcyber #storia ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs2hmvsecg6c5d685c5w0jehavxtelg29q6z4jl9t2dsf5lv7lj9lczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v270afu9" />
    <content type="html">
      Chi conosce la signora sulla destra?&lt;br/&gt;&lt;br/&gt;#redhotcyber #storia #informatica #it #web #ai #hacking #privacy #cybersecurity #Innovazione #Tecnologia  #AdaLovelace #BillGates #PionieriDigitali&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/279/807/178/569/194/original/20cfa06648599525.png&#34;&gt; 
    </content>
    <updated>2026-03-23T18:04:10Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqspcfas4p8s47q32tgrzdlcm57fanhlmjc7yfl5lw73a00ss4w4twszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2lnsnqc</id>
    
      <title type="html">CECbot: Spegne la TV e controlla la rete! Il malware silente del ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqspcfas4p8s47q32tgrzdlcm57fanhlmjc7yfl5lw73a00ss4w4twszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2lnsnqc" />
    <content type="html">
      CECbot: Spegne la TV e controlla la rete! Il malware silente del tuo Android TV&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/cecbot-spegne-la-tv-e-controlla-la-rete-il-malware-silente-del-tuo-android-tv/&#34;&gt;https://www.redhotcyber.com/post/cecbot-spegne-la-tv-e-controlla-la-rete-il-malware-silente-del-tuo-android-tv/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #malware #hacking #cybersecurity #botnet #androidtv #spionaggio #crittografia #tvhacker&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/279/787/492/111/175/original/caf6b08eedaa8ad0.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-23T17:59:09Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsysguskywuvcm6y6apkvnzdhnvgf7lksh2t3gt20l2ukkukd247zgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v22hh6uw</id>
    
      <title type="html">La nuova tecnica che aggira Chrome 127: VoidStealer legge le ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsysguskywuvcm6y6apkvnzdhnvgf7lksh2t3gt20l2ukkukd247zgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v22hh6uw" />
    <content type="html">
      La nuova tecnica che aggira Chrome 127: VoidStealer legge le chiavi in memoria&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/la-nuova-tecnica-che-aggira-chrome-127-voidstealer-legge-le-chiavi-in-memoria/&#34;&gt;https://www.redhotcyber.com/post/la-nuova-tecnica-che-aggira-chrome-127-voidstealer-legge-le-chiavi-in-memoria/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #malware #voidstealer #chromesicurezza #bypassprotezione #abe&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/278/649/033/011/895/original/2c279048cd8560e4.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-23T13:09:38Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsxaxrlw9p2ml4433rrc3zsyqp45aet7kmfxd9jjpn27fkhhgf5qcqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v204xedq</id>
    
      <title type="html">Microsoft login fallito dopo l’update di marzo? La patch che ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsxaxrlw9p2ml4433rrc3zsyqp45aet7kmfxd9jjpn27fkhhgf5qcqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v204xedq" />
    <content type="html">
      Microsoft login fallito dopo l’update di marzo? La patch che risolve i problemi&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/microsoft-login-fallito-dopo-lupdate-di-marzo-la-patch-che-risolve-i-problemi/&#34;&gt;https://www.redhotcyber.com/post/microsoft-login-fallito-dopo-lupdate-di-marzo-la-patch-che-risolve-i-problemi/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #windows11 #bugfix #microsoft #nointernet #connessionestabile #kb5085516&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/277/742/573/331/895/original/45c7c458e7ed989e.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-23T09:19:06Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs2a4d5lcesupvfeju48284099qhrjzfutudpkqden3frhpjjm0k6czypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2ktkej6</id>
    
      <title type="html">Licenziata per la truffa del CEO. La svolta della Cassazione: Il ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs2a4d5lcesupvfeju48284099qhrjzfutudpkqden3frhpjjm0k6czypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2ktkej6" />
    <content type="html">
      Licenziata per la truffa del CEO. La svolta della Cassazione: Il dipendente è ora responsabile!&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/licenziata-per-la-truffa-del-ceo-la-svolta-della-cassazione-il-dipendente-e-ora-responsabile/&#34;&gt;https://www.redhotcyber.com/post/licenziata-per-la-truffa-del-ceo-la-svolta-della-cassazione-il-dipendente-e-ora-responsabile/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #malware #ransomware #licenziamento #cortedicassazione&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/277/693/423/393/331/original/132f5ebbeaa452c3.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-23T09:06:36Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqswsfamqntm4qfkhuvpu6pzx7hnl35eh9m8gnszp6wc3y2dc68qwuqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2gxdv4z</id>
    
      <title type="html">Time To Refuse: Stop all’iperconnessione! Il futuro digitale ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqswsfamqntm4qfkhuvpu6pzx7hnl35eh9m8gnszp6wc3y2dc68qwuqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2gxdv4z" />
    <content type="html">
      Time To Refuse: Stop all’iperconnessione! Il futuro digitale secondo i giovani&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/time-to-refuse-stop-alliperconnessione-il-futuro-digitale-secondo-i-giovani/&#34;&gt;https://www.redhotcyber.com/post/time-to-refuse-stop-alliperconnessione-il-futuro-digitale-secondo-i-giovani/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #movimentodeigovani #salutementale #dipendenzadaisocial #societadigitale #generazionez&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/277/439/775/476/122/original/7043168a735ead2a.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-23T08:02:06Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs9cm3h3ekvrmh2mct5e4agqh4yqkfxkxnwnpl80wdc6ep2zsnr53szypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2tvcrev</id>
    
      <title type="html">🔥 Aperte le Iscrizioni alla CTF &amp;#34;𝟮𝟭𝟰𝟵 ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs9cm3h3ekvrmh2mct5e4agqh4yqkfxkxnwnpl80wdc6ep2zsnr53szypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2tvcrev" />
    <content type="html">
      🔥 Aperte le Iscrizioni alla CTF &amp;#34;𝟮𝟭𝟰𝟵 𝗕𝗥𝗘𝗔𝗞 𝗧𝗛𝗘 𝗦𝗣𝗛𝗘𝗥𝗘!&amp;#34; della 𝗥𝗛𝗖 𝗖𝗼𝗻𝗳𝗲𝗿𝗲𝗻𝗰𝗲 𝟮𝟬𝟮𝟲&lt;br/&gt;&lt;br/&gt;📍𝗤𝘂𝗮𝗻𝗱𝗼 : dalle 15:30 di Lunedì 18 alle 17:00 di Martedì 19 Maggio 2026&lt;br/&gt;📍𝗥𝗲𝗴𝗼𝗹𝗮𝗺𝗲𝗻𝘁𝗼: &lt;a href=&#34;https://www.redhotcyber.com/documents/rhc-conference/ctf.php&#34;&gt;https://www.redhotcyber.com/documents/rhc-conference/ctf.php&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #capturetheflag #ctf #ethicalhacking #rhcconference #conferenza&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/277/097/641/217/367/original/96069352d6d264b9.jpeg&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/277/097/655/259/074/original/02600e365d35dcaf.jpeg&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/277/097/667/691/337/original/491424dbc74832ec.jpeg&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/277/097/680/372/033/original/9c4c6622299e1754.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-23T06:35:06Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqst3dcj32v5prq8kenzdxy5llg2zndvjah372d7eylsq3kpm4pmf7gzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2mjl80x</id>
    
      <title type="html">Cloudflare: Internet sta per essere invasa dai bot IA! Gli umani ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqst3dcj32v5prq8kenzdxy5llg2zndvjah372d7eylsq3kpm4pmf7gzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2mjl80x" />
    <content type="html">
      Cloudflare: Internet sta per essere invasa dai bot IA! Gli umani saranno una minoranza&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/cloudflare-internet-sta-per-essere-invasa-dai-bot-ia-gli-umani-saranno-una-minoranza/&#34;&gt;https://www.redhotcyber.com/post/cloudflare-internet-sta-per-essere-invasa-dai-bot-ia-gli-umani-saranno-una-minoranza/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #intelligenzaartificiale #trafficinternet #bot #ia #internet #tecnologia #datitecnologici&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/277/087/810/244/198/original/20b47358988e3dcf.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-23T06:32:35Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsv3075zcmzacn0pjzdfvhvjff06ct2zaxyju5673kcxr9x7facelszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2wdkf57</id>
    
