commerfrutta.com
Ransomware group called lockbit5 claims attack for commerfrutta.com. The target comes from Italy. We identify this attack with following hash code: 8eaefaf1a3733af9dcad6d604b3b5160bc0215c5ad4c04c693925230f0565b68 (ID: 30431)Target victim website: commerfrutta.com
by RansomFeed - https://r.zerozone.it/post/5Pv84Wyctup5299h9
Ransomware group called lockbit5 claims attack for commerfrutta.com. The target comes from Italy. We identify this attack with following hash code: 8eaefaf1a3733af9dcad6d604b3b5160bc0215c5ad4c04c693925230f0565b68 (ID: 30431)Target victim website: commerfrutta.com
by RansomFeed - https://r.zerozone.it/post/5Pv84Wyctup5299h9
Ransomfeed
societaitalianaalimenti.it
Ransomware group called lockbit5 claims attack for societaitalianaalimenti.it. The target comes from Italy. We identify this attack with following hash code: c02fadf5c1514866a51f97983f31b71046809ac4bd2e7d55587f8c67aeec4db6 (ID: 30429)Target victim website: societaitalianaalimenti.it
by RansomFeed - https://r.zerozone.it/post/UV4jHCD87BJ1QVGcw
Ransomware group called lockbit5 claims attack for societaitalianaalimenti.it. The target comes from Italy. We identify this attack with following hash code: c02fadf5c1514866a51f97983f31b71046809ac4bd2e7d55587f8c67aeec4db6 (ID: 30429)Target victim website: societaitalianaalimenti.it
by RansomFeed - https://r.zerozone.it/post/UV4jHCD87BJ1QVGcw
Ransomfeed
formula50.it
Ransomware group called lockbit5 claims attack for formula50.it. The target comes from Italy. We identify this attack with following hash code: 27e678a8ed3eddec3561445629013507300af031526929db27abd0c3d4f4059b (ID: 30428)Target victim website: formula50.it
by RansomFeed - https://r.zerozone.it/post/D0dnDTCCZDUT6AxAU
Ransomware group called lockbit5 claims attack for formula50.it. The target comes from Italy. We identify this attack with following hash code: 27e678a8ed3eddec3561445629013507300af031526929db27abd0c3d4f4059b (ID: 30428)Target victim website: formula50.it
by RansomFeed - https://r.zerozone.it/post/D0dnDTCCZDUT6AxAU
Ransomfeed
barberopietro.it
Ransomware group called lockbit5 claims attack for barberopietro.it. The target comes from Italy. We identify this attack with following hash code: 54e809905d8f49ac6a7322f4ef7f550c8e4b7020f824eb325586e5453c0d55bd (ID: 30432)Target victim website: barberopietro.it
by RansomFeed - https://r.zerozone.it/post/wFT4ncFA4eVpH4p3n
Ransomware group called lockbit5 claims attack for barberopietro.it. The target comes from Italy. We identify this attack with following hash code: 54e809905d8f49ac6a7322f4ef7f550c8e4b7020f824eb325586e5453c0d55bd (ID: 30432)Target victim website: barberopietro.it
by RansomFeed - https://r.zerozone.it/post/wFT4ncFA4eVpH4p3n
Ransomfeed
fac-srl.net
Ransomware group called lockbit5 claims attack for fac-srl.net. The target comes from Italy. We identify this attack with following hash code: 17c1dfdb4e86d4a01749c9a51db18409e75cdab6ce0cc0f6cc6b3a8f902256fa (ID: 30430)Target victim website: fac-srl.net
by RansomFeed - https://r.zerozone.it/post/EbEWaMySMWRtpq3fJ
Ransomware group called lockbit5 claims attack for fac-srl.net. The target comes from Italy. We identify this attack with following hash code: 17c1dfdb4e86d4a01749c9a51db18409e75cdab6ce0cc0f6cc6b3a8f902256fa (ID: 30430)Target victim website: fac-srl.net
by RansomFeed - https://r.zerozone.it/post/EbEWaMySMWRtpq3fJ
Ransomfeed
tazzetti.com
Ransomware group called dragonforce claims attack for tazzetti.com. The target comes from Italy. We identify this attack with following hash code: c436f370c95ac4ccf4191bf580b8fbb648babd4acc1857587d1ad8223609ca2c (ID: 30416)Target victim website: N/D
by RansomFeed - https://r.zerozone.it/post/QJuYuWj3nSA5PjAvx
Ransomware group called dragonforce claims attack for tazzetti.com. The target comes from Italy. We identify this attack with following hash code: c436f370c95ac4ccf4191bf580b8fbb648babd4acc1857587d1ad8223609ca2c (ID: 30416)Target victim website: N/D
by RansomFeed - https://r.zerozone.it/post/QJuYuWj3nSA5PjAvx
Ransomfeed
La Rete Neurale Sul Tavolo Operatorio | Signal Pirate
https://pinperepette.github.io/signal.pirate/articoli/la-rete-neurale-sul-tavolo-operatorio.html?t=d
https://pinperepette.github.io/signal.pirate/articoli/la-rete-neurale-sul-tavolo-operatorio.html?t=d
pinperepette.github.io
La Rete Neurale Sul Tavolo Operatorio | Signal Pirate
Mechanistic Interpretability: come aprire un LLM e leggere i suoi pensieri. GPT-2 small smontato pezzo per pezzo: 144 attention heads, circuito IOI a 26 head, Sparse Autoencoders, feature steering. 6 lab Python, tutto su CPU.
Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker – Krebs on Security
https://krebsonsecurity.com/2026/03/iran-backed-hackers-claim-wiper-attack-on-medtech-firm-stryker/
https://krebsonsecurity.com/2026/03/iran-backed-hackers-claim-wiper-attack-on-medtech-firm-stryker/
Krebs on Security
Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker
A hacktivist group with links to Iran's intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryker's largest hub outside of the United…
🔥1
Infrastrutture critiche: come la cybersecurity garantisce continuità operativa. Intervista a Sfoglietta (Gyala)
In un contesto geopolitico e tecnologico in cui le minacce informatiche sono sempre più articolate e complesse, la protezione delle infrastrutture critiche è diventata una priorità assoluta. Parliamo di tutti quei sistemi o reti che, se messi a rischio da attacchi cyber, possono impattare pesantemente sull’economia, sulla salute pubblica o [...]
by ForumPA - https://r.zerozone.it/post/rVfeVebun7aDUKVTC
In un contesto geopolitico e tecnologico in cui le minacce informatiche sono sempre più articolate e complesse, la protezione delle infrastrutture critiche è diventata una priorità assoluta. Parliamo di tutti quei sistemi o reti che, se messi a rischio da attacchi cyber, possono impattare pesantemente sull’economia, sulla salute pubblica o [...]
by ForumPA - https://r.zerozone.it/post/rVfeVebun7aDUKVTC
FPA
Infrastrutture critiche: la cybersecurity genera continuità operativa
In questa intervista, Gian Roberto Sfoglietta, CEO di Gyala, esplora come la cybersecurity protegga le infrastrutture critiche