Il sovraccarico informativo degli “Epstein files”
https://www.ilpost.it/2026/02/09/caos-sovraccarico-epstein-files/
https://www.ilpost.it/2026/02/09/caos-sovraccarico-epstein-files/
Il Post
Il sovraccarico informativo degli “Epstein files”
La pubblicazione di milioni di documenti frammentari, censurati e senza contesto è stata un'operazione più caotica che trasparente
Analisi di phishing adattivo. Spoofing e esfiltrazione tramite Telegram
L’analisi tecnica evidenzia l’uso combinato di due tecniche semplici ma efficaci. Spoofing del dominio mittente e allegato HTML attivo per la sottrazione di credenziali. Nel campione analizzato, l’allegato simula una pagina di autenticazione e tenta di inviare le credenziali a un canale controllato dall’attaccante tramite la Telegram Bot API.
by CERT-AgID - https://r.zerozone.it/post/0MD82MwUcj3VPaYu1
L’analisi tecnica evidenzia l’uso combinato di due tecniche semplici ma efficaci. Spoofing del dominio mittente e allegato HTML attivo per la sottrazione di credenziali. Nel campione analizzato, l’allegato simula una pagina di autenticazione e tenta di inviare le credenziali a un canale controllato dall’attaccante tramite la Telegram Bot API.
by CERT-AgID - https://r.zerozone.it/post/0MD82MwUcj3VPaYu1
CERT-AGID
Analisi di phishing adattivo. Spoofing e esfiltrazione tramite Telegram
L’analisi tecnica evidenzia l’uso combinato di due tecniche semplici ma efficaci. Spoofing del dominio mittente e allegato HTML attivo per la sottrazione di credenziali. Nel campione analizzato, l’allegato simula una pagina di autenticazione e tenta di inviare…
A.T.I di Zuinisi srl
Ransomware group called nightspire claims attack for A.T.I di Zuinisi srl. The target comes from Italy. We identify this attack with following hash code: 8ade252e9bfac8db02a378d54c8693266ffa0fe2d0057aef29a446d385bfb6b4 (ID: 29740)Target victim website: www.ati-italia.com/en
by RansomFeed - https://r.zerozone.it/post/T5K9e97Sgk6bae7Ax
Ransomware group called nightspire claims attack for A.T.I di Zuinisi srl. The target comes from Italy. We identify this attack with following hash code: 8ade252e9bfac8db02a378d54c8693266ffa0fe2d0057aef29a446d385bfb6b4 (ID: 29740)Target victim website: www.ati-italia.com/en
by RansomFeed - https://r.zerozone.it/post/T5K9e97Sgk6bae7Ax
ATI S.R.L.
Home | ATI S.r.l. | Stainless Steel Pipes Production | Lombardy
ATI S.r.l. specialists in the Production of high quality Stainless Steel Pipes. Discover the wide range of tailor-made solutions for every industrial and design need!
Bitgo
Ransomware group called incransom claims attack for Bitgo. The target comes from Italy. We identify this attack with following hash code: d31d2ea544289a35137409747e887dc7afc2a7c79470e9c3337f027d0798b70e (ID: 29747)Target victim website: N/D
by RansomFeed - https://r.zerozone.it/post/ebAffsX3NghGHJY1b
Ransomware group called incransom claims attack for Bitgo. The target comes from Italy. We identify this attack with following hash code: d31d2ea544289a35137409747e887dc7afc2a7c79470e9c3337f027d0798b70e (ID: 29747)Target victim website: N/D
by RansomFeed - https://r.zerozone.it/post/ebAffsX3NghGHJY1b
iSMA CONTROLLI
Ransomware group called akira claims attack for iSMA CONTROLLI. The target comes from Italy. We identify this attack with following hash code: e361609153c96d24498441a710bf54b4be7a4c96eede7394b36094cde4bf83ce (ID: 29770)Target victim website: N/D
by RansomFeed - https://r.zerozone.it/post/WgTKng0pkH45DBuX4
Ransomware group called akira claims attack for iSMA CONTROLLI. The target comes from Italy. We identify this attack with following hash code: e361609153c96d24498441a710bf54b4be7a4c96eede7394b36094cde4bf83ce (ID: 29770)Target victim website: N/D
by RansomFeed - https://r.zerozone.it/post/WgTKng0pkH45DBuX4
wiproferretto.com
Ransomware group called dragonforce claims attack for wiproferretto.com. The target comes from Italy. We identify this attack with following hash code: 7babb3e57a9a668c0ccec4a46ffa1526a904066f7f0f21757bf519e2984ef137 (ID: 29767)Target victim website: N/D