      <title type="html">Dai Function Point ai Token: La rivoluzione dello sviluppo ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsv3075zcmzacn0pjzdfvhvjff06ct2zaxyju5673kcxr9x7facelszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2wdkf57" />
    <content type="html">
      Dai Function Point ai Token: La rivoluzione dello sviluppo software con l’intelligenza artificiale&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/dai-function-point-ai-token-la-rivoluzione-dello-sviluppo-software-con-lintelligenza-artificiale/&#34;&gt;https://www.redhotcyber.com/post/dai-function-point-ai-token-la-rivoluzione-dello-sviluppo-software-con-lintelligenza-artificiale/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #intelligenzaartificiale #aziendetecnologiche #tokenconsumati #sistemidia #metaecommerce&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/277/040/617/336/633/original/a9e225fa724efc4f.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-23T06:20:35Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqswy8gshum9uqm3g5s29e8gggfppf7rev53q543mjcnwe5mhhn6hdgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2s02ngj</id>
    
      <title type="html">Report Cisco Talos: applicazioni pubbliche nel mirino dei ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqswy8gshum9uqm3g5s29e8gggfppf7rev53q543mjcnwe5mhhn6hdgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2s02ngj" />
    <content type="html">
      Report Cisco Talos: applicazioni pubbliche nel mirino dei criminali informatici&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/report-cisco-talos-applicazioni-pubbliche-nel-mirino-dei-criminali-informatici/&#34;&gt;https://www.redhotcyber.com/post/report-cisco-talos-applicazioni-pubbliche-nel-mirino-dei-criminali-informatici/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #malware #ransomware #phishing #vulnerabilita #sicurezzainformatica&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/277/017/029/779/945/original/26a40e7b768dff16.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-23T06:14:35Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsqt7vppu7r8adgs4c0ldqu6h34d5mudze92w0gxxj68lrdvcmwgcczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2j8v33t</id>
    
      <title type="html">Il supercomputer cinese violato e i segreti militari in vendita ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsqt7vppu7r8adgs4c0ldqu6h34d5mudze92w0gxxj68lrdvcmwgcczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2j8v33t" />
    <content type="html">
      Il supercomputer cinese violato e i segreti militari in vendita su BreachForums&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/il-supercomputer-cinese-violato-e-i-segreti-militari-in-vendita-su-breachforums/&#34;&gt;https://www.redhotcyber.com/post/il-supercomputer-cinese-violato-e-i-segreti-militari-in-vendita-su-breachforums/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #datavolo #sicurezzainformatica #leak #daticlassificati #systemidarma&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/276/991/476/615/404/original/d1a5143010ae9202.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-23T06:08:05Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsz69sq6vynqxusw2jq0scwcxd920zufe99pyackap5464xxy6fezczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v272r0sn</id>
    
      <title type="html">Supermicro crolla del 23% in un giorno: accuse shock sugli export ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsz69sq6vynqxusw2jq0scwcxd920zufe99pyackap5464xxy6fezczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v272r0sn" />
    <content type="html">
      Supermicro crolla del 23% in un giorno: accuse shock sugli export di chip AI verso la Cina&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/supermicro-crolla-del-23-in-un-giorno-accuse-shock-sugli-export-di-chip-ai-verso-la-cina/&#34;&gt;https://www.redhotcyber.com/post/supermicro-crolla-del-23-in-un-giorno-accuse-shock-sugli-export-di-chip-ai-verso-la-cina/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #supermicro #nvidia #cina #restrizioni #mercatofinanziario #aziendale #tecnologia&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/274/523/785/353/180/original/67c174be35b139f8.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-22T19:40:31Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqstx0esqv0s22rv90slxf9az5j3gzy780nchnpk7emq454xmspm6vgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v25vkn2g</id>
    
      <title type="html">Palantir MSS: Quando l’AI Entra nella Kill Chain e Decide Chi ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqstx0esqv0s22rv90slxf9az5j3gzy780nchnpk7emq454xmspm6vgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v25vkn2g" />
    <content type="html">
      Palantir MSS: Quando l’AI Entra nella Kill Chain e Decide Chi Colpire&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/palantir-mss-quando-lai-entra-nella-kill-chain-e-decide-chi-colpire/&#34;&gt;https://www.redhotcyber.com/post/palantir-mss-quando-lai-entra-nella-kill-chain-e-decide-chi-colpire/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #intelligenzaartificiale #guerra #tecnologiamilitare #cybersecurity #difesa #militaryai #palantir&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/274/049/917/653/005/original/5a73624b7039e6c3.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-22T17:40:01Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsyz059vvdknsrprx0nna7a8d2jmzvzs4y5flsurh74hn4gz4hymvqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2djp33a</id>
    
      <title type="html">Spyware fuori controllo: la rete segreta che sta armando il mondo ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsyz059vvdknsrprx0nna7a8d2jmzvzs4y5flsurh74hn4gz4hymvqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2djp33a" />
    <content type="html">
      Spyware fuori controllo: la rete segreta che sta armando il mondo&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/spyware-fuori-controllo-la-rete-segreta-che-sta-armando-il-mondo/&#34;&gt;https://www.redhotcyber.com/post/spyware-fuori-controllo-la-rete-segreta-che-sta-armando-il-mondo/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #malware #ransomware #spyware #sicurezzainformatica&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/271/853/595/939/368/original/cb2b7ddcf2533ae4.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-22T08:21:28Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqszdq46ywn4cmwhd5at34tyz0pfp3z58vgmmj6uy6ysex8ss78tuyszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2t72ff3</id>
    
      <title type="html">UNC4899 colpisce ancora: milioni di dollari di crypto sottratti ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqszdq46ywn4cmwhd5at34tyz0pfp3z58vgmmj6uy6ysex8ss78tuyszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2t72ff3" />
    <content type="html">
      UNC4899 colpisce ancora: milioni di dollari di crypto sottratti con ingegneria sociale&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/unc4899-colpisce-ancora-milioni-di-dollari-di-crypto-sottratti-con-ingegneria-sociale/&#34;&gt;https://www.redhotcyber.com/post/unc4899-colpisce-ancora-milioni-di-dollari-di-crypto-sottratti-con-ingegneria-sociale/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #malware #criptovalute #ingegneriasociale #sicurezzainformatica&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/271/688/417/046/406/original/901ef1aff9f5e2c7.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-22T07:39:27Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs00k380ysj9uw48wdc82zhpue4nz2q8twrkeymzd50ufqvurh70hczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2uvv0qv</id>
    
      <title type="html">60.000 dati di funzionari governativi francesi compaiono in un ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs00k380ysj9uw48wdc82zhpue4nz2q8twrkeymzd50ufqvurh70hczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2uvv0qv" />
    <content type="html">
      60.000 dati di funzionari governativi francesi compaiono in un forum underground&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/60-000-dati-di-funzionari-governativi-francesi-compaiono-in-un-forum-underground/&#34;&gt;https://www.redhotcyber.com/post/60-000-dati-di-funzionari-governativi-francesi-compaiono-in-un-forum-underground/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #databreve #violazione #sicurezzadellainformazione #furto&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/271/597/974/343/208/original/f1c708215362a7d1.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-22T07:16:27Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqstz9d43rmwg2mshqy0mw83gh7gz85hqm5vdc7s64dn8lpfdhz8cyszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v22etmp7</id>
    
      <title type="html">Riflessione 😂 😅 😗 #redhotcyber #cybersecurityawareness ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqstz9d43rmwg2mshqy0mw83gh7gz85hqm5vdc7s64dn8lpfdhz8cyszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v22etmp7" />
    <content type="html">
      Riflessione  😂 😅 😗 &lt;br/&gt;&lt;br/&gt;#redhotcyber #cybersecurityawareness #cybersecuritytraining #ethicalhacking #dataprotection #hacking #cybersecurity #cybercrime #cybersecurityawareness #cybersecuritytraining #cybersecuritynews #privacy #phishing #annellodebole #online&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/267/091/324/281/708/original/278763d0a17c9437.png&#34;&gt; 
    </content>
    <updated>2026-03-21T12:10:21Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsf92hsv0n0nd0kq6p235z9qtcn9qs48z4nepctk0c9rufwezms6jszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2km5qh2</id>
    
