The Economics of OnlyFans
OnlyFans has become part of the zeitgeist recently.
The rise of e-girls and the prospects of making millions make it a fun thing to gawk at in a reality-tv kind of way. It has benefitted fabulously from the pandemic too. With everyone stuck at home all day, less of us have jobs and we all have less to entertain ourselves with. More existential boredom equals more “fans” and “creators” alike.
https://xsrus.com/the-economics-of-onlyfans
OnlyFans has become part of the zeitgeist recently.
The rise of e-girls and the prospects of making millions make it a fun thing to gawk at in a reality-tv kind of way. It has benefitted fabulously from the pandemic too. With everyone stuck at home all day, less of us have jobs and we all have less to entertain ourselves with. More existential boredom equals more “fans” and “creators” alike.
https://xsrus.com/the-economics-of-onlyfans
Xsrus
The Economics of OnlyFans - xsrus.com
OnlyFans has become part of the zeitgeist recently. The rise of e-girls and the prospects of making millions make it a fun thing to gawk at in a
How to build a culture of cybersecurity
“We put so many resources into ’locking up’ using technology that we forget about the back doors in the organization, and that’s usually people,” said Pearlson, who has a doctorate in business administration with a focus on management information systems. “We need a culture of cybersecurity because you can’t tell everyone everything they need to do. You need them to understand that organizational safety is part of what they need to do in today’s world.”
https://mitsloan.mit.edu/ideas-made-to-matter/how-to-build-a-culture-cybersecurity
“We put so many resources into ’locking up’ using technology that we forget about the back doors in the organization, and that’s usually people,” said Pearlson, who has a doctorate in business administration with a focus on management information systems. “We need a culture of cybersecurity because you can’t tell everyone everything they need to do. You need them to understand that organizational safety is part of what they need to do in today’s world.”
https://mitsloan.mit.edu/ideas-made-to-matter/how-to-build-a-culture-cybersecurity
MIT Management Sloan School
How to build a culture of cybersecurity
Technology and training are not enough to safeguard companies against cybersecurity attacks. Here’s how to infuse safe behavior into corporate culture.
I nodi privacy delle Linee guida Agid per i siti della PA: perché il Garante approva con riserva
Il Garante privacy ha approvato con riserva le “Linee guida di design per i siti internet e i servizi digitali della PA” di Agid, sottolineando alcuni fronti critici in particolare in ambito accessibilità, affidabilità e sicurezza: l’autorità ha invitato a integrare il documento, affinché sia compliant alla normativa sulla data protection
https://www.cybersecurity360.it/news/i-nodi-privacy-delle-linee-guida-agid-per-i-siti-della-pa-perche-il-garante-approva-con-riserva/
Il Garante privacy ha approvato con riserva le “Linee guida di design per i siti internet e i servizi digitali della PA” di Agid, sottolineando alcuni fronti critici in particolare in ambito accessibilità, affidabilità e sicurezza: l’autorità ha invitato a integrare il documento, affinché sia compliant alla normativa sulla data protection
https://www.cybersecurity360.it/news/i-nodi-privacy-delle-linee-guida-agid-per-i-siti-della-pa-perche-il-garante-approva-con-riserva/
Cyber Security 360
I nodi privacy delle Linee guida Agid per i siti della PA: perché il Garante approva con riserva
Il Garante privacy ha approvato con riserva le “Linee guida di design per i siti internet e i servizi digitali della PA” di Agid, sottolineando alcuni fronti critici in particolare in ambito accessibilità, affidabilità e sicurezza: l’autorità ha invitato…
Mapped: Global Happiness Levels in 2022
What really makes people happy? While countless academic researchers have tried to get to the bottom of this, the truth is, it’s a complicated question to answer.
Happiness levels depend on a number of factors, including one’s financial security, perceptions of social support, feelings of personal freedom, and much more.
Spoiler: in Europa, la più felice è la Finlandia
https://www.visualcapitalist.com/mapped-global-happiness-levels-in-2022/
What really makes people happy? While countless academic researchers have tried to get to the bottom of this, the truth is, it’s a complicated question to answer.
Happiness levels depend on a number of factors, including one’s financial security, perceptions of social support, feelings of personal freedom, and much more.
Spoiler: in Europa, la più felice è la Finlandia
https://www.visualcapitalist.com/mapped-global-happiness-levels-in-2022/
Visual Capitalist
Mapped: Global Happiness Levels in 2022
Global happiness levels are determined by several different factors. Here's a look at the happiest and unhappiest countries in every region.
