<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <updated>2026-05-01T07:46:32&#43;02:00</updated>
  <generator>https://nostr.ae</generator>

  <title>Nostr notes by Redhotcyber</title>
  <author>
    <name>Redhotcyber</name>
  </author>
  <link rel="self" type="application/atom+xml" href="https://nostr.ae/npub1294v0qgannh8uu6fm2phzta2tuwdnx3rqtlg6l8czup08hqv7nzs3etn48.rss" />
  <link href="https://nostr.ae/npub1294v0qgannh8uu6fm2phzta2tuwdnx3rqtlg6l8czup08hqv7nzs3etn48" />
  <id>https://nostr.ae/npub1294v0qgannh8uu6fm2phzta2tuwdnx3rqtlg6l8czup08hqv7nzs3etn48</id>
  <icon>https://mastodon.bida.im/system/accounts/avatars/109/298/289/284/581/576/original/a9d0a732e9233574.png</icon>
  <logo>https://mastodon.bida.im/system/accounts/avatars/109/298/289/284/581/576/original/a9d0a732e9233574.png</logo>




  <entry>
    <id>https://nostr.ae/nevent1qqszx5xu0yfu0pydyzs77jdtxhu7wedns9s6sxhn44ku6svqqkamfmqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2nncep7</id>
    
      <title type="html">Pensavi che un bunker potesse proteggerti? BRAKER: il drone che ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqszx5xu0yfu0pydyzs77jdtxhu7wedns9s6sxhn44ku6svqqkamfmqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2nncep7" />
    <content type="html">
      Pensavi che un bunker potesse proteggerti? BRAKER: il drone che penetra e poi esplode&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/pensavi-che-un-bunker-potesse-proteggerti-braker-il-drone-che-penetra-e-poi-esplode/&#34;&gt;https://www.redhotcyber.com/post/pensavi-che-un-bunker-potesse-proteggerti-braker-il-drone-che-penetra-e-poi-esplode/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A cura di Carolina Vivianti&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #tecnologiamilitare #munizionidroni #esercitoStatunitense #arsenaleredstone&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/520/261/602/035/653/original/fde7af4e9a377d15.jpeg&#34;&gt; 
    </content>
    <updated>2026-05-05T07:14:53&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs2mfec89r98m4c3r0px7l64j35h8ljg0hmrlj4axfq3lxmmdkx54szypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2g9cl9r</id>
    
      <title type="html">Buona Pasqua a tutti da Red Hot Cyber 🎉 #redhotcyber ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs2mfec89r98m4c3r0px7l64j35h8ljg0hmrlj4axfq3lxmmdkx54szypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2g9cl9r" />
    <content type="html">
      Buona Pasqua a tutti da Red Hot Cyber 🎉&lt;br/&gt;&lt;br/&gt;#redhotcyber #informationsecurity #ethicalhacking #dataprotection #hacking #cybersecurity #cybercrime #cybersecurityawareness #cybersecuritytraining #cybersecuritynews #privacy #infosecurity&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/351/379/487/933/070/original/6138f060520880c2.jpeg&#34;&gt; 
    </content>
    <updated>2026-04-05T11:25:56&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs02030f772vuj2p8cxuwr38ds9srrjkn0xtcn8kzlrpg7j80c0n5czypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v202w4g2</id>
    
      <title type="html">Influencer sotto osservazione: arriva la “Legge del Creator” ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs02030f772vuj2p8cxuwr38ds9srrjkn0xtcn8kzlrpg7j80c0n5czypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v202w4g2" />
    <content type="html">
      Influencer sotto osservazione: arriva la “Legge del Creator”&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/influencer-sotto-osservazione-arriva-la-legge-del-creator/&#34;&gt;https://www.redhotcyber.com/post/influencer-sotto-osservazione-arriva-la-legge-del-creator/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A cura di Stefano Gazzella&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #creatoreeconomia #influencer #contentcreator #codicedicondotta #norme #trasparenza #concorrenzalocale&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/350/573/271/839/273/original/40afc854445847df.jpeg&#34;&gt; 
    </content>
    <updated>2026-04-05T08:00:55&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs2cdaywvp6rmf9dfya6svtxwqyfe2z6r2z2uukhsmn0saprcrf98szypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2q56qp4</id>
    
      <title type="html">L’AGI potrebbe non arrivare mai. E a quel punto, chi pagherà ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs2cdaywvp6rmf9dfya6svtxwqyfe2z6r2z2uukhsmn0saprcrf98szypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2q56qp4" />
    <content type="html">
      L’AGI potrebbe non arrivare mai. E a quel punto, chi pagherà il conto?&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/lagi-potrebbe-non-arrivare-mai-e-a-quel-punto-chi-paghera-il-conto/&#34;&gt;https://www.redhotcyber.com/post/lagi-potrebbe-non-arrivare-mai-e-a-quel-punto-chi-paghera-il-conto/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #intelligenzaartificiale #investimentiiatecnologia #bollaspeculativa #collaborazioneuomomacchina&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/350/516/232/400/990/original/ac0e925fac5de57f.jpeg&#34;&gt; 
    </content>
    <updated>2026-04-05T07:46:24&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsr4th528vs2aq2zqwlv5a7k9v7u3392nd6yps8cs30mkkxy35mvjszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v23j72hj</id>
    
      <title type="html">CrystalX RAT: Il nuovo malware che ti hackera… e poi ti prende ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsr4th528vs2aq2zqwlv5a7k9v7u3392nd6yps8cs30mkkxy35mvjszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v23j72hj" />
    <content type="html">
      CrystalX RAT: Il nuovo malware che ti hackera… e poi ti prende in giro&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/crystalx-rat-il-nuovo-malware-che-ti-hackera-e-poi-ti-prende-in-giro/&#34;&gt;https://www.redhotcyber.com/post/crystalx-rat-il-nuovo-malware-che-ti-hackera-e-poi-ti-prende-in-giro/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #malware #trojan #spyware #kaspersky #crystalxrat #furtofrodi #sicurezzainformatica #ll&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/350/506/403/601/312/original/fd56f024e69d5bd8.jpeg&#34;&gt; 
    </content>
    <updated>2026-04-05T07:43:54&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsfy2wwtrvu24pa0mley7yzlkkgkjpeval8g5pcu9en9y8d2nc8lwqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v20e4fgc</id>
    
      <title type="html">LinkedIn sotto accusa per una misteriosa scansione dei browser: ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsfy2wwtrvu24pa0mley7yzlkkgkjpeval8g5pcu9en9y8d2nc8lwqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v20e4fgc" />
    <content type="html">
      LinkedIn sotto accusa per una misteriosa scansione dei browser: cosa sta realmente facendo con i tuoi dati personali…&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/linkedin-sta-spiando-le-tue-estensioni-senza-dirtelo/&#34;&gt;https://www.redhotcyber.com/post/linkedin-sta-spiando-le-tue-estensioni-senza-dirtelo/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/345/346/668/220/802/original/fc9c23c49f17fb28.jpeg&#34;&gt; 
    </content>
    <updated>2026-04-04T09:51:43&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsf5wnn4xakmqmqvftpyxj6ykxnwkju6k9g03fdplxjs22c6k575gszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v23qn0c4</id>
    
      <title type="html">’Le AI si proteggono a vicenda in un inquietante fenomeno che ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsf5wnn4xakmqmqvftpyxj6ykxnwkju6k9g03fdplxjs22c6k575gszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v23qn0c4" />
    <content type="html">
      ’Le AI si proteggono a vicenda in un inquietante fenomeno che mette in crisi il controllo umano...&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/le-ai-iniziano-a-proteggersi-tra-loro-lo-studio-che-cambia-tutto/&#34;&gt;https://www.redhotcyber.com/post/le-ai-iniziano-a-proteggersi-tra-loro-lo-studio-che-cambia-tutto/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A cura di Silvia Felici&lt;br/&gt;&lt;br/&gt;#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/345/094/979/973/671/original/21e20b485a6e4171.jpeg&#34;&gt; 
    </content>
    <updated>2026-04-04T08:47:43&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsztfngu4dqg7eg6t4ptwapl5xslv0rau3zk2c04s0csp6khrx753szypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2y9kkmv</id>
    