      <title type="html">Addio Intel e AMD: la Russia accelera sull’indipendenza ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsf92hsv0n0nd0kq6p235z9qtcn9qs48z4nepctk0c9rufwezms6jszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2km5qh2" />
    <content type="html">
      Addio Intel e AMD: la Russia accelera sull’indipendenza tecnologica&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/addio-intel-e-amd-la-russia-accelera-sullindipendenza-tecnologica/&#34;&gt;https://www.redhotcyber.com/post/addio-intel-e-amd-la-russia-accelera-sullindipendenza-tecnologica/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #processoriirtysh #loongarch #datacenter #alteprestazioni #russia #cina #intel #amd #x86&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/267/075/593/772/945/original/fcc250e4e9c8039a.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-21T12:06:21Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqspuzmmkce8k8swjq65h79vupr44knlxwn3vdygha9dlrl8hp3r8mqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2kqhr4c</id>
    
      <title type="html">Signal nel mirino avverte il CERT-FR. Attacchi mirati contro ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqspuzmmkce8k8swjq65h79vupr44knlxwn3vdygha9dlrl8hp3r8mqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2kqhr4c" />
    <content type="html">
      Signal nel mirino avverte il CERT-FR. Attacchi mirati contro politici e giornalisti europei&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/signal-nel-mirino-avverte-il-cert-fr-attacchi-mirati-contro-politici-e-giornalisti-europei/&#34;&gt;https://www.redhotcyber.com/post/signal-nel-mirino-avverte-il-cert-fr-attacchi-mirati-contro-politici-e-giornalisti-europei/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #malware #ransomware #ingegneriasociale #appdimessaggistica #signal&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/266/540/789/501/926/original/dd41317b645d02aa.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-21T09:50:21Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs25dszym8u6s9a8ae93mmguc82tkh69xsk52q0830jwp03ppt3m9gzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2xwwd34</id>
    
      <title type="html">Bug da 9.8 di score in Oracle Identity Manager e Web Services ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs25dszym8u6s9a8ae93mmguc82tkh69xsk52q0830jwp03ppt3m9gzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2xwwd34" />
    <content type="html">
      Bug da 9.8 di score in Oracle Identity Manager e Web Services Manager. Aggiornare subito&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/bug-da-9-8-di-score-in-oracle-identity-manager-e-web-services-manager-aggiornare-subito/&#34;&gt;https://www.redhotcyber.com/post/bug-da-9-8-di-score-in-oracle-identity-manager-e-web-services-manager-aggiornare-subito/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #vulnerabilità #oracle&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/265/968/594/362/285/original/93799a2cb4e97f0d.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-21T07:24:50Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8w88lckfm6av96kkzh4ynd74h2tzjced5yy6hmvqftxv3m0fsddgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2jz8ds2</id>
    
      <title type="html">Quando i dati diventano intelligence: la lezione strategica della ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8w88lckfm6av96kkzh4ynd74h2tzjced5yy6hmvqftxv3m0fsddgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2jz8ds2" />
    <content type="html">
      Quando i dati diventano intelligence: la lezione strategica della Charles de Gaulle&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/quando-i-dati-diventano-intelligence-la-lezione-strategica-della-charles-de-gaulle/&#34;&gt;https://www.redhotcyber.com/post/quando-i-dati-diventano-intelligence-la-lezione-strategica-della-charles-de-gaulle/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #intelligenza #datipubblici #gps #strava #sicurezzainformatica #hacking #cybersecurity #portaerei&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/265/842/765/245/404/original/a097dc9c4303d5e1.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-21T06:52:50Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsxaq9d76dpp4udw4n3p4kjsqj7rhd2tkudwqattjzr3u6l35alccqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v20tqxjv</id>
    
      <title type="html">Nuova truffa via Google Forms! Gli annunci di lavoro puntano ad ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsxaq9d76dpp4udw4n3p4kjsqj7rhd2tkudwqattjzr3u6l35alccqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v20tqxjv" />
    <content type="html">
      Nuova truffa via Google Forms! Gli annunci di lavoro puntano ad installare RAT sui PC&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/nuova-truffa-via-google-forms-gli-annunci-di-lavoro-puntano-ad-installare-rat-sui-pc/&#34;&gt;https://www.redhotcyber.com/post/nuova-truffa-via-google-forms-gli-annunci-di-lavoro-puntano-ad-installare-rat-sui-pc/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #malware #phishing #spearphishing #sicurezzainformatica&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/262/883/559/453/054/original/6457ef0803b6912c.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-20T18:20:16Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs9wntwmenh39svhttx3u87g6vu24yhw0hplgdc3q7zudl76prkwvqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2ngm6he</id>
    
      <title type="html">L’IA ti sta mentendo: ecco come gli hacker nascondono comandi ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs9wntwmenh39svhttx3u87g6vu24yhw0hplgdc3q7zudl76prkwvqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2ngm6he" />
    <content type="html">
      L’IA ti sta mentendo: ecco come gli hacker nascondono comandi dannosi sotto i tuoi occhi&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/lia-ti-sta-mentendo-ecco-come-gli-hacker-nascondono-comandi-dannosi-sotto-i-tuoi-occhi/&#34;&gt;https://www.redhotcyber.com/post/lia-ti-sta-mentendo-ecco-come-gli-hacker-nascondono-comandi-dannosi-sotto-i-tuoi-occhi/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #intelligenzaartificiale #cybersecurity #hacking #ia #chatgpt #gemini #sicurezzainformatica&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/262/083/313/467/930/original/e50db74f230137d4.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-20T14:56:45Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsfqj8x3g5aqdh60h3ajkkp8h6eqadw6upsyq3d870r7w59x7c4p4gzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v29c3g9v</id>
    
      <title type="html">L’AI autonoma è un rischio in produzione. L’incidente di ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsfqj8x3g5aqdh60h3ajkkp8h6eqadw6upsyq3d870r7w59x7c4p4gzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v29c3g9v" />
    <content type="html">
      L’AI autonoma è un rischio in produzione. L’incidente di Meta che insegna&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/lai-autonoma-e-un-rischio-in-produzione-lincidente-di-meta-che-insegna/&#34;&gt;https://www.redhotcyber.com/post/lai-autonoma-e-un-rischio-in-produzione-lincidente-di-meta-che-insegna/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #intelligenzaartificiale #ai #autonomia #cybersecurity #hacking #sicurezzainformatica&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/261/336/082/634/182/original/7bb6f0d8977aa0fc.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-20T11:46:43Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs0p9z3pxa38t9fuhcq99jlq3kh4c8jd23dsyhswjt9447clzsmvjgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v225hw7p</id>
    
      <title type="html">Sciami di insetti spia: la guerra del futuro è già iniziata ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs0p9z3pxa38t9fuhcq99jlq3kh4c8jd23dsyhswjt9447clzsmvjgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v225hw7p" />
    <content type="html">
      Sciami di insetti spia: la guerra del futuro è già iniziata&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/sciami-di-insetti-spia-la-guerra-del-futuro-e-gia-iniziata/&#34;&gt;https://www.redhotcyber.com/post/sciami-di-insetti-spia-la-guerra-del-futuro-e-gia-iniziata/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #tecnologiaelettronica #organismiviventi #ricognizione #swarmbiotactics #insettielettronici&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/260/807/179/779/358/original/2c3b16c3c17b8ec3.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-20T09:32:13Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsfmu3v3cucf5tzkxu95z0eskeljjatw9mvn4nql8axdgw7ytexzcczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v26klzey</id>
    