Suspected Conti Ransomware Activity in the Auto Manufacturing Sector
At this stage, Dragos has not yet observed any confirmed initial access methods being utilized and does not have any evidence of ransomware encryption being initiated. The observed communications from the networks are consistent with those commonly associated with established footholds. Dragos observed this activity starting in December 2021, but it may have begun prior to that. It has been ongoing until March 2022.
https://www.dragos.com/blog/industry-news/suspected-conti-ransomware-activity-in-the-auto-manufacturing-sector/
At this stage, Dragos has not yet observed any confirmed initial access methods being utilized and does not have any evidence of ransomware encryption being initiated. The observed communications from the networks are consistent with those commonly associated with established footholds. Dragos observed this activity starting in December 2021, but it may have begun prior to that. It has been ongoing until March 2022.
https://www.dragos.com/blog/industry-news/suspected-conti-ransomware-activity-in-the-auto-manufacturing-sector/
Dragos
Suspected Conti Ransomware Activity in the Auto Manufacturing Sector
Dragos is observing evidence of multiple automotive manufacturers compromised by Emotet. A malware strain & a cybercrime operation.
You Should Not Trust Russia’s New “Trusted Root CA”
The Internet governance entities ICANN and RIPE rejected Ukraine’s requests to revoke Russian top-level domains, access to Domain Name System root servers, and its IP addresses. However, international sanctions have heavily impacted Russia’s internet infrastructure. In part, this has happened because Certificate Authorities (CAs), the trusted notaries that underpin data security on the web, have begun refusing orders from domains ending in “.ru”, and have revoked certificates from Russia-based banks. Because international CAs like Digicert and Sectigo have largely stopped working for Russian websites, the Russian government has stepped in and suggested that citizens install its “Russian Trusted Root CA.”
https://www.eff.org/deeplinks/2022/03/you-should-not-trust-russias-new-trusted-root-ca
The Internet governance entities ICANN and RIPE rejected Ukraine’s requests to revoke Russian top-level domains, access to Domain Name System root servers, and its IP addresses. However, international sanctions have heavily impacted Russia’s internet infrastructure. In part, this has happened because Certificate Authorities (CAs), the trusted notaries that underpin data security on the web, have begun refusing orders from domains ending in “.ru”, and have revoked certificates from Russia-based banks. Because international CAs like Digicert and Sectigo have largely stopped working for Russian websites, the Russian government has stepped in and suggested that citizens install its “Russian Trusted Root CA.”
https://www.eff.org/deeplinks/2022/03/you-should-not-trust-russias-new-trusted-root-ca
Electronic Frontier Foundation
You Should Not Trust Russia’s New “Trusted Root CA”
Last week, Russian citizens began receiving instructions to either download a government-approved web browser, or change their basic browser settings, according to instructions issued by their
What Google Search Isn’t Showing You
Google Search accounts for around eighty-five per cent of the global search-engine market. It has made up so much of our online experience for so long that it can be hard to envision anything different. The Google Search page today looks largely the same as it did when it first launched, in 1998: blue links against an austere white background. From the beginning, the company’s founders, Sergey Brin and Larry Page, recognized the tension between useful search results and profitable ones.
https://www.newyorker.com/culture/infinite-scroll/what-google-search-isnt-showing-you
Google Search accounts for around eighty-five per cent of the global search-engine market. It has made up so much of our online experience for so long that it can be hard to envision anything different. The Google Search page today looks largely the same as it did when it first launched, in 1998: blue links against an austere white background. From the beginning, the company’s founders, Sergey Brin and Larry Page, recognized the tension between useful search results and profitable ones.
https://www.newyorker.com/culture/infinite-scroll/what-google-search-isnt-showing-you
The New Yorker
What Google Search Isn’t Showing You
The search engine has made up so much of our online experience for so long that it can be hard to imagine something better.
Configurare correttamente Microsoft Defender
Defender, nella sua configurazione di base, offre una protezione che si potrebbe considerare già sopra la media, tuttavia nasconde delle opzioni che possono essere attivate manualmente per incrementare di molto il livello di protezione e la sicurezza dell'intero sistema.
Alcune di queste opzioni si attivano dalle Impostazioni di Windows, altre invece sono un po' più nascoste e si attivano solamente tramite dei comandi PowerShell.
https://gabriele.tips/configurare-correttamente-microsoft-defender/
Defender, nella sua configurazione di base, offre una protezione che si potrebbe considerare già sopra la media, tuttavia nasconde delle opzioni che possono essere attivate manualmente per incrementare di molto il livello di protezione e la sicurezza dell'intero sistema.