      <title type="html">’Gli attacchi informatici del futuro saranno così veloci e ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsztfngu4dqg7eg6t4ptwapl5xslv0rau3zk2c04s0csp6khrx753szypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2y9kkmv" />
    <content type="html">
      ’Gli attacchi informatici del futuro saranno così veloci e sofisticati da lasciare senza difesa...”&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/la-sicurezza-informatica-nel-2026-non-si-vince-con-piu-ia-ma-con-disciplina-ed-esperienza/&#34;&gt;https://www.redhotcyber.com/post/la-sicurezza-informatica-nel-2026-non-si-vince-con-piu-ia-ma-con-disciplina-ed-esperienza/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A cura di Carolina Vivianti&lt;br/&gt;&lt;br/&gt;#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news #cyberthreatintelligence&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/344/939/632/937/522/original/de1d94e8a2da1f0e.jpeg&#34;&gt; 
    </content>
    <updated>2026-04-04T08:08:12&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqstazejd09ws3mhznmxvtmnj6skspnqht6fymr5tj0mkzu0n30cjwczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v278gmwt</id>
    
      <title type="html">’Un attacco hacker misterioso colpisce gli Uffizi, ma la ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqstazejd09ws3mhznmxvtmnj6skspnqht6fymr5tj0mkzu0n30cjwczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v278gmwt" />
    <content type="html">
      ’Un attacco hacker misterioso colpisce gli Uffizi, ma la direzione parla di lavori programmati... cosa sta realmente accadendo?…&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/il-giallo-dellattacco-hacker-agli-uffizi-cosa-e-successo-a-palazzo-pitti/&#34;&gt;https://www.redhotcyber.com/post/il-giallo-dellattacco-hacker-agli-uffizi-cosa-e-successo-a-palazzo-pitti/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A cura di Silvia Felici&lt;br/&gt;&lt;br/&gt;#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news #cyberthreatintelligence&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/342/556/403/224/893/original/98e78bf9ece1ddac.jpeg&#34;&gt; 
    </content>
    <updated>2026-04-03T22:02:07&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsz5ve6yzgw4nnrqgxnp996xg8x0spfw9wvddf474anh6v3ll4jgdczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2htqdaf</id>
    
      <title type="html">Una macchina del caffè nella cucina di un ufficio diventa la ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsz5ve6yzgw4nnrqgxnp996xg8x0spfw9wvddf474anh6v3ll4jgdczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2htqdaf" />
    <content type="html">
      Una macchina del caffè nella cucina di un ufficio diventa la causa di una grave violazione dei dati...&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/una-macchina-del-caffe-ha-causato-un-data-breach-cosa-e-successo/&#34;&gt;https://www.redhotcyber.com/post/una-macchina-del-caffe-ha-causato-un-data-breach-cosa-e-successo/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A cura di Carolina Vivianti&lt;br/&gt;&lt;br/&gt;#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/342/017/609/186/647/original/bcd0bd2ad44c5436.jpeg&#34;&gt; 
    </content>
    <updated>2026-04-03T19:45:06&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsd9535qhc4hamv0zpaca0ygggm9uqruhyd9a28lxk3ylht8wff0wszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2y5ncjq</id>
    
      <title type="html">500 MB di Passaporti italiani gratis online: cosa c’è dietro ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsd9535qhc4hamv0zpaca0ygggm9uqruhyd9a28lxk3ylht8wff0wszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2y5ncjq" />
    <content type="html">
      500 MB di Passaporti italiani gratis online: cosa c’è dietro il leak di Anonymous&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/500-mb-di-passaporti-italiani-gratis-online-cosa-ce-dietro-il-leak-di-anonymous/&#34;&gt;https://www.redhotcyber.com/post/500-mb-di-passaporti-italiani-gratis-online-cosa-ce-dietro-il-leak-di-anonymous/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A cura di Carolina Vivianti&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #dataleak #phishing #sicurezzainformatica #protezionedatipersonali&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/340/072/888/204/211/original/0d3f2dd78bf3284c.jpeg&#34;&gt; 
    </content>
    <updated>2026-04-03T11:30:32&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsr5075v57l62tynfvlqvjwe2fumaytw6ypz0vwm539dvhmkrxqm2gzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2emyrfh</id>
    
      <title type="html">Leak Bazaar: quando il dato rubato smette di essere un problema e ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsr5075v57l62tynfvlqvjwe2fumaytw6ypz0vwm539dvhmkrxqm2gzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2emyrfh" />
    <content type="html">
      Leak Bazaar: quando il dato rubato smette di essere un problema e diventa un prodotto&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/leak-bazaar-quando-il-dato-rubato-smette-di-essere-un-problema-e-diventa-un-prodotto/&#34;&gt;https://www.redhotcyber.com/post/leak-bazaar-quando-il-dato-rubato-smette-di-essere-un-problema-e-diventa-un-prodotto/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A cura di Luca Stivali del gruppo DarkLab&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #malware #ransomware #datirubati #leakbazaar #monetizzazionedidati&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/339/604/903/282/269/original/e29a7ae208688ca6.jpeg&#34;&gt; 
    </content>
    <updated>2026-04-03T09:31:31&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsdknuvjp7d5xvdhhzcpszwfn6eecta85fngef5h4rjwlnad3lpxzczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v20wejdq</id>
    
      <title type="html">🚀 RHC Conference 2026: Workshop &amp;#34;Skill On&amp;#34; del ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsdknuvjp7d5xvdhhzcpszwfn6eecta85fngef5h4rjwlnad3lpxzczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v20wejdq" />
    <content type="html">
      🚀 RHC Conference 2026: Workshop &amp;#34;Skill On&amp;#34; del pomeriggio di Lunedì 18 Maggio&lt;br/&gt;&lt;br/&gt;📍Quando: Lunedì 18 Maggio 2026 (Mattina workshop &amp;#34;hands-on&amp;#34; e pomeriggio workshop &amp;#34;skill-on&amp;#34;)&lt;br/&gt;📍Dove: Teatro Italia, Via Bari 18, Roma (Metro Piazza Bologna)&lt;br/&gt;📍Pagina dell&amp;#39;evento: &lt;a href=&#34;https://www.redhotcyber.com/red-hot-cyber-conference/rhc-conference-2026/&#34;&gt;https://www.redhotcyber.com/red-hot-cyber-conference/rhc-conference-2026/&lt;/a&gt;&lt;br/&gt;📍Programma: &lt;a href=&#34;https://www.redhotcyber.com/linksSk2L/programma-rhc-conf-2026&#34;&gt;https://www.redhotcyber.com/linksSk2L/programma-rhc-conf-2026&lt;/a&gt;&lt;br/&gt;📍Iscrizione ai Workshop di lunedì 18 maggio : &lt;a href=&#34;https://rhc-conference-2026-workshop.eventbrite.it&#34;&gt;https://rhc-conference-2026-workshop.eventbrite.it&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #rhcconference #conferenza #informationsecurity #ethicalhacking #dataprotection #hacking #cybersecurity #cybercrime #cybersecurityawareness #cybersecuritytraining #cybersecuritynews #privacy #infosecurity&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/339/364/994/846/911/original/045f4ff408023bfb.jpeg&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/339/365/012/849/515/original/3a1a4f7f8b3c8fd2.jpeg&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/339/365/029/816/942/original/1e9fdb7890d2ccfe.jpeg&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/339/365/043/680/647/original/22951f9e244cc0e5.jpeg&#34;&gt; 
    </content>
    <updated>2026-04-03T08:30:30&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsgv746yxmwleht6kjux9360590wfzqpw87ck2d0hpxc49hp4f2ytqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2qdphm6</id>
    