      <title type="html">🚀 TRA POCHI GIORNI AL VIA IL CORSO &amp;#34;𝗖𝗬𝗕𝗘𝗥 ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsfmu3v3cucf5tzkxu95z0eskeljjatw9mvn4nql8axdgw7ytexzcczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v26klzey" />
    <content type="html">
      🚀 TRA POCHI GIORNI AL VIA IL CORSO &amp;#34;𝗖𝗬𝗕𝗘𝗥 𝗢𝗙𝗙𝗘𝗡𝗦𝗜𝗩𝗘 𝗙𝗨𝗡𝗗𝗔𝗠𝗘𝗡𝗧𝗔𝗟𝗦&amp;#34; 🚀&lt;br/&gt;&lt;br/&gt;Info 📞 379 163 8765 ✉️ formazione@redhotcyber.com&lt;br/&gt;&lt;br/&gt;Vuoi smettere di guardare tutorial e iniziare a capire davvero come funziona la sicurezza informatica tecnicamente? La maggior parte dei corsi online ti lasciano solo davanti a uno schermo. Noi abbiamo deciso di fare il contrario!&lt;br/&gt;&lt;br/&gt;🔗 Programma &lt;a href=&#34;https://www.redhotcyber.com/linksSk2L/cyber-offensive-fundamentals&#34;&gt;https://www.redhotcyber.com/linksSk2L/cyber-offensive-fundamentals&lt;/a&gt;&lt;br/&gt;🔗 Introduzione  &lt;a href=&#34;https://www.youtube.com/watch?v=0y4GYsJMoXo&#34;&gt;https://www.youtube.com/watch?v=0y4GYsJMoXo&lt;/a&gt;&lt;br/&gt;🔗 Webinar  &lt;a href=&#34;https://www.youtube.com/watch?v=z92gaV2zgNg&#34;&gt;https://www.youtube.com/watch?v=z92gaV2zgNg&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;💎 Prezzi imbattibili.&lt;br/&gt;&lt;br/&gt;Info 📞 379 163 8765 ✉️ formazione@redhotcyber.com&lt;br/&gt;&lt;br/&gt;#redhotcyber #formazione #pentesting #pentest #formazionelive #ethicalhacking #hacking #cybersecurity #penetrationtesting #cti #cybercrime #infosec #corsi #liveclass #hackerhood #pentesting&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/260/687/229/793/806/original/687ea555e245c2dc.png&#34;&gt; 
    </content>
    <updated>2026-03-20T09:01:42Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsyfx3lnf6nnsf3pxjtyl6xk69yjkd30e6wsmnk74s9g26t2tmcn7szypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2y9t3qd</id>
    
      <title type="html">Un F15 abbattuto e Netanyahu fuggito in Germania. La narrazione ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsyfx3lnf6nnsf3pxjtyl6xk69yjkd30e6wsmnk74s9g26t2tmcn7szypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2y9t3qd" />
    <content type="html">
      Un F15 abbattuto e Netanyahu fuggito in Germania. La narrazione di Pechino sulla guerra Iran-USA&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/un-f15-abbattuto-e-netanyahu-fuggito-in-germania-la-narrazione-di-pechino-sulla-guerra-iran-usa/&#34;&gt;https://www.redhotcyber.com/post/un-f15-abbattuto-e-netanyahu-fuggito-in-germania-la-narrazione-di-pechino-sulla-guerra-iran-usa/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #guerradigitale #disinformazione #polarizzazione #mediacinesi #falseinformazioni&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/260/394/257/544/173/original/cca8f3b1ea162f95.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-20T07:47:12Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsdzm42k6ws4nd0m304ldzm3a3denzvnqy4frv4t33aj30x8jamg0gzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2yvpfua</id>
    
      <title type="html">IoS sotto tiro! Scoperto DarkSword: l’exploit kit per iOS che ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsdzm42k6ws4nd0m304ldzm3a3denzvnqy4frv4t33aj30x8jamg0gzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2yvpfua" />
    <content type="html">
      IoS sotto tiro! Scoperto DarkSword: l’exploit kit per iOS che minaccia gli iPhone&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/ios-sotto-tiro-scoperto-darksword-lexploit-kit-per-ios-che-minaccia-gli-iphone/&#34;&gt;https://www.redhotcyber.com/post/ios-sotto-tiro-scoperto-darksword-lexploit-kit-per-ios-che-minaccia-gli-iphone/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #ios #exploitkit #vulnerabilita #darksword #sicurezzainformatica&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/260/146/496/343/540/original/a93a16eaf21243b2.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-20T06:44:11Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs90rwf80m7dwhud67hzrm8x5sugfzzsmmymganmh09jmalkd38q6gzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v272mju4</id>
    
      <title type="html">Cybersecurity e PMI italiane: perché il nuovo voucher può fare ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs90rwf80m7dwhud67hzrm8x5sugfzzsmmymganmh09jmalkd38q6gzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v272mju4" />
    <content type="html">
      Cybersecurity e PMI italiane: perché il nuovo voucher può fare la differenza&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/cybersecurity-e-pmi-perche-il-nuovo-voucher-puo-fare-la-differenza/&#34;&gt;https://www.redhotcyber.com/post/cybersecurity-e-pmi-perche-il-nuovo-voucher-puo-fare-la-differenza/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #sicurezzainformatica #attacchiinformatici #protezionedigitale #aziende #pmi&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/260/048/178/505/808/original/b0e9dcc4c21f717d.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-20T06:19:11Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsqzyqs9vv73hk0265zxs7c2effn3n7esp9vye3f97j36m8lx20e6qzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2k58y30</id>
    
      <title type="html">Project Silica: 4,8 TB di dati in una lastra di 12cm di vetro per ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsqzyqs9vv73hk0265zxs7c2effn3n7esp9vye3f97j36m8lx20e6qzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2k58y30" />
    <content type="html">
      Project Silica: 4,8 TB di dati in una lastra di 12cm di vetro per una durata di 10.000 anni&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/project-silica-quando-i-dati-finiscono-nel-vetro-e-smettono-di-invecchiare/&#34;&gt;https://www.redhotcyber.com/post/project-silica-quando-i-dati-finiscono-nel-vetro-e-smettono-di-invecchiare/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #conservazionedeidati #archiviazionelongotermine #sfideinformatiche #harddisk #degradazione&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/260/008/855/048/451/original/f49caa04e8a1097b.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-20T06:09:11Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqswqseruts0fajxh3xn74haut2299mpq0jp3dcad96h3den0anl60qzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2a97q4z</id>
    
      <title type="html">Il Bug di Claude code fa tremare. inserisci i dati oggi e ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqswqseruts0fajxh3xn74haut2299mpq0jp3dcad96h3den0anl60qzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2a97q4z" />
    <content type="html">
      Il Bug di Claude code fa tremare. inserisci i dati oggi e rispuntano nelle mani di altri domani&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/il-bug-di-claude-code-fa-tremare-inserisci-i-dati-oggi-e-rispuntano-nelle-mani-di-altri-domani/&#34;&gt;https://www.redhotcyber.com/post/il-bug-di-claude-code-fa-tremare-inserisci-i-dati-oggi-e-rispuntano-nelle-mani-di-altri-domani/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #intelligenzaartificiale #sicurezzadatidigitali #vulnerabilitainclaudeai #gestionepromt&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/256/662/290/090/116/original/9c91388c305bce6f.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-19T15:58:07Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqszy3snn0e9ej88pzypxsdmc6vd9cmfgkecvkynhh0y0gvl8xjz72czypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2zfkjjx</id>
    
      <title type="html">Perché pagare il software? Gratis è meglio! Si ma è per il ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqszy3snn0e9ej88pzypxsdmc6vd9cmfgkecvkynhh0y0gvl8xjz72czypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2zfkjjx" />
    <content type="html">
      Perché pagare il software? Gratis è meglio! Si ma è per il criminale informatico&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/perche-pagare-il-software-gratis-e-meglio-si-ma-e-per-il-criminale-informatico/&#34;&gt;https://www.redhotcyber.com/post/perche-pagare-il-software-gratis-e-meglio-si-ma-e-per-il-criminale-informatico/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #sicurezzainformatica #softwarepirata #malware #infostealer #cybersecurity #hacking&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/256/581/683/268/277/original/5b7f1ee7f540b132.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-19T15:37:37Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsd4a69xmn9zj98qrkvqhndr5hmlhkrracm96kddjuncuh396zss4gzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2ekqz6n</id>
    
      <title type="html">Microsoft SharePoint nel mirino: il CISA avverte lo sfruttamento ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsd4a69xmn9zj98qrkvqhndr5hmlhkrracm96kddjuncuh396zss4gzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2ekqz6n" />
    <content type="html">
      Microsoft SharePoint nel mirino: il CISA avverte lo sfruttamento del CVE-2026-20963&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/microsoft-sharepoint-nel-mirino-il-cisa-avverte-lo-sfruttamento-del-cve-2026-20963/&#34;&gt;https://www.redhotcyber.com/post/microsoft-sharepoint-nel-mirino-il-cisa-avverte-lo-sfruttamento-del-cve-2026-20963/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #microsoftsharepoint #cisa #vulnerabilita #cve202620963&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/255/088/479/200/509/original/6f57074a6ab4156e.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-19T09:17:52Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsds987ts4fg7xk5y53tye3pzqglk7qajk0g724a6fx246nawwll7qzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2wgfhhj</id>
    