Alcune di queste opzioni si attivano dalle Impostazioni di Windows, altre invece sono un po' più nascoste e si attivano solamente tramite dei comandi PowerShell.
https://gabriele.tips/configurare-correttamente-microsoft-defender/
Gabriele Tips
Configurare correttamente Microsoft Defender
Windows include Microsoft Defender, un software antimalware integrato con il sistema in grado di proteggere il computer dalle minacce più recenti. Negli ultimi anni Microsoft…
❤1
La Settimana Cibernetica del 20 marzo 2022
Scarica il riepilogo delle notizie pubblicate dallo CSIRT Italia dal 14 al 20 marzo 2022
by CSIRT - https://csirt.gov.it/contenuti/la-settimana-cibernetica-del-20-marzo-2022
Scarica il riepilogo delle notizie pubblicate dallo CSIRT Italia dal 14 al 20 marzo 2022
by CSIRT - https://csirt.gov.it/contenuti/la-settimana-cibernetica-del-20-marzo-2022
How Big Tech lost the antitrust battle with Europe
For decades, antitrust bodies in Europe and the US have been perceived as ineffective and too slow to react. Even though the European Commission has stepped up its antitrust actions in recent years, the fines that it has imposed are seen as simply the cost of doing business.
https://www.ft.com/content/cbb1fe40-860d-4013-bfcf-b75ee6e30206
For decades, antitrust bodies in Europe and the US have been perceived as ineffective and too slow to react. Even though the European Commission has stepped up its antitrust actions in recent years, the fines that it has imposed are seen as simply the cost of doing business.
https://www.ft.com/content/cbb1fe40-860d-4013-bfcf-b75ee6e30206
Ft
Subscribe to read | Financial Times
News, analysis and comment from the Financial Times, the worldʼs leading global business publication
sLoad torna a colpire le PEC
A seguito di ulteriori analisi, frutto della collaborazione tra il CERT-AGID e i gestori PEC, è stata rilevata una nuova campagna malspam, volta a veicolare il malware sLoad (v.4.3.3), veicolata tramite PEC a partire dalle prime ore del mattino della data odierna. La metodologia utilizzata è la stessa delle precedenti [...]
by CERT-AgID - https://cert-agid.gov.it/news/sload-torna-a-colpire-le-pec/
A seguito di ulteriori analisi, frutto della collaborazione tra il CERT-AGID e i gestori PEC, è stata rilevata una nuova campagna malspam, volta a veicolare il malware sLoad (v.4.3.3), veicolata tramite PEC a partire dalle prime ore del mattino della data odierna. La metodologia utilizzata è la stessa delle precedenti [...]
by CERT-AgID - https://cert-agid.gov.it/news/sload-torna-a-colpire-le-pec/
CERT-AGID
sLoad torna a colpire le PEC
Risolte vulnerabilità in prodotti QNAP
(AL04/220113/CSIRT-ITA)
Aggiornamenti di sicurezza QNAP risolvono molteplici vulnerabilità nei prodotti QTS, QuTS hero e QVR.
by CSIRT - http://csirt.gov.it/contenuti/risolte-vulnerabilita-in-prodotti-qnap-al04-220113-csirt-ita
(AL04/220113/CSIRT-ITA)
Aggiornamenti di sicurezza QNAP risolvono molteplici vulnerabilità nei prodotti QTS, QuTS hero e QVR.
by CSIRT - http://csirt.gov.it/contenuti/risolte-vulnerabilita-in-prodotti-qnap-al04-220113-csirt-ita
👍1
Vulnerabilità in prodotti Solarwinds
(AL02/220121/CSIRT-ITA)
Rilevata una vulnerabilità di sicurezza in Serv-U che potrebbe permettere ad un utente malintenzionato, remoto e non autenticato, di bypassare i controlli di sicurezza tramite richieste LDAP opportunamente predisposte.
by CSIRT - http://csirt.gov.it/contenuti/vulnerabilita-in-prodotti-solarwinds-al02-220121-csirt-ita
(AL02/220121/CSIRT-ITA)
Rilevata una vulnerabilità di sicurezza in Serv-U che potrebbe permettere ad un utente malintenzionato, remoto e non autenticato, di bypassare i controlli di sicurezza tramite richieste LDAP opportunamente predisposte.
by CSIRT - http://csirt.gov.it/contenuti/vulnerabilita-in-prodotti-solarwinds-al02-220121-csirt-ita
👍1