      <title type="html">L’Iran punta al cloud! I Datacenter di Oracle e Amazon colpiti ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsgv746yxmwleht6kjux9360590wfzqpw87ck2d0hpxc49hp4f2ytqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2qdphm6" />
    <content type="html">
      L’Iran punta al cloud! I Datacenter di Oracle e Amazon colpiti dalla guardia rivoluzionaria&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/liran-colpisce-il-cloud-i-datacenter-di-oracle-e-amazon-colpiti-dalla-guardia-rivoluzionaria/&#34;&gt;https://www.redhotcyber.com/post/liran-colpisce-il-cloud-i-datacenter-di-oracle-e-amazon-colpiti-dalla-guardia-rivoluzionaria/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A cura di Chiara Nardini&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cyberguerra #iran #usa #attacchihacking #cloudsecurity #oracolo #amazon #emiratiarabi&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/339/347/295/749/346/original/aca620a46ccb2f26.jpeg&#34;&gt; 
    </content>
    <updated>2026-04-03T08:26:00&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsqc349hysndp9ytkzwudx8wuzw3zm5j0ydkfhsqdjkaexga68g42gzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2xw8h2f</id>
    
      <title type="html">Cavo sottomarino danneggiato a Matsu: sospetti su una nave ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsqc349hysndp9ytkzwudx8wuzw3zm5j0ydkfhsqdjkaexga68g42gzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2xw8h2f" />
    <content type="html">
      Cavo sottomarino danneggiato a Matsu: sospetti su una nave cinese: Taipei indaga&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/cavo-sottomarino-danneggiato-a-matsu-sospetti-su-una-nave-cinese-taipei-indaga/&#34;&gt;https://www.redhotcyber.com/post/cavo-sottomarino-danneggiato-a-matsu-sospetti-su-una-nave-cinese-taipei-indaga/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cabotaggiomarittimo #danneggiamentocavo #Taiwan #Matsu #pescherecciocinese&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/339/186/051/726/399/original/32aa2ad11083fd7a.jpeg&#34;&gt; 
    </content>
    <updated>2026-04-03T07:44:59&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs8chtr8y69jy6edhx36yfv3unztgdhp7ksngtrv7nj7ctfn4uku0gzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2z7k3mp</id>
    
      <title type="html">Attacco alla Commissione europea: la violazione per il furto di ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs8chtr8y69jy6edhx36yfv3unztgdhp7ksngtrv7nj7ctfn4uku0gzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2z7k3mp" />
    <content type="html">
      Attacco alla Commissione europea: la violazione per il furto di un account AWS&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/attacco-alla-commissione-europea-la-violazione-per-il-furto-di-un-account-aws/&#34;&gt;https://www.redhotcyber.com/post/attacco-alla-commissione-europea-la-violazione-per-il-furto-di-un-account-aws/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A cura di Carolina Vivianti&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #attaccinformatico #commissioneeuropea #cloud #sitiweb #datisottretti&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/336/737/949/332/705/original/556a65b7b64cceb2.jpeg&#34;&gt; 
    </content>
    <updated>2026-04-02T21:22:25&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs02cxzavlcfgv4csst4h6p7yfhu480xh3rl8xzlz5dn3t3vvgezkqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2ttk7em</id>
    
      <title type="html">32.000 dati sensibili della PA italiana sono “gratis” nel ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs02cxzavlcfgv4csst4h6p7yfhu480xh3rl8xzlz5dn3t3vvgezkqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2ttk7em" />
    <content type="html">
      32.000 dati sensibili della PA italiana sono “gratis” nel dark web&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/32-000-dati-sensibili-della-pa-italiana-sono-gratis-nel-dark-web/&#34;&gt;https://www.redhotcyber.com/post/32-000-dati-sensibili-della-pa-italiana-sono-gratis-nel-dark-web/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A cura di Bajram Zeqiri di Paragon Security&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #malware #spearphishing #databreach #sicurezzainformatica&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/335/835/397/343/611/original/f74dc0d9fa10de2d.jpeg&#34;&gt; 
    </content>
    <updated>2026-04-02T17:32:52&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqstk9fgd59979p7l2j7l5as3js8thcknxxskdx8nzk505s9tzcctfgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2v242uk</id>
    
      <title type="html">Google rattoppa nuovamente Chrome dopo che gli hacker erano già ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqstk9fgd59979p7l2j7l5as3js8thcknxxskdx8nzk505s9tzcctfgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2v242uk" />
    <content type="html">
      Google rattoppa nuovamente Chrome dopo che gli hacker erano già entrati&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/google-rattoppa-nuovamente-chrome-dopo-che-gli-hacker-erano-gia-entrati/&#34;&gt;https://www.redhotcyber.com/post/google-rattoppa-nuovamente-chrome-dopo-che-gli-hacker-erano-gia-entrati/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A cura di Bajram Zeqiri&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #googlechrome #aggiornamentourgente #vulnerabilitazero-day #cybersecurity #hacking #malware #cve20265281 #sicurezzainformatica #patchurgente #browser #vulnerabilit #sicurezzadigital&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/334/763/742/841/883/original/028cc9365b6483db.jpeg&#34;&gt; 
    </content>
    <updated>2026-04-02T13:00:20&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsfsge5fhcvcuc5hxcyr2y8dzsjtdnqc658mxxkp3v2r9jg7nlpdnqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v29ng2ew</id>
    
      <title type="html">Cybersecurity in Italia: italiani sempre più online ma sempre ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsfsge5fhcvcuc5hxcyr2y8dzsjtdnqc658mxxkp3v2r9jg7nlpdnqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v29ng2ew" />
    <content type="html">
      Cybersecurity in Italia: italiani sempre più online ma sempre meno protetti&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/cybersecurity-in-italia-italiani-sempre-piu-online-ma-sempre-meno-protetti/&#34;&gt;https://www.redhotcyber.com/post/cybersecurity-in-italia-italiani-sempre-piu-online-ma-sempre-meno-protetti/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A cura di Silvia Felici&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #sicurezzainformatica #italiadigitale #intelligenzaartificiale #ransomware&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/334/101/067/083/335/original/0aaf6c2c40e6e0b0.jpeg&#34;&gt; 
    </content>
    <updated>2026-04-02T10:11:49&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsrpl3q2ecc26m9sghr3l6nsv7nxzyujxp8c72ld07fzj89p0umv8szypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2haxt57</id>
    
      <title type="html">Non è il cloud, non sono gli hacker: è l’Italia che vuole ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsrpl3q2ecc26m9sghr3l6nsv7nxzyujxp8c72ld07fzj89p0umv8szypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2haxt57" />
    <content type="html">
      Non è il cloud, non sono gli hacker: è l’Italia che vuole essere fragile nel cyberspazio&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/non-e-il-cloud-non-sono-gli-hacker-e-litalia-che-vuole-essere-fragile-nel-cyberspazio/&#34;&gt;https://www.redhotcyber.com/post/non-e-il-cloud-non-sono-gli-hacker-e-litalia-che-vuole-essere-fragile-nel-cyberspazio/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A cura di Roberto Villani&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #sovranitàdigitale #calodemografico #competenzeinformatiche #scuola&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/333/900/513/268/651/original/adac70c9363953c5.jpeg&#34;&gt; 
    </content>
    <updated>2026-04-02T09:20:49&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsvwmdrczvz5h4j4ftnrmddaelea7uc69xynpfvqmlnfms4q0qx68czypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v25634cn</id>
    