      <title type="html">🚀 TRA POCHI GIORNI AL VIA IL CORSO &amp;#34;𝗖𝗬𝗕𝗘𝗥 ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsds987ts4fg7xk5y53tye3pzqglk7qajk0g724a6fx246nawwll7qzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2wgfhhj" />
    <content type="html">
      🚀 TRA POCHI GIORNI AL VIA IL CORSO &amp;#34;𝗖𝗬𝗕𝗘𝗥 𝗢𝗙𝗙𝗘𝗡𝗦𝗜𝗩𝗘 𝗙𝗨𝗡𝗗𝗔𝗠𝗘𝗡𝗧𝗔𝗟𝗦&amp;#34; 🚀&lt;br/&gt;&lt;br/&gt;Per info e iscrizioni: 📞 379 163 8765 ✉️ formazione@redhotcyber.com&lt;br/&gt;&lt;br/&gt;🔗 Programma &lt;a href=&#34;https://www.redhotcyber.com/linksSk2L/cyber-offensive-fundamentals&#34;&gt;https://www.redhotcyber.com/linksSk2L/cyber-offensive-fundamentals&lt;/a&gt;&lt;br/&gt;🔗 Introduzione al corso &lt;a href=&#34;https://www.youtube.com/watch?v=0y4GYsJMoXo&#34;&gt;https://www.youtube.com/watch?v=0y4GYsJMoXo&lt;/a&gt;&lt;br/&gt;🔗 Webinar introduttivo &lt;a href=&#34;https://www.youtube.com/watch?v=z92gaV2zgNg&#34;&gt;https://www.youtube.com/watch?v=z92gaV2zgNg&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;✅Lezioni in diretta e supervisionate (niente video preregistrati abbandonati a metà).&lt;br/&gt;✅Laboratori pratici su ambienti reali.&lt;br/&gt;✅Un percorso strutturato per chi parte da zero.&lt;br/&gt;&lt;br/&gt;Prezzi imbattibili&lt;br/&gt;&lt;br/&gt;Per info e iscrizioni: 📞 379 163 8765 ✉️ formazione@redhotcyber.com&lt;br/&gt;&lt;br/&gt;#redhotcyber #formazione #pentesting #pentest #formazionelive #ethicalhacking #hacking #cybersecurity #penetrationtesting #cti #cybercrime #infosec #corsi #liveclass #hackerhood #pentesting&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/255/084/555/308/605/original/b86760cde1c4249b.png&#34;&gt; 
    </content>
    <updated>2026-03-19T09:16:52Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqspmcqeaud777pgqzl37zxukt6ae8uuvups9wmdnvlmy9m3nseakzgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2sjgq4t</id>
    
      <title type="html">Gli attaccanti di Interlock sapevano tutto: la vulnerabilità ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqspmcqeaud777pgqzl37zxukt6ae8uuvups9wmdnvlmy9m3nseakzgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2sjgq4t" />
    <content type="html">
      Gli attaccanti di Interlock sapevano tutto: la vulnerabilità zero-day in Cisco Secure Firewall&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/gli-attaccanti-di-interlock-sapevano-tutto-la-vulnerabilita-zero-day-in-cisco-secure-firewall/&#34;&gt;https://www.redhotcyber.com/post/gli-attaccanti-di-interlock-sapevano-tutto-la-vulnerabilita-zero-day-in-cisco-secure-firewall/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Gli attaccanti sapevano già tutto, molto prima che qualcuno iniziasse a parlarne davvero. E non è la solita storia di #vulnerabilità sfruttata all’ultimo minuto. Qui si parla di settimane di vantaggio. Un’eternità, se lavori nella #sicurezza. &lt;br/&gt;&lt;br/&gt;Il punto di partenza è una #vulnerabilità critica, identificata come CVE-2026-20131, nel Cisco Secure Firewall Management Center. Permette a un attaccante remoto, senza #autenticazione, di eseguire #codice Java con #privilegi root.  &lt;br/&gt;&lt;br/&gt;A cura di Bajram Zeqiri&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #malware #ransomware #vulnerabilita #ciscosecurefirewall #managementcenter #honeypot #sicurezzainformatica #attaccanti #codicejava #privilegirroot&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/254/979/608/286/055/original/6294b58cd7e79e55.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-19T08:50:11Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs0fva9r8jyxdsgx35e8guq2uyxl0mk20ttanayue3gwq2tg0atvqszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v20zczx7</id>
    
      <title type="html">Tra Microsoft, Amazon, OpenAI è guerra per il cloud mentre ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs0fva9r8jyxdsgx35e8guq2uyxl0mk20ttanayue3gwq2tg0atvqszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v20zczx7" />
    <content type="html">
      Tra Microsoft, Amazon, OpenAI è guerra per il cloud mentre l’Europa resta a guardare&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/tra-microsoft-amazon-openai-e-guerra-per-il-cloud-mentre-leuropa-resta-a-guardare/&#34;&gt;https://www.redhotcyber.com/post/tra-microsoft-amazon-openai-e-guerra-per-il-cloud-mentre-leuropa-resta-a-guardare/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #intelligenzaartificiale #cloudcomputing #sicurezzanazionale #sovranitadigitale&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/254/489/404/366/720/original/1f0dc21b35117726.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-19T06:45:31Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs95lgxtewfqnl6agxyxwmcfxsvadsd2mruzcfygsrdpyuamxnuqcszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v27rcvta</id>
    
      <title type="html">Giappone, svolta storica: via libera agli attacchi informatici ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs95lgxtewfqnl6agxyxwmcfxsvadsd2mruzcfygsrdpyuamxnuqcszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v27rcvta" />
    <content type="html">
      Giappone, svolta storica: via libera agli attacchi informatici offensivi&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/giappone-svolta-storica-via-libera-agli-attacchi-informatici-offensivi/&#34;&gt;https://www.redhotcyber.com/post/giappone-svolta-storica-via-libera-agli-attacchi-informatici-offensivi/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #sicurezzanazionale #giappone #cybersecurity #attacchinformatici #forzediautodifesa&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/254/428/372/938/838/original/6c362176963b027e.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-19T06:30:00Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs9dw794hh6cesm3d82cmpk444tct8rnz7qrsfgs0fc4eqpwdqdkvgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2zsgqa3</id>
    
      <title type="html">Google Translate può davvero smascherarti? La lezione nascosta ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs9dw794hh6cesm3d82cmpk444tct8rnz7qrsfgs0fc4eqpwdqdkvgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2zsgqa3" />
    <content type="html">
      Google Translate può davvero smascherarti? La lezione nascosta nel caso Alimov&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/google-translate-puo-davvero-smascherarti-la-lezione-nascosta-nel-caso-alimov/&#34;&gt;https://www.redhotcyber.com/post/google-translate-puo-davvero-smascherarti-la-lezione-nascosta-nel-caso-alimov/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Il caso del cittadino russo arrestato in Colombia su richiesta degli #StatiUniti non va letto come una favola sul “traduttore che incastra”. Va letto, piuttosto, come promemoria operativo: la #tecnologia accelera, ma non sostituisce il giudizio umano. &lt;br/&gt;&lt;br/&gt;E quando il giudizio arretra, l’esposizione cresce. C’è sempre un momento, in certe storie, in cui il dettaglio più #appariscente rischia di divorarsi il quadro intero. &lt;br/&gt;&lt;br/&gt;A cura di Carolina Vivianti&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #tecnologiaesicurezza #intelligenzaartificiale #giudizioumano #ciber sicurezza #datipersonali #protezionedellaprivacità #collombia #statunitensi #operazionitecnologiche #sicurezzainformatica #traduttoretecnologico #extradizione&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/254/367/240/411/421/original/dbf9ec38ff65fe4d.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-19T06:14:27Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsq26a9nhvjkz5k76dllvs7ewgp6sr802ku55rz6wmyduvx34ush0gzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v25garpu</id>
    
      <title type="html">Chat Control: l’UE proroga la rilevazione mirata della ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsq26a9nhvjkz5k76dllvs7ewgp6sr802ku55rz6wmyduvx34ush0gzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v25garpu" />
    <content type="html">
      Chat Control: l’UE proroga la rilevazione mirata della pedopornografia online&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/chat-control-lue-proroga-la-rilevazione-mirata-della-pedopornografia-online/&#34;&gt;https://www.redhotcyber.com/post/chat-control-lue-proroga-la-rilevazione-mirata-della-pedopornografia-online/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #protezioneminori #pedopornografiaonline #sicurezzainternet #crittografiaendtoend&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/251/389/043/602/567/original/44ff3927771fe71a.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-18T17:37:03Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsynskfsh7egc0ymaccnzu4pe2scuye9jqnvw745wmsr2nemq049dczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2mquhmu</id>
    