by RansomFeed - https://r.zerozone.it/post/yFFb79SuFRvQUx26W
Ransomware group called dragonforce claims attack for wiproferretto.com. The target comes from Italy. We identify this attack with following hash code: 7babb3e57a9a668c0ccec4a46ffa1526a904066f7f0f21757bf519e2984ef137 (ID: 29767)Target victim website: N/D
by RansomFeed - https://r.zerozone.it/post/yFFb79SuFRvQUx26W
Icat Food SpA
Ransomware group called akira claims attack for Icat Food SpA. The target comes from Italy. We identify this attack with following hash code: 88ba18df286775760c2a953ce5fb41d3432090c7c7a778f10ff161834b936207 (ID: 29763)Target victim website: N/D
by RansomFeed - https://r.zerozone.it/post/DwUefCq4qPsp3V7D8
Ransomware group called akira claims attack for Icat Food SpA. The target comes from Italy. We identify this attack with following hash code: 88ba18df286775760c2a953ce5fb41d3432090c7c7a778f10ff161834b936207 (ID: 29763)Target victim website: N/D
by RansomFeed - https://r.zerozone.it/post/DwUefCq4qPsp3V7D8
Casartigiani
Ransomware group called qilin claims attack for Casartigiani. The target comes from Italy. We identify this attack with following hash code: eae870f7617b614731ea48d46b76a601dda7dc44a65a9012e0d03104e74a504a (ID: 29773)Target victim website: N/D
by RansomFeed - https://r.zerozone.it/post/yWujqzn22W4XzB0p8
Ransomware group called qilin claims attack for Casartigiani. The target comes from Italy. We identify this attack with following hash code: eae870f7617b614731ea48d46b76a601dda7dc44a65a9012e0d03104e74a504a (ID: 29773)Target victim website: N/D
by RansomFeed - https://r.zerozone.it/post/yWujqzn22W4XzB0p8
Anche i password manager non sono tutti uguali. Per questo continuo ad usare e consigliare KeePassXC....
https://www.punto-informatico.it/password-manager-meno-sicuri/
https://www.punto-informatico.it/password-manager-meno-sicuri/
Punto Informatico
Password manager meno sicuri di quanto pensi, anche LastPass
Uno studio rivela gravi vulnerabilità nei password manager più utilizzati come Bitwarden e LastPass: potrebbero non essere così sicuri.
DroidGround provides controlled Android runtime environments designed to teach and validate real-world exploitation techniques.
https://droidground.com/
https://droidground.com/
Droidground
DroidGround - A flexible playground for Android CTF challenges
A platform for hosting realistic Android CTF hacking challenges. DroidGround provides fine-grained control, real-time device interaction, Frida noscripting, Team based workflows and customizable exploitation scenarios.
Elgon Cosmetic
Ransomware group called spacebears claims attack for Elgon Cosmetic. The target comes from Italy. We identify this attack with following hash code: a7492b060eb0df7e329487a95ff37ba0b846e16f5bdb7a244b41c9c827f77b1c (ID: 29827)Target victim website: elgoncosmetic.com
by RansomFeed - https://r.zerozone.it/post/zyP2Tur2DvA1nFVVt
Ransomware group called spacebears claims attack for Elgon Cosmetic. The target comes from Italy. We identify this attack with following hash code: a7492b060eb0df7e329487a95ff37ba0b846e16f5bdb7a244b41c9c827f77b1c (ID: 29827)Target victim website: elgoncosmetic.com
by RansomFeed - https://r.zerozone.it/post/zyP2Tur2DvA1nFVVt
femar.it
Ransomware group called tengu claims attack for femar.it. The target comes from Italy. We identify this attack with following hash code: 1f56d69a2e8edbde779f5637b7e8ed2202eb7750262d367dd2147ec0f6c1b15e (ID: 29820)Target victim website: femar.it
by RansomFeed - https://r.zerozone.it/post/rQ8BeKzdjM6279qF2
Ransomware group called tengu claims attack for femar.it. The target comes from Italy. We identify this attack with following hash code: 1f56d69a2e8edbde779f5637b7e8ed2202eb7750262d367dd2147ec0f6c1b15e (ID: 29820)Target victim website: femar.it
by RansomFeed - https://r.zerozone.it/post/rQ8BeKzdjM6279qF2
Ransomfeed