iSMA CONTROLLI
Ransomware group called akira claims attack for iSMA CONTROLLI. The target comes from Italy. We identify this attack with following hash code: e361609153c96d24498441a710bf54b4be7a4c96eede7394b36094cde4bf83ce (ID: 29770)Target victim website: N/D
by RansomFeed - https://r.zerozone.it/post/WgTKng0pkH45DBuX4
Ransomware group called akira claims attack for iSMA CONTROLLI. The target comes from Italy. We identify this attack with following hash code: e361609153c96d24498441a710bf54b4be7a4c96eede7394b36094cde4bf83ce (ID: 29770)Target victim website: N/D
by RansomFeed - https://r.zerozone.it/post/WgTKng0pkH45DBuX4
wiproferretto.com
Ransomware group called dragonforce claims attack for wiproferretto.com. The target comes from Italy. We identify this attack with following hash code: 7babb3e57a9a668c0ccec4a46ffa1526a904066f7f0f21757bf519e2984ef137 (ID: 29767)Target victim website: N/D
by RansomFeed - https://r.zerozone.it/post/yFFb79SuFRvQUx26W
Ransomware group called dragonforce claims attack for wiproferretto.com. The target comes from Italy. We identify this attack with following hash code: 7babb3e57a9a668c0ccec4a46ffa1526a904066f7f0f21757bf519e2984ef137 (ID: 29767)Target victim website: N/D
by RansomFeed - https://r.zerozone.it/post/yFFb79SuFRvQUx26W
Icat Food SpA
Ransomware group called akira claims attack for Icat Food SpA. The target comes from Italy. We identify this attack with following hash code: 88ba18df286775760c2a953ce5fb41d3432090c7c7a778f10ff161834b936207 (ID: 29763)Target victim website: N/D
by RansomFeed - https://r.zerozone.it/post/DwUefCq4qPsp3V7D8
Ransomware group called akira claims attack for Icat Food SpA. The target comes from Italy. We identify this attack with following hash code: 88ba18df286775760c2a953ce5fb41d3432090c7c7a778f10ff161834b936207 (ID: 29763)Target victim website: N/D
by RansomFeed - https://r.zerozone.it/post/DwUefCq4qPsp3V7D8
Casartigiani
Ransomware group called qilin claims attack for Casartigiani. The target comes from Italy. We identify this attack with following hash code: eae870f7617b614731ea48d46b76a601dda7dc44a65a9012e0d03104e74a504a (ID: 29773)Target victim website: N/D
by RansomFeed - https://r.zerozone.it/post/yWujqzn22W4XzB0p8
Ransomware group called qilin claims attack for Casartigiani. The target comes from Italy. We identify this attack with following hash code: eae870f7617b614731ea48d46b76a601dda7dc44a65a9012e0d03104e74a504a (ID: 29773)Target victim website: N/D
by RansomFeed - https://r.zerozone.it/post/yWujqzn22W4XzB0p8
Anche i password manager non sono tutti uguali. Per questo continuo ad usare e consigliare KeePassXC....
https://www.punto-informatico.it/password-manager-meno-sicuri/
https://www.punto-informatico.it/password-manager-meno-sicuri/
Punto Informatico
Password manager meno sicuri di quanto pensi, anche LastPass
Uno studio rivela gravi vulnerabilità nei password manager più utilizzati come Bitwarden e LastPass: potrebbero non essere così sicuri.
DroidGround provides controlled Android runtime environments designed to teach and validate real-world exploitation techniques.
https://droidground.com/
https://droidground.com/
Droidground
DroidGround - A flexible playground for Android CTF challenges
A platform for hosting realistic Android CTF hacking challenges. DroidGround provides fine-grained control, real-time device interaction, Frida noscripting, Team based workflows and customizable exploitation scenarios.