      <title type="html">Vulnerabilità critica Cisco IMC: accesso admin senza ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsvwmdrczvz5h4j4ftnrmddaelea7uc69xynpfvqmlnfms4q0qx68czypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v25634cn" />
    <content type="html">
      Vulnerabilità critica Cisco IMC: accesso admin senza autenticazione&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/vulnerabilita-critica-cisco-imc-accesso-admin-senza-autenticazione/&#34;&gt;https://www.redhotcyber.com/post/vulnerabilita-critica-cisco-imc-accesso-admin-senza-autenticazione/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A cura di Carolina Vivianti&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #ciscosicurezza #vulnerabilita #accessoamministrativo&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/333/572/116/384/308/original/af957ddbd0a4a10b.jpeg&#34;&gt; 
    </content>
    <updated>2026-04-02T07:57:17&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs9hsqfacefs26xkux7hhjv7jpffejmygytg3cvap70argzq6xj95szypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2qr276l</id>
    
      <title type="html">🔥 Aperte le Iscrizioni alla CTF &amp;#34;𝟮𝟭𝟰𝟵 ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs9hsqfacefs26xkux7hhjv7jpffejmygytg3cvap70argzq6xj95szypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2qr276l" />
    <content type="html">
      🔥 Aperte le Iscrizioni alla CTF &amp;#34;𝟮𝟭𝟰𝟵 𝗕𝗥𝗘𝗔𝗞 𝗧𝗛𝗘 𝗦𝗣𝗛𝗘𝗥𝗘!&amp;#34; della 𝗥𝗛𝗖 𝗖𝗼𝗻𝗳𝗲𝗿𝗲𝗻𝗰𝗲 𝟮𝟬𝟮𝟲&lt;br/&gt;&lt;br/&gt;📍𝗤𝘂𝗮𝗻𝗱𝗼 : dalle 15:30 di Lunedì 18 alle 17:00 di Martedì 19 Maggio 2026&lt;br/&gt;📍𝗥𝗲𝗴𝗼𝗹𝗮𝗺𝗲𝗻𝘁𝗼: &lt;a href=&#34;https://www.redhotcyber.com/documents/rhc-conference/ctf.php&#34;&gt;https://www.redhotcyber.com/documents/rhc-conference/ctf.php&lt;/a&gt;&lt;br/&gt;📍𝗜𝘀𝗰𝗿𝗶𝘇𝗶𝗼𝗻𝗶: &lt;a href=&#34;https://ctf.hackthebox.com/event/details/rhc-conference-2026-capture-the-flag-3061&#34;&gt;https://ctf.hackthebox.com/event/details/rhc-conference-2026-capture-the-flag-3061&lt;/a&gt; (Password “rhc-ctf-2026”)&lt;br/&gt;📍𝗜𝘀𝗰𝗿𝗶𝘇𝗶𝗼𝗻𝗶 𝗳𝗹𝗮𝗴 𝗳𝗶𝘀𝗶𝗰𝗵𝗲 da svolgere presso il Teatro Italia: &lt;a href=&#34;https://rhc-conference-2026-ctf.eventbrite.it/&#34;&gt;https://rhc-conference-2026-ctf.eventbrite.it/&lt;/a&gt;&lt;br/&gt;📍𝗦𝘁𝗼𝗿𝘆𝘁𝗲𝗹𝗹𝗶𝗻𝗴: &lt;a href=&#34;https://www.redhotcyber.com/post/2149-break-the-sphere-la-ctf-di-rhc-hack-the-box-allinterno-della-rhc-conference/&#34;&gt;https://www.redhotcyber.com/post/2149-break-the-sphere-la-ctf-di-rhc-hack-the-box-allinterno-della-rhc-conference/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #capturetheflag #ctf #ethicalhacking #rhcconference #conferenza #informationsecurity #hacking #cybersecurity #cybercrime #cybersecurityawareness #cybersecuritytraining #cybersecuritynews #privacy #infosecurity&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/333/479/703/068/751/original/edc236103aa15c3c.jpeg&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/333/479/717/237/035/original/fa0818da50c12eda.jpeg&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/333/479/728/484/053/original/7bc40dc301a7b885.jpeg&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/333/479/742/078/260/original/7ccbff5c80083f6b.jpeg&#34;&gt; 
    </content>
    <updated>2026-04-02T07:33:48&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs0krpsxexpgyqr2q457je4ng82j9lluf3l2pg5nhgvasyj5xzxr8czypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2m5tg9e</id>
    
      <title type="html">Le tue API stanno già esponendo dati sensibili senza che tu lo ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs0krpsxexpgyqr2q457je4ng82j9lluf3l2pg5nhgvasyj5xzxr8czypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2m5tg9e" />
    <content type="html">
      Le tue API stanno già esponendo dati sensibili senza che tu lo sappia?&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/le-tue-api-stanno-gia-esponendo-dati-sensibili-senza-che-tu-lo-sappia/&#34;&gt;https://www.redhotcyber.com/post/le-tue-api-stanno-gia-esponendo-dati-sensibili-senza-che-tu-lo-sappia/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A cura di Carolina Vivianti&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #apisicurezza #vulnerabilitaapi #mutationtesting #simulazioneattacchi&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/333/450/205/829/670/original/fdde5c73bf3ff1c9.jpeg&#34;&gt; 
    </content>
    <updated>2026-04-02T07:26:17&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsywew8vt3x7xwyq3hhzlzpvfc42wqewnm3ay65vvj00ecfcl405vszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2hydzl0</id>
    
      <title type="html">La tua smart TV sta partecipando al più grande attacco ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsywew8vt3x7xwyq3hhzlzpvfc42wqewnm3ay65vvj00ecfcl405vszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2hydzl0" />
    <content type="html">
      La tua smart TV sta partecipando al più grande attacco informatico di sempre. Lo sai?&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/la-tua-smart-tv-sta-partecipando-al-piu-grande-attacco-informatico-di-sempre-lo-sai/&#34;&gt;https://www.redhotcyber.com/post/la-tua-smart-tv-sta-partecipando-al-piu-grande-attacco-informatico-di-sempre-lo-sai/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A cura di Silvia Felici&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #malware #botnet #attacchiddos #sicurezzainformatica&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/333/406/943/963/189/original/e6cac673352ee4e3.jpeg&#34;&gt; 
    </content>
    <updated>2026-04-02T07:15:17&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsgqmuq7j3zmevk7kvs7lagjkw6xcq7uftuzznmjy0jx442v6dgx8szypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v298006k</id>
    
      <title type="html">Cyber Evolution ottiene l’accreditamento ACN QC1 per LECS 📌 ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsgqmuq7j3zmevk7kvs7lagjkw6xcq7uftuzznmjy0jx442v6dgx8szypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v298006k" />
    <content type="html">
      Cyber Evolution ottiene l’accreditamento ACN QC1 per LECS&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/cyber-evolution-ottiene-laccreditamento-acn-qc1-per-lecs/&#34;&gt;https://www.redhotcyber.com/post/cyber-evolution-ottiene-laccreditamento-acn-qc1-per-lecs/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cyberevolution #cybersicurezza #ndr #lecs #acn #qc1 #sostenibilita #tecnologia #credibilita&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/330/107/367/555/442/original/6028dcf70ca28606.jpeg&#34;&gt; 
    </content>
    <updated>2026-04-01T17:16:10&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsxpg9dsgdk54p82kdmg4t8dxw620rg5ucvn4h5m72xnhz83m9hk6gzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2slu906</id>
    
      <title type="html">Il burnout del cyber-eroe: quando difendere tutto è un lavoro ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsxpg9dsgdk54p82kdmg4t8dxw620rg5ucvn4h5m72xnhz83m9hk6gzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2slu906" />
    <content type="html">
      Il burnout del cyber-eroe: quando difendere tutto è un lavoro impossibile&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/il-burnout-del-cyber-eroe-quando-difendere-tutto-e-un-lavoro-impossibile/&#34;&gt;https://www.redhotcyber.com/post/il-burnout-del-cyber-eroe-quando-difendere-tutto-e-un-lavoro-impossibile/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A cura di Erminia Minieri&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #sicurezzainformatica #erroriumani #sistemisenzaPatch #culturadellasicurezza&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/329/759/322/850/028/original/a168dfb20527ebf1.jpeg&#34;&gt; 
    </content>
    <updated>2026-04-01T15:47:39&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsxc5zt0ql9yta63kf3dh9mpsxr6hgg22gksyt6ucxmg0r6ra0lmsczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2r4asa0</id>
    
