Analisi del malware VioletRAT veicolato in Italia
Nella precedente analisi era rimasto il dubbio sull'identità del malware distribuito. Nella giornata di ieri un ricercatore ha commentato il nostro post su X suggerendo che il payload finale sia VioletRAT v4.7, indicando inoltre un C2 differente rispetto a quello individuato nella nostra analisi. Questo potrebbe indicare che il sample [...]
by CERT-AgID - https://r.zerozone.it/post/6VFAHCdnaqm54gYZF
Nella precedente analisi era rimasto il dubbio sull'identità del malware distribuito. Nella giornata di ieri un ricercatore ha commentato il nostro post su X suggerendo che il payload finale sia VioletRAT v4.7, indicando inoltre un C2 differente rispetto a quello individuato nella nostra analisi. Questo potrebbe indicare che il sample [...]
by CERT-AgID - https://r.zerozone.it/post/6VFAHCdnaqm54gYZF
CERT-AGID
Analisi del malware VioletRAT veicolato in Italia
Nella precedente analisi era rimasto il dubbio sull'identità del malware distribuito. Nella giornata di ieri un ricercatore ha commentato il nostro post su X suggerendo che il payload finale sia VioletRAT v4.7, indicando inoltre un C2 differente rispetto…
Strategia-Cyber-USA.pdf
765.9 KB
President Trump’s CYBER STRATEGY for America - Marzo 2026
commerfrutta.com
Ransomware group called lockbit5 claims attack for commerfrutta.com. The target comes from Italy. We identify this attack with following hash code: 8eaefaf1a3733af9dcad6d604b3b5160bc0215c5ad4c04c693925230f0565b68 (ID: 30431)Target victim website: commerfrutta.com
by RansomFeed - https://r.zerozone.it/post/5Pv84Wyctup5299h9
Ransomware group called lockbit5 claims attack for commerfrutta.com. The target comes from Italy. We identify this attack with following hash code: 8eaefaf1a3733af9dcad6d604b3b5160bc0215c5ad4c04c693925230f0565b68 (ID: 30431)Target victim website: commerfrutta.com
by RansomFeed - https://r.zerozone.it/post/5Pv84Wyctup5299h9
Ransomfeed
societaitalianaalimenti.it
Ransomware group called lockbit5 claims attack for societaitalianaalimenti.it. The target comes from Italy. We identify this attack with following hash code: c02fadf5c1514866a51f97983f31b71046809ac4bd2e7d55587f8c67aeec4db6 (ID: 30429)Target victim website: societaitalianaalimenti.it
by RansomFeed - https://r.zerozone.it/post/UV4jHCD87BJ1QVGcw
Ransomware group called lockbit5 claims attack for societaitalianaalimenti.it. The target comes from Italy. We identify this attack with following hash code: c02fadf5c1514866a51f97983f31b71046809ac4bd2e7d55587f8c67aeec4db6 (ID: 30429)Target victim website: societaitalianaalimenti.it
by RansomFeed - https://r.zerozone.it/post/UV4jHCD87BJ1QVGcw
Ransomfeed
formula50.it
Ransomware group called lockbit5 claims attack for formula50.it. The target comes from Italy. We identify this attack with following hash code: 27e678a8ed3eddec3561445629013507300af031526929db27abd0c3d4f4059b (ID: 30428)Target victim website: formula50.it
by RansomFeed - https://r.zerozone.it/post/D0dnDTCCZDUT6AxAU
Ransomware group called lockbit5 claims attack for formula50.it. The target comes from Italy. We identify this attack with following hash code: 27e678a8ed3eddec3561445629013507300af031526929db27abd0c3d4f4059b (ID: 30428)Target victim website: formula50.it
by RansomFeed - https://r.zerozone.it/post/D0dnDTCCZDUT6AxAU
Ransomfeed
barberopietro.it
Ransomware group called lockbit5 claims attack for barberopietro.it. The target comes from Italy. We identify this attack with following hash code: 54e809905d8f49ac6a7322f4ef7f550c8e4b7020f824eb325586e5453c0d55bd (ID: 30432)Target victim website: barberopietro.it
by RansomFeed - https://r.zerozone.it/post/wFT4ncFA4eVpH4p3n
Ransomware group called lockbit5 claims attack for barberopietro.it. The target comes from Italy. We identify this attack with following hash code: 54e809905d8f49ac6a7322f4ef7f550c8e4b7020f824eb325586e5453c0d55bd (ID: 30432)Target victim website: barberopietro.it
by RansomFeed - https://r.zerozone.it/post/wFT4ncFA4eVpH4p3n
Ransomfeed
fac-srl.net
Ransomware group called lockbit5 claims attack for fac-srl.net. The target comes from Italy. We identify this attack with following hash code: 17c1dfdb4e86d4a01749c9a51db18409e75cdab6ce0cc0f6cc6b3a8f902256fa (ID: 30430)Target victim website: fac-srl.net
by RansomFeed - https://r.zerozone.it/post/EbEWaMySMWRtpq3fJ
Ransomware group called lockbit5 claims attack for fac-srl.net. The target comes from Italy. We identify this attack with following hash code: 17c1dfdb4e86d4a01749c9a51db18409e75cdab6ce0cc0f6cc6b3a8f902256fa (ID: 30430)Target victim website: fac-srl.net
by RansomFeed - https://r.zerozone.it/post/EbEWaMySMWRtpq3fJ
Ransomfeed
tazzetti.com
Ransomware group called dragonforce claims attack for tazzetti.com. The target comes from Italy. We identify this attack with following hash code: c436f370c95ac4ccf4191bf580b8fbb648babd4acc1857587d1ad8223609ca2c (ID: 30416)Target victim website: N/D
by RansomFeed - https://r.zerozone.it/post/QJuYuWj3nSA5PjAvx
Ransomware group called dragonforce claims attack for tazzetti.com. The target comes from Italy. We identify this attack with following hash code: c436f370c95ac4ccf4191bf580b8fbb648babd4acc1857587d1ad8223609ca2c (ID: 30416)Target victim website: N/D
by RansomFeed - https://r.zerozone.it/post/QJuYuWj3nSA5PjAvx
Ransomfeed
La Rete Neurale Sul Tavolo Operatorio | Signal Pirate
https://pinperepette.github.io/signal.pirate/articoli/la-rete-neurale-sul-tavolo-operatorio.html?t=d
https://pinperepette.github.io/signal.pirate/articoli/la-rete-neurale-sul-tavolo-operatorio.html?t=d
pinperepette.github.io
La Rete Neurale Sul Tavolo Operatorio | Signal Pirate
Mechanistic Interpretability: come aprire un LLM e leggere i suoi pensieri. GPT-2 small smontato pezzo per pezzo: 144 attention heads, circuito IOI a 26 head, Sparse Autoencoders, feature steering. 6 lab Python, tutto su CPU.
Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker – Krebs on Security
https://krebsonsecurity.com/2026/03/iran-backed-hackers-claim-wiper-attack-on-medtech-firm-stryker/
https://krebsonsecurity.com/2026/03/iran-backed-hackers-claim-wiper-attack-on-medtech-firm-stryker/
Krebs on Security
Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker
A hacktivist group with links to Iran's intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryker's largest hub outside of the United…
🔥1
Infrastrutture critiche: come la cybersecurity garantisce continuità operativa. Intervista a Sfoglietta (Gyala)
In un contesto geopolitico e tecnologico in cui le minacce informatiche sono sempre più articolate e complesse, la protezione delle infrastrutture critiche è diventata una priorità assoluta. Parliamo di tutti quei sistemi o reti che, se messi a rischio da attacchi cyber, possono impattare pesantemente sull’economia, sulla salute pubblica o [...]
by ForumPA - https://r.zerozone.it/post/rVfeVebun7aDUKVTC
In un contesto geopolitico e tecnologico in cui le minacce informatiche sono sempre più articolate e complesse, la protezione delle infrastrutture critiche è diventata una priorità assoluta. Parliamo di tutti quei sistemi o reti che, se messi a rischio da attacchi cyber, possono impattare pesantemente sull’economia, sulla salute pubblica o [...]
by ForumPA - https://r.zerozone.it/post/rVfeVebun7aDUKVTC
FPA
Infrastrutture critiche: la cybersecurity genera continuità operativa
In questa intervista, Gian Roberto Sfoglietta, CEO di Gyala, esplora come la cybersecurity protegga le infrastrutture critiche
bassignanicave.it
Ransomware group called lockbit5 claims attack for bassignanicave.it. The target comes from Italy. We identify this attack with following hash code: a06f0d97932009ff70190e3ec507ae9e615d9066b5e352649793f5879509f029 (ID: 30510)Target victim website: bassignanicave.it
by RansomFeed - https://r.zerozone.it/post/71wNrU6VPRybXhV9S
Ransomware group called lockbit5 claims attack for bassignanicave.it. The target comes from Italy. We identify this attack with following hash code: a06f0d97932009ff70190e3ec507ae9e615d9066b5e352649793f5879509f029 (ID: 30510)Target victim website: bassignanicave.it
by RansomFeed - https://r.zerozone.it/post/71wNrU6VPRybXhV9S
Ransomfeed
Giaroli S.A.S
Ransomware group called nightspire claims attack for Giaroli S.A.S. The target comes from Italy. We identify this attack with following hash code: 63823ac874df941496de488e8c00a53acf8e668695939847cb79e662e07aa9a7 (ID: 30492)Target victim website: giaroli.it
by RansomFeed - https://r.zerozone.it/post/MwjdUpRXhg1HC2qYB
Ransomware group called nightspire claims attack for Giaroli S.A.S. The target comes from Italy. We identify this attack with following hash code: 63823ac874df941496de488e8c00a53acf8e668695939847cb79e662e07aa9a7 (ID: 30492)Target victim website: giaroli.it
by RansomFeed - https://r.zerozone.it/post/MwjdUpRXhg1HC2qYB
Ransomfeed
paolidental.org
Ransomware group called lockbit5 claims attack for paolidental.org. The target comes from Italy. We identify this attack with following hash code: 30d30bd50c31c251b613e8dbd3a0d83caf1a2d8eff849ef79724351ecde7fc4c (ID: 30515)Target victim website: N/D
by RansomFeed - https://r.zerozone.it/post/8P09KPDkCMqNSfu0s
Ransomware group called lockbit5 claims attack for paolidental.org. The target comes from Italy. We identify this attack with following hash code: 30d30bd50c31c251b613e8dbd3a0d83caf1a2d8eff849ef79724351ecde7fc4c (ID: 30515)Target victim website: N/D
by RansomFeed - https://r.zerozone.it/post/8P09KPDkCMqNSfu0s
Ransomfeed