      <title type="html">Attacco a Windows! Ma la soluzione arriva dopo più di un anno ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsynskfsh7egc0ymaccnzu4pe2scuye9jqnvw745wmsr2nemq049dczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2mquhmu" />
    <content type="html">
      Attacco a Windows! Ma la soluzione arriva dopo più di un anno dallo sfruttamento&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/attacco-a-windows-ma-la-soluzione-arriva-dopo-piu-di-un-anno-dallo-sfruttamento/&#34;&gt;https://www.redhotcyber.com/post/attacco-a-windows-ma-la-soluzione-arriva-dopo-piu-di-un-anno-dallo-sfruttamento/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #vulnerabilita #windows #sicurezzainformatica #bugbounty #regpwn&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/250/496/394/918/847/original/35ee5ab3460dfc46.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-18T13:50:03Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqszg3xg4849tc58f6sr9sh9t37mlzmd62xghglfcv894r2rfhgn2dczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2pn2zyl</id>
    
      <title type="html">🚀 TRA 3 GIORNI AL VIA IL CORSO &amp;#34;𝗖𝗬𝗕𝗘𝗥 ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqszg3xg4849tc58f6sr9sh9t37mlzmd62xghglfcv894r2rfhgn2dczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2pn2zyl" />
    <content type="html">
      🚀 TRA 3 GIORNI AL VIA IL CORSO &amp;#34;𝗖𝗬𝗕𝗘𝗥 𝗢𝗙𝗙𝗘𝗡𝗦𝗜𝗩𝗘 𝗙𝗨𝗡𝗗𝗔𝗠𝗘𝗡𝗧𝗔𝗟𝗦&amp;#34; 🚀 &lt;br/&gt;&lt;br/&gt;Se sei indeciso, è ora di iscriversi!&lt;br/&gt;📞 379 163 8765 ✉️ formazione@redhotcyber.com &lt;br/&gt;&lt;br/&gt;#formazione #pentest #ethicalhacking #hacking #cybersecurity #corsi #academy&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/248/795/104/893/538/original/041f83f81451d3c2.png&#34;&gt; 
    </content>
    <updated>2026-03-18T06:37:23Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsxdxsc6wje6wnauu30v6dlqf2v8lx8cf7ugmjad87cgn262dfd8rczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2vc6sdu</id>
    
      <title type="html">Attacco via Teams: fiducia sfruttata e accesso rubato. Ma ecco ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsxdxsc6wje6wnauu30v6dlqf2v8lx8cf7ugmjad87cgn262dfd8rczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2vc6sdu" />
    <content type="html">
      Attacco via Teams: fiducia sfruttata e accesso rubato. Ma ecco come fermarli&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/attacco-via-teams-fiducia-sfruttata-e-accesso-rubato-ma-ecco-come-fermarli/&#34;&gt;https://www.redhotcyber.com/post/attacco-via-teams-fiducia-sfruttata-e-accesso-rubato-ma-ecco-come-fermarli/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #malware #ransomware #vishing #phishing #sicurezzainformatica&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/248/787/195/889/885/original/832b65ba28e9ad8a.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-18T06:35:22Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsr79qj2lwrg5eclgtmy62aq307npt50raz03wrfa0w0wd7n8uyvxczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2s8zem4</id>
    
      <title type="html">Il Cloud Americano non è benvenuto qui! L’Europa lancia ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsr79qj2lwrg5eclgtmy62aq307npt50raz03wrfa0w0wd7n8uyvxczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2s8zem4" />
    <content type="html">
      Il Cloud Americano non è benvenuto qui! L’Europa lancia Office.eu&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/il-cloud-americano-non-e-benvenuto-qui-leuropa-lancia-office-eu/&#34;&gt;https://www.redhotcyber.com/post/il-cloud-americano-non-e-benvenuto-qui-leuropa-lancia-office-eu/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #europa #officeeu #microsoftoffice #googleworkspace #softwareopensource&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/243/183/134/796/866/original/79cdeeb5fbcc4c95.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-17T06:50:11Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsv5lr7c4w4chmuttgzu6w6h8hys39kfrj06qdaf33w8xxve2xvxjczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2r793ka</id>
    
      <title type="html">Disservizio Microsoft 365: Outlook ed Exchange KO per migliaia di ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsv5lr7c4w4chmuttgzu6w6h8hys39kfrj06qdaf33w8xxve2xvxjczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2r793ka" />
    <content type="html">
      Disservizio Microsoft 365: Outlook ed Exchange KO per migliaia di utenti&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/disservizio-microsoft-365-outlook-ed-exchange-ko-per-migliaia-di-utenti/&#34;&gt;https://www.redhotcyber.com/post/disservizio-microsoft-365-outlook-ed-exchange-ko-per-migliaia-di-utenti/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #microsoft #cloud #disservizio #exchangeonline #microsoft365 #problemidiaccesso&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/243/125/849/412/177/original/2cf4378717f2a7d9.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-17T06:35:37Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsf2q6nf0mlccxn9waz2uvqt3pecj6ur84z038l54qa65a004emu9czypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2045y4r</id>
    
      <title type="html">RHC Intervista Francesca Mortari, Director YouTube Southern ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsf2q6nf0mlccxn9waz2uvqt3pecj6ur84z038l54qa65a004emu9czypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2045y4r" />
    <content type="html">
      RHC Intervista Francesca Mortari, Director YouTube Southern Europe&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/rhc-intervista-francesca-mortari-director-youtube-southern-europe/&#34;&gt;https://www.redhotcyber.com/post/rhc-intervista-francesca-mortari-director-youtube-southern-europe/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #digitalizzazione #italiadigitale #youtubers #contenutibrevi #socialmedia #nuovegenerazioni&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/243/048/764/688/378/original/bebeb10211efe0e2.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-17T06:16:01Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsxtc0rkaxfhedswevnwp626vx4sqsaxrdz9m5y46vcuh8uhx949lszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v224wt9x</id>
    
      <title type="html">Copia, incolla e perdi soldi! Per gli utenti Linux arriva il ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsxtc0rkaxfhedswevnwp626vx4sqsaxrdz9m5y46vcuh8uhx949lszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v224wt9x" />
    <content type="html">
      Copia, incolla e perdi soldi! Per gli utenti Linux arriva il malware ClipXDaemon&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/copia-incolla-e-perdi-soldi-per-gli-utenti-linux-arriva-il-malware-clipxdaemon/&#34;&gt;https://www.redhotcyber.com/post/copia-incolla-e-perdi-soldi-per-gli-utenti-linux-arriva-il-malware-clipxdaemon/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #malware #linux #cybersecurity #hacking #cryptovalute #x11 #sottosistemagrafico #security&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/243/019/218/135/129/original/d967919e36c88ba4.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-17T06:08:30Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsz67x2ezprc2s9ks09lgplc5s20rehrcehqux6r35gxar0c7tz4eczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2pksuhu</id>
    
      <title type="html">Allerta massima: Chrome 146 risolve 29 vulnerabilità e una ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsz67x2ezprc2s9ks09lgplc5s20rehrcehqux6r35gxar0c7tz4eczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2pksuhu" />
    <content type="html">
      Allerta massima: Chrome 146 risolve 29 vulnerabilità e una critica. Aggiorna subito&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/allerta-massima-chrome-146-risolve-29-vulnerabilita-e-una-critica-aggiorna-subito/&#34;&gt;https://www.redhotcyber.com/post/allerta-massima-chrome-146-risolve-29-vulnerabilita-e-una-critica-aggiorna-subito/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #googlechrome #chromesicurezza #vulnerabilità #cybersecurity #hacking #malware #patchdisicurezza #aggiornamentobrowser&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/232/037/682/804/080/original/7839847d75caf77b.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-15T07:35:45Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqspmhvf6w6w8upqxlqle65hueqn4x3t9aru5zay07vx2ww0m997c6qzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v279hp4y</id>
    