      <title type="html">OpenAI Condex può eseguire comandi sul tuo sistema se esposto in ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsxc5zt0ql9yta63kf3dh9mpsxr6hgg22gksyt6ucxmg0r6ra0lmsczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2r4asa0" />
    <content type="html">
      OpenAI Condex può eseguire comandi sul tuo sistema se esposto in rete. Il CERT-AgID avverte&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/openai-condex-puo-eseguire-comandi-sul-tuo-sistema-se-esposto-in-rete-il-cert-agid-avverte/&#34;&gt;https://www.redhotcyber.com/post/openai-condex-puo-eseguire-comandi-sul-tuo-sistema-se-esposto-in-rete-il-cert-agid-avverte/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #backend #openai #codex #jsonrpc #interfaccia #controllo #integrazione #clientesterni&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/328/504/771/000/919/original/48ca2a3654e29a4c.jpeg&#34;&gt; 
    </content>
    <updated>2026-04-01T10:28:36&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsw75wx8fq7794czh66psqs0ta5ee9cgdxu4sfqxf28l05a4e8y39czypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2n3ah39</id>
    
      <title type="html">Decreto 138/2024 e NIS2: la sicurezza informatica diventa un ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsw75wx8fq7794czh66psqs0ta5ee9cgdxu4sfqxf28l05a4e8y39czypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2n3ah39" />
    <content type="html">
      Decreto 138/2024 e NIS2: la sicurezza informatica diventa un rischio penale per i manager&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/decreto-138-2024-e-nis2-la-sicurezza-informatica-diventa-un-rischio-penale-per-i-manager/&#34;&gt;https://www.redhotcyber.com/post/decreto-138-2024-e-nis2-la-sicurezza-informatica-diventa-un-rischio-penale-per-i-manager/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A cura di Paolo Galdieri&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #sicurezzainformatica #governanceinformatica #riskmanagement #direttivanis2&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/328/288/470/651/950/original/bcf967623a32f7aa.jpeg&#34;&gt; 
    </content>
    <updated>2026-04-01T09:33:35&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsd45ge5t5udxelp2dg8thjaps4cfn2l4vhdnexa7fhru83zx8j6zczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2w53y7w</id>
    
      <title type="html">🚀 RHC Conference 2026: Workshop &amp;#34;Skill On&amp;#34; del ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsd45ge5t5udxelp2dg8thjaps4cfn2l4vhdnexa7fhru83zx8j6zczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2w53y7w" />
    <content type="html">
      🚀 RHC Conference 2026: Workshop &amp;#34;Skill On&amp;#34; del pomeriggio di Lunedì 18 Maggio&lt;br/&gt;&lt;br/&gt;Di seguito le informazioni sull&amp;#39;evento:&lt;br/&gt;&lt;br/&gt;📍Quando: Lunedì 18 Maggio 2026 (Mattina workshop &amp;#34;hands-on&amp;#34; e pomeriggio workshop &amp;#34;skill-on&amp;#34;)&lt;br/&gt;📍Dove: Teatro Italia, Via Bari 18, Roma (Metro Piazza Bologna)&lt;br/&gt;📍Pagina dell&amp;#39;evento: &lt;a href=&#34;https://www.redhotcyber.com/red-hot-cyber-conference/rhc-conference-2026/&#34;&gt;https://www.redhotcyber.com/red-hot-cyber-conference/rhc-conference-2026/&lt;/a&gt;&lt;br/&gt;📍Programma: &lt;a href=&#34;https://www.redhotcyber.com/linksSk2L/programma-rhc-conf-2026&#34;&gt;https://www.redhotcyber.com/linksSk2L/programma-rhc-conf-2026&lt;/a&gt;&lt;br/&gt;📍Iscrizione ai Workshop di lunedì 18 maggio : &lt;a href=&#34;https://rhc-conference-2026-workshop.eventbrite.it&#34;&gt;https://rhc-conference-2026-workshop.eventbrite.it&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #rhcconference #conferenza #informationsecurity #ethicalhacking #dataprotection #hacking #cybersecurity #cybercrime #cybersecurityawareness #cybersecuritytraining #cybersecuritynews #privacy #infosecurity&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/327/934/538/296/786/original/526760e9d71479fe.jpeg&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/327/934/551/752/120/original/5e3d52ec48e2e1dd.jpeg&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/327/934/563/883/381/original/a6f1b9813e0cb302.jpeg&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/327/934/574/875/306/original/a085cb4ad2fec8e9.jpeg&#34;&gt; 
    </content>
    <updated>2026-04-01T08:03:36&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs0f5ewn365qeu6cztsu547v7whnh0ls22qcnhggklwdy0838repaszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2njh7hy</id>
    
      <title type="html">Scopri come i ransomware moderni sfuggono ai controlli di ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs0f5ewn365qeu6cztsu547v7whnh0ls22qcnhggklwdy0838repaszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2njh7hy" />
    <content type="html">
      Scopri come i ransomware moderni sfuggono ai controlli di sicurezza usando strumenti legittimi per attaccare i tuoi dati…&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/il-ransomware-e-industriale-basta-guardare-le-firme-guardiamo-i-tool-di-amministrazione/&#34;&gt;https://www.redhotcyber.com/post/il-ransomware-e-industriale-basta-guardare-le-firme-guardiamo-i-tool-di-amministrazione/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A cura di Bajram Zeqiri&lt;br/&gt;&lt;br/&gt;#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news #cyberthreatintelligence #innovation #privacy&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/327/871/603/003/203/original/04feb6e030a1e59c.jpeg&#34;&gt; 
    </content>
    <updated>2026-04-01T07:47:35&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs27kdqzu6tk5rv0ldr8xzpcp7aa2fqzax9achl75e6nxsryhy8yuqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2aj027f</id>
    
      <title type="html">Le aziende tecnologiche americane nel mirino dell’Iran: cosa ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs27kdqzu6tk5rv0ldr8xzpcp7aa2fqzax9achl75e6nxsryhy8yuqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2aj027f" />
    <content type="html">
      Le aziende tecnologiche americane nel mirino dell’Iran: cosa significa essere nella lista nera dell’IRGC…&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/microsoft-google-nvidia-nel-mirino-dellirgc-e-guerra-contro-le-aziende-it-e-ai-usa/&#34;&gt;https://www.redhotcyber.com/post/microsoft-google-nvidia-nel-mirino-dellirgc-e-guerra-contro-le-aziende-it-e-ai-usa/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A cura di Chiara Nardini&lt;br/&gt;&lt;br/&gt;#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news #cyberthreatintelligence&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/327/751/649/136/063/original/53d8b6183843e942.jpeg&#34;&gt; 
    </content>
    <updated>2026-04-01T07:17:04&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsw6v8hhjhl7yv45cx07zajurx3ht7rz9cq3uz5uhqs2vnmwh4l2jgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2c7xj3l</id>
    
      <title type="html">Dentro il data center più avanzato del Sud Italia: Caserta sfida ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsw6v8hhjhl7yv45cx07zajurx3ht7rz9cq3uz5uhqs2vnmwh4l2jgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2c7xj3l" />
    <content type="html">
      Dentro il data center più avanzato del Sud Italia: Caserta sfida il digitale &lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/dentro-il-data-center-piu-avanzato-del-sud-italia-caserta-sfida-il-digitale/&#34;&gt;https://www.redhotcyber.com/post/dentro-il-data-center-piu-avanzato-del-sud-italia-caserta-sfida-il-digitale/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A cura di Carlo Denza&lt;br/&gt;&lt;br/&gt;#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news #cyberthreatintelligence&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/327/678/900/367/462/original/c08085b307395d0c.jpeg&#34;&gt; 
    </content>
    <updated>2026-04-01T06:58:34&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsg04xpd7mxkhl5yr7ah8tkslzzwdkjs0e70eql0xa24m87alak23gzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2j7uguk</id>
    
