Il Blog di Michele Pinassi – Telegram
Il Blog di Michele Pinassi
312 subscribers
371 photos
17 videos
119 files
8.3K links
Parliamo di tecnologia, politica e cybersecurity.

Post automatici e rassegna personale.
Download Telegram
A.T.I di Zuinisi srl
Ransomware group called nightspire claims attack for A.T.I di Zuinisi srl. The target comes from Italy. We identify this attack with following hash code: 8ade252e9bfac8db02a378d54c8693266ffa0fe2d0057aef29a446d385bfb6b4 (ID: 29740)Target victim website: www.ati-italia.com/en

by RansomFeed - https://r.zerozone.it/post/T5K9e97Sgk6bae7Ax
Bitgo
Ransomware group called incransom claims attack for Bitgo. The target comes from Italy. We identify this attack with following hash code: d31d2ea544289a35137409747e887dc7afc2a7c79470e9c3337f027d0798b70e (ID: 29747)Target victim website: N/D

by RansomFeed - https://r.zerozone.it/post/ebAffsX3NghGHJY1b
iSMA CONTROLLI
Ransomware group called akira claims attack for iSMA CONTROLLI. The target comes from Italy. We identify this attack with following hash code: e361609153c96d24498441a710bf54b4be7a4c96eede7394b36094cde4bf83ce (ID: 29770)Target victim website: N/D

by RansomFeed - https://r.zerozone.it/post/WgTKng0pkH45DBuX4
wiproferretto.com
Ransomware group called dragonforce claims attack for wiproferretto.com. The target comes from Italy. We identify this attack with following hash code: 7babb3e57a9a668c0ccec4a46ffa1526a904066f7f0f21757bf519e2984ef137 (ID: 29767)Target victim website: N/D

by RansomFeed - https://r.zerozone.it/post/yFFb79SuFRvQUx26W
Icat Food SpA
Ransomware group called akira claims attack for Icat Food SpA. The target comes from Italy. We identify this attack with following hash code: 88ba18df286775760c2a953ce5fb41d3432090c7c7a778f10ff161834b936207 (ID: 29763)Target victim website: N/D

by RansomFeed - https://r.zerozone.it/post/DwUefCq4qPsp3V7D8
Casartigiani
Ransomware group called qilin claims attack for Casartigiani. The target comes from Italy. We identify this attack with following hash code: eae870f7617b614731ea48d46b76a601dda7dc44a65a9012e0d03104e74a504a (ID: 29773)Target victim website: N/D

by RansomFeed - https://r.zerozone.it/post/yWujqzn22W4XzB0p8
Può sembrare strano, ma i programmatori COBOL sono particolarmente ricercati: ancora moltissimi applicativi, soprattutto in ambito bancario, girano sotto questo linguaggio di programmazione degli anni 60.
Ooops! 😅
Elgon Cosmetic
Ransomware group called spacebears claims attack for Elgon Cosmetic. The target comes from Italy. We identify this attack with following hash code: a7492b060eb0df7e329487a95ff37ba0b846e16f5bdb7a244b41c9c827f77b1c (ID: 29827)Target victim website: elgoncosmetic.com

by RansomFeed - https://r.zerozone.it/post/zyP2Tur2DvA1nFVVt
femar.it
Ransomware group called tengu claims attack for femar.it. The target comes from Italy. We identify this attack with following hash code: 1f56d69a2e8edbde779f5637b7e8ed2202eb7750262d367dd2147ec0f6c1b15e (ID: 29820)Target victim website: femar.it

by RansomFeed - https://r.zerozone.it/post/rQ8BeKzdjM6279qF2
See how SafeBreach Labs researchers discovered a critical remote code execution vulnerability in the MS-EVEN RPC protocol that allowed low-privileged users to bypass share limitations and write arbitrary files on Windows 11 and Windows Server 2025 systems.

https://www.safebreach.com/blog/safebreach_labs_discovers_cve-2025-29969/