      <title type="html">La guerra ora è un VideoGame! Maven di Palantir accelera gli ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqspmhvf6w6w8upqxlqle65hueqn4x3t9aru5zay07vx2ww0m997c6qzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v279hp4y" />
    <content type="html">
      La guerra ora è un VideoGame! Maven di Palantir accelera gli attacchi del Pentagono&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/la-guerra-ora-e-un-videogame-maven-di-palantir-accelera-gli-attacchi-del-pentagono/&#34;&gt;https://www.redhotcyber.com/post/la-guerra-ora-e-un-videogame-maven-di-palantir-accelera-gli-attacchi-del-pentagono/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #palantir #maven #pentagono #operazioneepicfury #intelligenzaartificiale #unificazione #pianificazionestrategica&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/232/006/076/676/662/original/16dd670b5ecd86fb.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-15T07:27:43Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsry8nev45a205xttleq3t6sme9q54xmnrpl30745q8v7h2lwl3efqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2lcsmev</id>
    
      <title type="html">Instagram dice addio alla crittografia nei DM: ecco cosa succede ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsry8nev45a205xttleq3t6sme9q54xmnrpl30745q8v7h2lwl3efqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2lcsmev" />
    <content type="html">
      Instagram dice addio alla crittografia nei DM: ecco cosa succede dopo l’8 maggio 2026&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/instagram-dice-addio-alla-crittografia-nei-dm-ecco-cosa-succede-dopo-l8-maggio-2026/&#34;&gt;https://www.redhotcyber.com/post/instagram-dice-addio-alla-crittografia-nei-dm-ecco-cosa-succede-dopo-l8-maggio-2026/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #instagram #messaggistica #sicurezza&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/229/240/058/543/650/original/0e1e335698046ef4.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-14T19:44:17Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqswmlptyhkyh47372y46vxfydvr4fc9y7jwd3h5dr5zld4jnqs58eczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2gfgek5</id>
    
      <title type="html">Chrome a rischio: due estensioni che prima erano “sicure” ora ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqswmlptyhkyh47372y46vxfydvr4fc9y7jwd3h5dr5zld4jnqs58eczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2gfgek5" />
    <content type="html">
      Chrome a rischio: due estensioni che prima erano “sicure” ora rubano i tuoi dati&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/chrome-a-rischio-due-estensioni-che-prima-erano-sicure-ora-rubano-i-tuoi-dati/&#34;&gt;https://www.redhotcyber.com/post/chrome-a-rischio-due-estensioni-che-prima-erano-sicure-ora-rubano-i-tuoi-dati/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #malware #security #chromemalware #cybersecurity #hacking #dataprivacy #navigatorisicuri&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/227/970/152/399/506/original/c8f50b0ff70798d9.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-14T14:21:20Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsrx5gt8048jh2hn57439a4pwgg8m9ctcxfrg0hueeh909sswfyfsqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v27elufj</id>
    
      <title type="html">12 milioni di installazioni Linux a rischio: CrackArmor apre la ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsrx5gt8048jh2hn57439a4pwgg8m9ctcxfrg0hueeh909sswfyfsqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v27elufj" />
    <content type="html">
      12 milioni di installazioni Linux a rischio: CrackArmor apre la porta a root&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/12-milioni-di-installazioni-linux-a-rischio-crackarmor-apre-la-porta-a-root/&#34;&gt;https://www.redhotcyber.com/post/12-milioni-di-installazioni-linux-a-rischio-crackarmor-apre-la-porta-a-root/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #linux #vulnerabilita #apparmor #sicurezzainformatica #kernel #malware&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/226/412/642/456/110/original/4b634d5e436e346d.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-14T07:45:14Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs0fs6czljy2waptyuexvfnqwr8q5c0na7kgpmm7wjpk3aw8aarzaszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v23xfjgg</id>
    
      <title type="html">Su ReHub un hacker vende l’anima di una startup AI americana ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs0fs6czljy2waptyuexvfnqwr8q5c0na7kgpmm7wjpk3aw8aarzaszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v23xfjgg" />
    <content type="html">
      Su ReHub un hacker vende l’anima di una startup AI americana&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/su-rehub-un-hacker-vende-lanima-di-una-startup-ai-americana/&#34;&gt;https://www.redhotcyber.com/post/su-rehub-un-hacker-vende-lanima-di-una-startup-ai-americana/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #intelligenzaartificiale #aigeneration #cybersecurity #hacking #videogeneration #rehub&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/226/353/422/449/360/original/757d946fb613fc47.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-14T07:30:10Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsgnmzh809syt3vx3fad5gmchvftzjqyezr0rtddc8pmg6u7hz7udgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2veg8ml</id>
    
      <title type="html">300 Byte e un Pacchetto anonimo per mandare in crash OpenSSH: il ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsgnmzh809syt3vx3fad5gmchvftzjqyezr0rtddc8pmg6u7hz7udgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2veg8ml" />
    <content type="html">
      300 Byte e un Pacchetto anonimo per mandare in crash OpenSSH: il bug critico e la Soluzione&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/300-byte-e-un-pacchetto-anonimo-per-mandare-in-crash-openssh-il-bug-critico-e-la-soluzione/&#34;&gt;https://www.redhotcyber.com/post/300-byte-e-un-pacchetto-anonimo-per-mandare-in-crash-openssh-il-bug-critico-e-la-soluzione/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #linux #openssh #vulnerabilita #sicurezzainformatica&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/226/323/886/231/434/original/6efe3db892213cf5.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-14T07:22:39Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs9302urmu2wg2zk0g7hvt7g8sty868q97uwj8kp2d76etd002yasczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2pehaz0</id>
    
      <title type="html">BlackSanta! un semplice file ZIP apre la porta agli hacker: ecco ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs9302urmu2wg2zk0g7hvt7g8sty868q97uwj8kp2d76etd002yasczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2pehaz0" />
    <content type="html">
      BlackSanta! un semplice file ZIP apre la porta agli hacker: ecco come difendersi&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/blacksanta-un-semplice-file-zip-apre-la-porta-agli-hacker-ecco-come-difendersi/&#34;&gt;https://www.redhotcyber.com/post/blacksanta-un-semplice-file-zip-apre-la-porta-agli-hacker-ecco-come-difendersi/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A volte gli attacchi informatici non partono da exploit spettacolari o #vulnerabilità zero-day. No. &lt;br/&gt;&lt;br/&gt;Molto più spesso iniziano da qualcosa di ordinario, come ad esempio un file ricevuto via email, magari un archivio che sembra contenere documenti di lavoro. Ed è proprio così che prende forma la campagna analizzata nel #report dedicato a BlackSanta. &lt;br/&gt;&lt;br/&gt;A cura di Bajram Zeqiri&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #malware #ransomware #sicurezzainformatica #attacchinformatici #minacceinformatiche #archiviozip #malwaresicurezza #protezioneinformatica #sicurezzadigital #minacceonline&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/226/274/484/625/713/original/e4ec5cd72e7a2972.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-14T07:10:06Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsdgsnsmxj9q6tgdzntak7weepkxrty6wlaqzv4ukzs834f6nssajgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v22dd6x3</id>
    
      <title type="html">Sventato un cyber attacco iraniano alla centrale nucleare di ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsdgsnsmxj9q6tgdzntak7weepkxrty6wlaqzv4ukzs834f6nssajgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v22dd6x3" />
    <content type="html">
      Sventato un cyber attacco iraniano alla centrale nucleare di ricerca Polacca&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/attacco-di-matrice-iraniana-sventato-in-polonia-alla-centrale-nucleare-di-ricerca/&#34;&gt;https://www.redhotcyber.com/post/attacco-di-matrice-iraniana-sventato-in-polonia-alla-centrale-nucleare-di-ricerca/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #sicurezzainformatica #hacking #iran #attacchinformatici #cybersecurity #polonia&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/221/489/725/277/768/original/5bb10eb5519bf5d3.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-13T10:53:16Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsvru3u3ja5dvk77r44u3dk3dz2nnqjrhfnk428fxupr5nn7j3kp9qzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v283q9r3</id>
    
      <title type="html">Cyber war: i gruppi statali Iraniani utilizzano malware già ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsvru3u3ja5dvk77r44u3dk3dz2nnqjrhfnk428fxupr5nn7j3kp9qzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v283q9r3" />
    <content type="html">
      Cyber war: i gruppi statali Iraniani utilizzano malware già pronti per velocizzare gli attacchi&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/cyber-war-i-gruppi-statali-iraniani-utilizzano-malware-gia-pronti-per-velocizzare-gli-attacchi/&#34;&gt;https://www.redhotcyber.com/post/cyber-war-i-gruppi-statali-iraniani-utilizzano-malware-gia-pronti-per-velocizzare-gli-attacchi/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #malware #ransomware #attacchiinformatici #intelligenzaartificiale&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/221/341/498/584/113/original/4f64624ff7f74c32.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-13T10:15:34Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqswwr69e94dq3rg4lrw2mnn49zawh3xljmu8f2pzu2jnun6c4cvmkqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v25sfqu5</id>
    