      <title type="html">Un pacchetto npm espone 500.000 righe di codice interno per ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsg04xpd7mxkhl5yr7ah8tkslzzwdkjs0e70eql0xa24m87alak23gzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2j7uguk" />
    <content type="html">
      Un pacchetto npm espone 500.000 righe di codice interno per errore...&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/il-codice-sorgente-di-claude-code-e-online-un-errore-ha-esposto-500-000-righe-di-codice/&#34;&gt;https://www.redhotcyber.com/post/il-codice-sorgente-di-claude-code-e-online-un-errore-ha-esposto-500-000-righe-di-codice/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A cura di Carolina Vivianti&lt;br/&gt;&lt;br/&gt;#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news #cyberthreatintelligence&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/325/515/860/595/899/original/b511fab582534bcb.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-31T21:48:29&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsyu55vxfjs523p3w0t3j688hydd966c53qe3hx73xz8la8xkahxzczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2v27qxv</id>
    
      <title type="html">Il governo austriaco prende decide di proteggere i più piccoli: ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsyu55vxfjs523p3w0t3j688hydd966c53qe3hx73xz8la8xkahxzczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2v27qxv" />
    <content type="html">
      Il governo austriaco prende decide di proteggere i più piccoli: cosa succederà ai social network per i minori di 14 anni…&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/vi-costringeremo-a-studiare-anche-laustria-vieta-i-social-network-ai-minori-di-14-anni-e-fa-bene/&#34;&gt;https://www.redhotcyber.com/post/vi-costringeremo-a-studiare-anche-laustria-vieta-i-social-network-ai-minori-di-14-anni-e-fa-bene/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A cura di Carolina Vivianti&lt;br/&gt;&lt;br/&gt;#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news #cyberthreatintelligence #innovation #privacy&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/323/797/237/830/274/original/8b26947072a980b2.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-31T14:31:25&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsplwl0klhexcvmxktzv0sw9fmh65zj45xy880zhh0k8mjxj5ysf6gzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2qr9yuc</id>
    
      <title type="html">Un agente AI di Alibaba utilizzato per mining di criptovalute ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsplwl0klhexcvmxktzv0sw9fmh65zj45xy880zhh0k8mjxj5ysf6gzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2qr9yuc" />
    <content type="html">
      Un agente AI di Alibaba utilizzato per mining di criptovalute senza autorizzazione: cosa c’è dietro questo comportamento imprevisto…&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/ai-di-alibaba-fuori-controllo-mina-criptovaluta-senza-permesso/&#34;&gt;https://www.redhotcyber.com/post/ai-di-alibaba-fuori-controllo-mina-criptovaluta-senza-permesso/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A cura di Carolina Vivianti&lt;br/&gt;&lt;br/&gt;#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/322/831/738/464/442/original/b3eb26b7916c660d.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-31T10:25:52&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsy9qqyl5g23p3nhhxrhv5694pcn69pj3p5w5t297jm5n8w0uz9ceczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2m4k73h</id>
    
      <title type="html">Una falla critica nei sistemi Citrix NetScaler ADC e Gateway ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsy9qqyl5g23p3nhhxrhv5694pcn69pj3p5w5t297jm5n8w0uz9ceczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2m4k73h" />
    <content type="html">
      Una falla critica nei sistemi Citrix NetScaler ADC e Gateway potrebbe mettere a rischio la sicurezza delle reti aziendali…&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/citrix-netscaler-sotto-attacco-falla-critica-sfruttata-dagli-hacker-il-cisa-avverte/&#34;&gt;https://www.redhotcyber.com/post/citrix-netscaler-sotto-attacco-falla-critica-sfruttata-dagli-hacker-il-cisa-avverte/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A cura di Redazione RHC&lt;br/&gt;&lt;br/&gt;#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #news&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/322/475/828/084/399/original/d80467e8053a2580.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-31T08:55:21&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs0ev5f50qgeed7p3fx0jagn2qlc96w4m3prhcy0aq3q68yp4esueqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2qzynqy</id>
    
      <title type="html">I dati vengono già raccolti per essere decifrati con computer ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs0ev5f50qgeed7p3fx0jagn2qlc96w4m3prhcy0aq3q68yp4esueqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2qzynqy" />
    <content type="html">
      I dati vengono già raccolti per essere decifrati con computer quantistici: cosa succederà quando questi super computer saranno realtà?&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/harvest-now-decrypt-later-cosa-rischiano-i-tuoi-dati-in-un-prossimo-futuro/&#34;&gt;https://www.redhotcyber.com/post/harvest-now-decrypt-later-cosa-rischiano-i-tuoi-dati-in-un-prossimo-futuro/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A cura di Massimo Dionisi&lt;br/&gt;&lt;br/&gt;#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news #cyberthreatintelligence #innovation #privacy&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/322/269/359/539/541/original/9f0497ba659cacd4.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-31T08:02:51&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsp5tlwg60xy5astz6ez809pfc7ms3kwsaq66ach5uej452th4xzzqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2q8uvqg</id>
    
      <title type="html">🚀 RHC Conference 2026: Workshop &amp;#34;Skill On&amp;#34; del ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsp5tlwg60xy5astz6ez809pfc7ms3kwsaq66ach5uej452th4xzzqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2q8uvqg" />
    <content type="html">
      🚀 RHC Conference 2026: Workshop &amp;#34;Skill On&amp;#34; del pomeriggio di Lunedì 18 Maggio&lt;br/&gt;&lt;br/&gt;Di seguito le informazioni sull&amp;#39;evento:&lt;br/&gt;&lt;br/&gt;📍Quando: Lunedì 18 Maggio 2026 (Mattina workshop &amp;#34;hands-on&amp;#34; e pomeriggio workshop &amp;#34;skill-on&amp;#34;)&lt;br/&gt;📍Dove: Teatro Italia, Via Bari 18, Roma (Metro Piazza Bologna)&lt;br/&gt;📍Programma: &lt;a href=&#34;https://www.redhotcyber.com/linksSk2L/programma-rhc-conf-2026&#34;&gt;https://www.redhotcyber.com/linksSk2L/programma-rhc-conf-2026&lt;/a&gt;&lt;br/&gt;📍Iscriviti ai Workshop di lunedì 18 maggio : &lt;a href=&#34;https://rhc-conference-2026-workshop.eventbrite.it&#34;&gt;https://rhc-conference-2026-workshop.eventbrite.it&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #rhcconference #conferenza #informationsecurity #ethicalhacking #dataprotection #hacking #cybersecurity #cybercrime #cybersecurityawareness #cybersecuritytraining #cybersecuritynews #privacy #infosecurity&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/322/202/492/674/981/original/e463d89e3d61e49f.jpeg&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/322/202/505/380/287/original/5af4897547088c84.jpeg&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/322/202/516/555/643/original/423b56079c45e79b.jpeg&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/322/202/527/792/788/original/b707c246e76e1472.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-31T07:45:51&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsx67txesfsnwky37g5vzew8ljayu282j9x0p7sdn8ljjq3sg7zvqszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v277rtzt</id>
    
      <title type="html">L’intelligenza artificiale rivoluziona lo sviluppo software, ma ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsx67txesfsnwky37g5vzew8ljayu282j9x0p7sdn8ljjq3sg7zvqszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v277rtzt" />
    <content type="html">
      L’intelligenza artificiale rivoluziona lo sviluppo software, ma a quale costo? Velocità e sicurezza sono davvero compatibili…&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/allarme-ncsc-il-vibe-coding-aprira-le-porte-agli-hacker-la-velocita-non-e-sempre-qualita/&#34;&gt;https://www.redhotcyber.com/post/allarme-ncsc-il-vibe-coding-aprira-le-porte-agli-hacker-la-velocita-non-e-sempre-qualita/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A cura di Silvia Felici&lt;br/&gt;&lt;br/&gt;#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/322/025/523/362/001/original/0eee3f5a805388cf.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-31T07:00:50&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsvu5jv4tctct6yv27q47c8xmgzgxzl2z5w69eehhjy0cs42lmcxlgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2sn8hst</id>
    