Elgon Cosmetic
Ransomware group called spacebears claims attack for Elgon Cosmetic. The target comes from Italy. We identify this attack with following hash code: a7492b060eb0df7e329487a95ff37ba0b846e16f5bdb7a244b41c9c827f77b1c (ID: 29827)Target victim website: elgoncosmetic.com
by RansomFeed - https://r.zerozone.it/post/zyP2Tur2DvA1nFVVt
Ransomware group called spacebears claims attack for Elgon Cosmetic. The target comes from Italy. We identify this attack with following hash code: a7492b060eb0df7e329487a95ff37ba0b846e16f5bdb7a244b41c9c827f77b1c (ID: 29827)Target victim website: elgoncosmetic.com
by RansomFeed - https://r.zerozone.it/post/zyP2Tur2DvA1nFVVt
femar.it
Ransomware group called tengu claims attack for femar.it. The target comes from Italy. We identify this attack with following hash code: 1f56d69a2e8edbde779f5637b7e8ed2202eb7750262d367dd2147ec0f6c1b15e (ID: 29820)Target victim website: femar.it
by RansomFeed - https://r.zerozone.it/post/rQ8BeKzdjM6279qF2
Ransomware group called tengu claims attack for femar.it. The target comes from Italy. We identify this attack with following hash code: 1f56d69a2e8edbde779f5637b7e8ed2202eb7750262d367dd2147ec0f6c1b15e (ID: 29820)Target victim website: femar.it
by RansomFeed - https://r.zerozone.it/post/rQ8BeKzdjM6279qF2
Ransomfeed
Interessante rant
https://www.economymagazine.it/scuole-colabrodo-della-privacy-i-nemici-non-sono-gli-hacker-ma-i-meccanismi-che-regolano-la-pa/
https://www.economymagazine.it/scuole-colabrodo-della-privacy-i-nemici-non-sono-gli-hacker-ma-i-meccanismi-che-regolano-la-pa/
Economy Magazine
Scuole colabrodo della privacy, i nemici non sono gli hacker, ma PA
Scuole colabrodo della privacy, i nemici non sono gli hacker, ma i meccanismi che regolano la PA. L'analisi di Nicola Bernardi.
See how SafeBreach Labs researchers discovered a critical remote code execution vulnerability in the MS-EVEN RPC protocol that allowed low-privileged users to bypass share limitations and write arbitrary files on Windows 11 and Windows Server 2025 systems.
https://www.safebreach.com/blog/safebreach_labs_discovers_cve-2025-29969/
https://www.safebreach.com/blog/safebreach_labs_discovers_cve-2025-29969/
SafeBreach
Discovery & Analysis of CVE-2025-29969 | SafeBreach
Learn more about SafeBreach Labs discovery of CVE-2025-29969, a critical RCE vulnerability in the MS-EVEN RPC protocol in Microsoft Windows.
Sintesi riepilogativa delle campagne malevole nella settimana del 14 – 20 febbraio
In questa settimana, il CERT-AGID ha riscontrato ed analizzato, nello scenario italiano di suo riferimento un totale di 98 campagne malevole, di cui 60 con obiettivi italiani e 38 generiche che hanno comunque interessato l’Italia, mettendo a disposizione dei suoi enti accreditati i relativi 751 indicatori di compromissione (IoC) individuati.
by CERT-AgID - https://r.zerozone.it/post/KNX1vExtrT64nB7gN
In questa settimana, il CERT-AGID ha riscontrato ed analizzato, nello scenario italiano di suo riferimento un totale di 98 campagne malevole, di cui 60 con obiettivi italiani e 38 generiche che hanno comunque interessato l’Italia, mettendo a disposizione dei suoi enti accreditati i relativi 751 indicatori di compromissione (IoC) individuati.
by CERT-AgID - https://r.zerozone.it/post/KNX1vExtrT64nB7gN
CERT-AGID
Sintesi riepilogativa delle campagne malevole nella settimana del 14 – 20 febbraio
In questa settimana, il CERT-AGID ha riscontrato ed analizzato, nello scenario italiano di suo riferimento un totale di 98 campagne malevole, di cui 60 con obiettivi italiani e 38 generiche che hanno comunque interessato l’Italia, mettendo a disposizione…
ABAR S.p.A.
Ransomware group called qilin claims attack for ABAR S.p.A.. The target comes from Italy. We identify this attack with following hash code: 03949dd6a2565f259bfbb11dbaf9b1359272e4996c6673cf5f6838ebdea85772 (ID: 29868)Target victim website: www.abarspa.com
by RansomFeed - https://r.zerozone.it/post/9ZqJsY2Kfbs7GWCfV
Ransomware group called qilin claims attack for ABAR S.p.A.. The target comes from Italy. We identify this attack with following hash code: 03949dd6a2565f259bfbb11dbaf9b1359272e4996c6673cf5f6838ebdea85772 (ID: 29868)Target victim website: www.abarspa.com
by RansomFeed - https://r.zerozone.it/post/9ZqJsY2Kfbs7GWCfV
Ransomfeed
Independent analysis of AI
Understand the AI landscape to choose the best model and provider for your use case
https://artificialanalysis.ai/
Understand the AI landscape to choose the best model and provider for your use case
https://artificialanalysis.ai/