      <title type="html">🚀 TRA POCHI GIORNI AL VIA IL CORSO &amp;#34;𝗖𝗬𝗕𝗘𝗥 ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqswwr69e94dq3rg4lrw2mnn49zawh3xljmu8f2pzu2jnun6c4cvmkqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v25sfqu5" />
    <content type="html">
      🚀 TRA POCHI GIORNI AL VIA IL CORSO &amp;#34;𝗖𝗬𝗕𝗘𝗥 𝗢𝗙𝗙𝗘𝗡𝗦𝗜𝗩𝗘 𝗙𝗨𝗡𝗗𝗔𝗠𝗘𝗡𝗧𝗔𝗟𝗦&amp;#34; 🚀&lt;br/&gt;&lt;br/&gt;🔗 Programma e dettagli: &lt;a href=&#34;https://www.redhotcyber.com/linksSk2L/cyber-offensive-fundamentals&#34;&gt;https://www.redhotcyber.com/linksSk2L/cyber-offensive-fundamentals&lt;/a&gt;&lt;br/&gt;🔗 Introduzione al corso del prof. Alessio Lauro: &lt;a href=&#34;https://www.youtube.com/watch?v=0y4GYsJMoXo&#34;&gt;https://www.youtube.com/watch?v=0y4GYsJMoXo&lt;/a&gt;&lt;br/&gt;🔗 Webinar introduttivo al corso: &lt;a href=&#34;https://www.youtube.com/watch?v=z92gaV2zgNg&#34;&gt;https://www.youtube.com/watch?v=z92gaV2zgNg&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;✅Lezioni in diretta e supervisionate (niente video preregistrati abbandonati a metà).&lt;br/&gt;✅Laboratori pratici su ambienti reali.&lt;br/&gt;✅Un percorso strutturato per chi parte da zero.&lt;br/&gt;&lt;br/&gt;💎 Essendo la prima &amp;#34;Live Class&amp;#34; su questo argomento, i prezzi sono imbattibili.&lt;br/&gt;Ma affrettatevi perché il corso è a numero chiuso&lt;br/&gt;&lt;br/&gt;Info 📞 379 163 8765 ✉️ formazione@redhotcyber.com&lt;br/&gt;&lt;br/&gt;#redhotcyber #formazione #pentesting #pentest #formazionelive #ethicalhacking #hacking #cybersecurity #penetrationtesting #cti #cybercrime #infosec #corsi #liveclass #hackerhood #pentesting&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/220/973/900/575/666/original/f6963938c0a2593a.png&#34;&gt; 
    </content>
    <updated>2026-03-13T08:42:05Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqszn6350d0skl0737gdwm2aw989stvv2ctd4fypqt6sf6zrgwadavgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2ye48nn</id>
    
      <title type="html">Gli Hacker entrano nei server FBI e accedono ai dati esclusivi ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqszn6350d0skl0737gdwm2aw989stvv2ctd4fypqt6sf6zrgwadavgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2ye48nn" />
    <content type="html">
      Gli Hacker entrano nei server FBI e accedono ai dati esclusivi sull’indagine di Jeffrey Epstein&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/gli-hacker-entrano-nei-server-fbi-e-accedono-ai-dati-esclusivi-sullindagine-di-jeffrey-epstein/&#34;&gt;https://www.redhotcyber.com/post/gli-hacker-entrano-nei-server-fbi-e-accedono-ai-dati-esclusivi-sullindagine-di-jeffrey-epstein/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #fbi #jeffreyepstein #indaginifbi #violaioneserver #sicurezzainformatica&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/215/508/629/474/722/original/aafa8fd10ab09801.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-12T09:32:12Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsrk0pft9d0unvrqc5fwcxj0t6guynmh9fh80jzag377a0txk7hndqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2sjqfw4</id>
    
      <title type="html">Il reclutamento degli hacker di Stato e l’evoluzione normativa ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsrk0pft9d0unvrqc5fwcxj0t6guynmh9fh80jzag377a0txk7hndqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2sjqfw4" />
    <content type="html">
      Il reclutamento degli hacker di Stato e l’evoluzione normativa della difesa cibernetica in italia&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/il-reclutamento-degli-hacker-di-stato-e-levoluzione-normativa-della-difesa-cibernetica-in-italia/&#34;&gt;https://www.redhotcyber.com/post/il-reclutamento-degli-hacker-di-stato-e-levoluzione-normativa-della-difesa-cibernetica-in-italia/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersicurezza #ransomware #hackerEtici #sicurezzainformatica #normecyber #incidenticyber&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/210/187/528/430/315/original/2d3e73a1afc767d1.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-11T10:58:58Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs96sgwdg2jsryrm5kmyzf89x6hrt30gkz8l0vyvh6qpzjmyycj0eszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2wppn74</id>
    
      <title type="html">Mosca senza Internet da 5 giorni. Una nuova legge consente ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs96sgwdg2jsryrm5kmyzf89x6hrt30gkz8l0vyvh6qpzjmyycj0eszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2wppn74" />
    <content type="html">
      Mosca senza Internet da 5 giorni. Una nuova legge consente all’FSB di sospendere la rete&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/mosca-senza-internet-da-5-giorni-una-nuova-legge-consente-allfsb-di-sospendere-la-rete/&#34;&gt;https://www.redhotcyber.com/post/mosca-senza-internet-da-5-giorni-una-nuova-legge-consente-allfsb-di-sospendere-la-rete/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #mosca #telefoniamobile #internet #restrizionidiservizi #distrettocentrale #disagipersistenti&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/205/913/020/905/150/original/92127b5cc9b99baf.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-10T16:51:54Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsvnwjgzzjcgq85k7kufjt65z6ce4cwgqfdge78yuf76cyafqdgdeszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2dm9k2d</id>
    
      <title type="html">Utontopedia: quando il “codice democratico” diventa la nuova ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsvnwjgzzjcgq85k7kufjt65z6ce4cwgqfdge78yuf76cyafqdgdeszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2dm9k2d" />
    <content type="html">
      Utontopedia: quando il “codice democratico” diventa la nuova trappola degli hacker&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/utontopedia-quando-il-codice-democratico-diventa-la-nuova-trappola-degli-hacker/&#34;&gt;https://www.redhotcyber.com/post/utontopedia-quando-il-codice-democratico-diventa-la-nuova-trappola-degli-hacker/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;C’è una cosa che molti sviluppatori fanno quasi senza pensarci: copiare un comando da una pagina #web e incollarlo nel terminale. Succede ogni giorno. &lt;br/&gt;&lt;br/&gt;Installa questo tool, incolla quella riga, premi invio. Fine. &lt;br/&gt;&lt;br/&gt;Ma se ci pensi un attimo, stai concedendo a quella pagina il permesso di eseguire qualsiasi cosa sul tuo computer. Possiamo anche chiamarlo un assegno in bianco. &lt;br/&gt;&lt;br/&gt;A cura di Redazione RHC&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #malware #malvertising #claudcode #amaterastealer #sicurezzainformatica #rubodidati #password #datisensibili #minacceinformatiche #phishing&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/205/045/778/804/498/original/0c824d7fff3f362a.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-10T13:11:21Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsqe3x8hwl242awqg7a60w4y2504x2uejspt7ecgqlsxn3r3uc8ymgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v20t0uma</id>
    
      <title type="html">Polizia Postale e ITS insieme per formare i nuovi ispettori ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsqe3x8hwl242awqg7a60w4y2504x2uejspt7ecgqlsxn3r3uc8ymgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v20t0uma" />
    <content type="html">
      Polizia Postale e ITS insieme per formare i nuovi ispettori digitali&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/polizia-postale-e-its-insieme-per-formare-i-nuovi-ispettori-digitali/&#34;&gt;https://www.redhotcyber.com/post/polizia-postale-e-its-insieme-per-formare-i-nuovi-ispettori-digitali/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #sicurezzadigitale #poliziapostale #confindustria #reteitsitalia #formazione&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/204/665/720/085/647/original/10ac57292dbb9e90.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-10T11:34:42Z</updated>
  </entry>

</feed>