Il Blog di Michele Pinassi – Telegram
Il Blog di Michele Pinassi
302 subscribers
362 photos
16 videos
118 files
8.14K links
Tecnologia, politica, cybersecurity. Post automatici e rassegna personale.
Download Telegram
stimgroup
Ransomware group called incransom claims attack for stimgroup. The target comes from Italy. We identify this attack with following hash code: 699f454fdd835f56eaefe719ad489d298bc8d91737b809f5a9cea8f4b95c7cb9 (ID: 28677)Target victim website: N/D

by RansomFeed - https://r.zerozone.it/post/rZu3xRaJGCkCaf8CF
MUTTI-PARMA.COM
Ransomware group called clop claims attack for MUTTI-PARMA.COM. The target comes from Italy. We identify this attack with following hash code: 0969b040beb62979bf2cea647f6b0aa997c457fa59ccca78156fae57eef2027b (ID: 28594)Target victim website: MUTTI-PARMA.COM

by RansomFeed - https://r.zerozone.it/post/yRvqj87Kq7GFWzXCX
☝️ UPDATE 🗞

Come state vedendo, ho aggiunto ai post automatici in questo canale anche le vittime italiane di attacchi ransomware, direttamente dal feed della piattaforma RansomFeed.
👍1
Italgrafica Sistemi
Ransomware group called brotherhood claims attack for Italgrafica Sistemi. The target comes from Italy. We identify this attack with following hash code: 49bdcbe7db90a5095706e9627ace711937f6c75d76550c1a60bbf52416fbf801 (ID: 28539)Target victim website: konigprint.com

by RansomFeed - https://r.zerozone.it/post/MYpmhQ3BxhjdDsSxq
Adriatic Port Authority
Ransomware group called anubis claims attack for Adriatic Port Authority. The target comes from Italy. We identify this attack with following hash code: 2cac452168231461bd5e217ccf1e6f148548b4ba1ee22de39bc04d575d5ef29d (ID: 28709)Target victim website: N/D

by RansomFeed - https://r.zerozone.it/post/kuB4YMT2fVmamYcWw
Softlab SpA
Ransomware group called qilin claims attack for Softlab SpA. The target comes from Italy. We identify this attack with following hash code: 0822fa01f8335c994746332599774c1b1e29dd49da77377b19fbd1746cfd3a78 (ID: 28584)Target victim website: N/D

by RansomFeed - https://r.zerozone.it/post/qM89b0BMqWUkCPKXs
Labeltex Group
Ransomware group called akira claims attack for Labeltex Group. The target comes from Italy. We identify this attack with following hash code: 0eed1c651bb75e67295c2fdb5fb66bde55d1a84f2ee44837d5b3d82a3d611117 (ID: 28560)Target victim website: N/D

by RansomFeed - https://r.zerozone.it/post/X46vd95UhHUyJUbhC
The Cressi
Ransomware group called qilin claims attack for The Cressi. The target comes from Italy. We identify this attack with following hash code: 17700d7613d8e28cf6314f185237096d5de71c8058730d0c33b15456f762d7d7 (ID: 28574)Target victim website: N/D

by RansomFeed - https://r.zerozone.it/post/E0nTVf63NG3cKf8RX
Saplog Group
Ransomware group called nova claims attack for Saplog Group. The target comes from Italy. We identify this attack with following hash code: b1be823452df1b2a1ee833435512d6a93b9e89fa828408f654bbd7d1865c9b61 (ID: 28537)Target victim website: N/D

by RansomFeed - https://r.zerozone.it/post/M2qpQjjFGjgtPtxXz
Accademia di Cybersicurezza Lazio: come funziona la scuola gratuita finanziata con fondi europei
L’Accademia di Cybersicurezza Lazio nasce nel 2021, quando un grande attacco ransomware colpisce il sistema sanitario regionale. L’evento mandò in blocco tutta l’infrastruttura, compreso il portale vaccinale, compromettendo milioni di dati e informazioni sanitarie. Proprio in quell’occasione, l’amministrazione regionale decise di avviare una massiccia operazione di innalzamento del livello di cybersicurezza. Oltre alla [...]

by ForumPA - https://r.zerozone.it/post/zMW0v400VtkDUUvVz
Sintesi riepilogativa delle campagne malevole nella settimana del 10 – 16 gennaio
In questa settimana, il CERT-AGID ha riscontrato ed analizzato, nello scenario italiano di suo riferimento un totale di 63 campagne malevole, di cui 46 con obiettivi italiani e 17 generiche che hanno comunque interessato l’Italia, mettendo a disposizione dei suoi enti accreditati i relativi 487 indicatori di compromissione (IoC) individuati.

by CERT-AgID - https://r.zerozone.it/post/RBWFEsudH5Jts8fpm