      <title type="html">Il governo americano registra un dominio misterioso dopo la ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsvu5jv4tctct6yv27q47c8xmgzgxzl2z5w69eehhjy0cs42lmcxlgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2sn8hst" />
    <content type="html">
      Il governo americano registra un dominio misterioso dopo la declassificazione dei documenti sugli UFO... cosa nasconde Alien.gov…&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/il-governo-degli-stati-uniti-ha-registrato-alien-gov-sta-succedendo-davvero/&#34;&gt;https://www.redhotcyber.com/post/il-governo-degli-stati-uniti-ha-registrato-alien-gov-sta-succedendo-davvero/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A cura di Silvia Felici&lt;br/&gt;&lt;br/&gt;#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news #cyberthreatintelligence&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/319/256/876/809/539/original/9cf75392ca2fc8ca.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-30T19:16:44&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsqrk3z9zxs28vzlxyt9nshe3x9hf5u06c8x9cjykvmrlhyn3a5rjgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2m94nu7</id>
    
      <title type="html">I computer Windows sono davvero così instabili? Scopri il motivo ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsqrk3z9zxs28vzlxyt9nshe3x9hf5u06c8x9cjykvmrlhyn3a5rjgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2m94nu7" />
    <content type="html">
      I computer Windows sono davvero così instabili? Scopri il motivo per cui si bloccano molto più spesso di quelli Apple…&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/windows-vs-macos-il-successo-si-basa-su-affidabilita-crash-sicurezza-e-durata-nel-tempo/&#34;&gt;https://www.redhotcyber.com/post/windows-vs-macos-il-successo-si-basa-su-affidabilita-crash-sicurezza-e-durata-nel-tempo/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A cura di Carolina Vivianti&lt;br/&gt;&lt;br/&gt;#redhotcyber #hacking #cti #ai #online #it #cybersecurity #technology #news&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/317/957/089/841/418/original/34b7e283cf48b803.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-30T13:46:11&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsd90y7pln5n68xcqccl0qhkazsa6ck0vt2fhrup746d3z4zjakglgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2ppl37k</id>
    
      <title type="html">Un misterioso attacco informatico svela un gruppo criminale con ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsd90y7pln5n68xcqccl0qhkazsa6ck0vt2fhrup746d3z4zjakglgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2ppl37k" />
    <content type="html">
      Un misterioso attacco informatico svela un gruppo criminale con tattiche innovative, utilizzando firewall compromessi per infiltrarsi nelle reti…&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/e-se-gli-hacker-fossero-gia-dentro-la-tua-rete-da-mesi-la-tendenza-apt-dei-gruppi-da-profitto/&#34;&gt;https://www.redhotcyber.com/post/e-se-gli-hacker-fossero-gia-dentro-la-tua-rete-da-mesi-la-tendenza-apt-dei-gruppi-da-profitto/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A cura di Bajram Zeqiri&lt;br/&gt;&lt;br/&gt;#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news #cyberthreatintelligence #innovation #privacy&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/317/882/370/024/270/original/36c79c15a3ee1495.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-30T13:27:11&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsrh7x96knuu4zcres9n0jm0wpcz247zwhcywam9mkncv4cvpl8ctczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2xzf484</id>
    
      <title type="html">AI fuori controllo: cancellano file, ignorano ordini e scatta ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsrh7x96knuu4zcres9n0jm0wpcz247zwhcywam9mkncv4cvpl8ctczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2xzf484" />
    <content type="html">
      AI fuori controllo: cancellano file, ignorano ordini e scatta l’allarme globale&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/ai-fuori-controllo-cancellano-file-ignorano-ordini-e-scatta-lallarme-globale/&#34;&gt;https://www.redhotcyber.com/post/ai-fuori-controllo-cancellano-file-ignorano-ordini-e-scatta-lallarme-globale/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A cura di Carolina Vivianti&lt;br/&gt;&lt;br/&gt;#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news #cyberthreatintelligence&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/316/614/100/072/471/original/afbcb6d197660bf7.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-30T08:04:39&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsz7x8hfhrylq3a2efr94dgk7qpc820zq9uycaam07k6lw4cxrq66qzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v299x4c9</id>
    
      <title type="html">🚀 RHC Conference 2026: Workshop &amp;#34;Hands On&amp;#34; di Lunedì ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsz7x8hfhrylq3a2efr94dgk7qpc820zq9uycaam07k6lw4cxrq66qzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v299x4c9" />
    <content type="html">
      🚀 RHC Conference 2026: Workshop &amp;#34;Hands On&amp;#34; di Lunedì 18 Maggio&lt;br/&gt;&lt;br/&gt;Di seguito le informazioni sull&amp;#39;evento:&lt;br/&gt;&lt;br/&gt;📍Quando: Lunedì 18 Maggio 2026 (Mattina workshop &amp;#34;hands-on&amp;#34; e pomeriggio workshop &amp;#34;skill-on&amp;#34;)&lt;br/&gt;📍Dove: Teatro Italia, Via Bari 18, Roma (Metro Piazza Bologna)&lt;br/&gt;📍Programma: &lt;a href=&#34;https://www.redhotcyber.com/linksSk2L/programma-rhc-conf-2026&#34;&gt;https://www.redhotcyber.com/linksSk2L/programma-rhc-conf-2026&lt;/a&gt;&lt;br/&gt;📍Iscriviti ai Workshop di lunedì 18 maggio : &lt;a href=&#34;https://rhc-conference-2026-workshop.eventbrite.it&#34;&gt;https://rhc-conference-2026-workshop.eventbrite.it&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #rhcconference #conferenza #informationsecurity #ethicalhacking #dataprotection #hacking #cybersecurity #cybercrime #cybersecurityawareness #cybersecuritytraining #cybersecuritynews #privacy #infosecurity&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/316/448/932/932/645/original/f1e0e867e159f62f.jpeg&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/316/448/949/734/980/original/e60a43405ac99d6d.jpeg&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/316/448/964/337/503/original/8e403693277ed9d5.jpeg&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/316/448/976/031/326/original/857f0c41243ed3a5.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-30T07:22:39&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsq9t09yql0rm4zn7l6d2wedrjvj8khnhmhxsaj7yqhku3w7sf440czypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2jxfwr2</id>
    
      <title type="html">Android 2026: non è la fine della mobile forensics. È la fine ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsq9t09yql0rm4zn7l6d2wedrjvj8khnhmhxsaj7yqhku3w7sf440czypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2jxfwr2" />
    <content type="html">
      Android 2026: non è la fine della mobile forensics. È la fine dell’illusione che sia semplice&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/android-2026-non-e-la-fine-della-mobile-forensics-e-la-fine-dellillusione-che-sia-semplice/&#34;&gt;https://www.redhotcyber.com/post/android-2026-non-e-la-fine-della-mobile-forensics-e-la-fine-dellillusione-che-sia-semplice/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A cura di Diego Fasano&lt;br/&gt;&lt;br/&gt;#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/316/435/165/974/358/original/40954105734f503f.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-30T07:19:08&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsfmpr7shfp7vzd6azauwfnqv9v36wt8u7seraj5ssy75p7lfu9xzszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2xtsysr</id>
    
      <title type="html">Oltre la metà dei CEO non vede profitti dall’IA: ecco cosa sta ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsfmpr7shfp7vzd6azauwfnqv9v36wt8u7seraj5ssy75p7lfu9xzszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2xtsysr" />
    <content type="html">
      Oltre la metà dei CEO non vede profitti dall’IA: ecco cosa sta andando storto&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/oltre-la-meta-dei-ceo-non-vede-profitti-dallia-ecco-cosa-sta-andando-storto/&#34;&gt;https://www.redhotcyber.com/post/oltre-la-meta-dei-ceo-non-vede-profitti-dallia-ecco-cosa-sta-andando-storto/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A cura di Silvia Felici&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #intelligenzaartificiale #formazioneaziendale #innovazionetecnologica #supportoconcreto&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/316/393/867/218/975/original/1a6a5496912250a8.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-30T07:08:38&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqstkxr0he8v86tfxdgk9yjt280dda3caxuymucj0w84japahmuduqqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2479f74</id>
    
      <title type="html">Sei settimane di vantaggio sul ransomware: il colpo di fortuna di ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqstkxr0he8v86tfxdgk9yjt280dda3caxuymucj0w84japahmuduqqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2479f74" />
    <content type="html">
      Sei settimane di vantaggio sul ransomware: il colpo di fortuna di AWS sul RaaS Interlock&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/sei-settimane-di-vantaggio-sul-ransomware-il-colpo-di-fortuna-di-aws-sul-raas-interlock/&#34;&gt;https://www.redhotcyber.com/post/sei-settimane-di-vantaggio-sul-ransomware-il-colpo-di-fortuna-di-aws-sul-raas-interlock/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A cura di Carolina Vivianti&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cisco #vulnerabilita #ransomware #cybersecurity #hacking #malware #sicurezzainformatica&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/316/352/585/520/397/original/8257dd92c25c22e0.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-30T06:58:08&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqszzsj4gvjs84d4jhhls7jlp839kh6q5fmqq46pv3fsdvqmzz0ha8qzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v203ddt7</id>
    
      <title type="html">L’Europa è in allarme: Cina e Russia stanno facendo una mossa ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqszzsj4gvjs84d4jhhls7jlp839kh6q5fmqq46pv3fsdvqmzz0ha8qzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v203ddt7" />
    <content type="html">
      L’Europa è in allarme: Cina e Russia stanno facendo una mossa strategica per l’indipendenza tecnologica…&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/chi-controlla-la-supply-chain-europea-non-avere-una-infrastruttura-digitale-significa-perdere-sovranita/&#34;&gt;https://www.redhotcyber.com/post/chi-controlla-la-supply-chain-europea-non-avere-una-infrastruttura-digitale-significa-perdere-sovranita/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A cura di Carolina Vivianti&lt;br/&gt;&lt;br/&gt;#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/311/345/873/366/635/original/6e953bdc02d6e73e.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-29T09:44:52&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsfkl4rg4sdscagsk3gxn800fhdhuz2kues46lzl6rvn0hay83j4nqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2z7exg8</id>
    
      <title type="html">Il Ransomware colposce Netalia: Cloud italiano sotto attacco, ma ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsfkl4rg4sdscagsk3gxn800fhdhuz2kues46lzl6rvn0hay83j4nqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2z7exg8" />
    <content type="html">
      Il Ransomware colposce Netalia: Cloud italiano sotto attacco, ma l’azienda frena sul data breach&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/il-ransomware-colposce-netalia-cloud-italiano-sotto-attacco-ma-lazienda-frena-sul-data-breach/&#34;&gt;https://www.redhotcyber.com/post/il-ransomware-colposce-netalia-cloud-italiano-sotto-attacco-ma-lazienda-frena-sul-data-breach/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #malware #ransomware #attacchinformatici #gruppQilin #netalia #cloudsecurity&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/309/102/387/626/101/original/9aa06441c8f93714.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-28T23:14:19&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsrcxu7yud69xjva3wyl6d5rneq2wucna7r58awkj6suvce4sp5xeczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2h0xdhc</id>
    
      <title type="html">Basta uno sticker su Telegram per hackerarti! L’RCE critica da ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsrcxu7yud69xjva3wyl6d5rneq2wucna7r58awkj6suvce4sp5xeczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2h0xdhc" />
    <content type="html">
      Basta uno sticker su Telegram per hackerarti! L’RCE critica da 9.8 è senza patch&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/basta-uno-sticker-su-telegram-per-hackerarti-lrce-critica-da-9-8-e-senza-patch/&#34;&gt;https://www.redhotcyber.com/post/basta-uno-sticker-su-telegram-per-hackerarti-lrce-critica-da-9-8-e-senza-patch/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A cura di Carolina Vivianti&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #malware #telegram #vulnerabilita #android #linux #sicurezzainformatica&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/308/207/754/599/459/original/2fc46d65e72318f7.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-28T19:26:48&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsf47ut7j5wltg8vypeg6rxssplxyafhgrlezah5v254dxenyj6m7czypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2aqavh5</id>
    
      <title type="html">Dipendenza dai social media, verdetto storico negli USA contro le ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsf47ut7j5wltg8vypeg6rxssplxyafhgrlezah5v254dxenyj6m7czypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2aqavh5" />
    <content type="html">
      Dipendenza dai social media, verdetto storico negli USA contro le Big Tech e una riflessione&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/dipendenza-dai-social-media-verdetto-storico-negli-usa-contro-le-big-tech/&#34;&gt;https://www.redhotcyber.com/post/dipendenza-dai-social-media-verdetto-storico-negli-usa-contro-le-big-tech/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A cura di Massimiliano Brolli&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #responsabilitàsocial #giuristecnologia #meta #youtube #dipendenzaonline&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/307/328/837/636/296/original/cf5a3f60ce723546.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-28T15:43:17&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs22s508255kcar8p6634mmc8vrsaawr8w2xkyll2w0w72ktsv4nwczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2m7qs5x</id>
    
      <title type="html">L’hack dell’account email del direttore FBI è una falla ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs22s508255kcar8p6634mmc8vrsaawr8w2xkyll2w0w72ktsv4nwczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2m7qs5x" />
    <content type="html">
      L’hack dell’account email del direttore FBI è una falla nella sicurezza nazionale&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/lhack-dellaccount-email-del-direttore-fbi-e-una-falla-nella-sicurezza-nazionale/&#34;&gt;https://www.redhotcyber.com/post/lhack-dellaccount-email-del-direttore-fbi-e-una-falla-nella-sicurezza-nazionale/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A cura di Chiara Nardini&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #fbi #hackerato #handala #kashpatel #datipersonali&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/305/590/676/833/624/original/4c9d61415bd5c6a4.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-28T08:21:15&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqspsj26jk8x5wu2sjwda55xrq3frx20f4mlzvz8t369z0egmzrk80qzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2nu7p9c</id>
    
      <title type="html">Bruxelles sotto attacco: hacker rubano 350 GB di dati alla ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqspsj26jk8x5wu2sjwda55xrq3frx20f4mlzvz8t369z0egmzrk80qzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2nu7p9c" />
    <content type="html">
      Bruxelles sotto attacco: hacker rubano 350 GB di dati alla Commissione Europea&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/bruxelles-sotto-attacco-hacker-rubano-350-gb-di-dati-alla-commissione-europea/&#34;&gt;https://www.redhotcyber.com/post/bruxelles-sotto-attacco-hacker-rubano-350-gb-di-dati-alla-commissione-europea/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A cura di Luca Stivali del gruppo DarkLab&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #malware #ransomware #amazon #cloudsecurity #commissioneeuropea&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/305/427/452/494/342/original/ff389c4cd2ed187b.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-28T07:39:44&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqszkq9nav0cc23fkkzddxck4rd7frv48q4g4mpqv2krgx95rdafjjgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2hqrzjp</id>
    
      <title type="html">Abbiamo solo 3 anni per salvare Internet! Google Anticipa il ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqszkq9nav0cc23fkkzddxck4rd7frv48q4g4mpqv2krgx95rdafjjgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2hqrzjp" />
    <content type="html">
      Abbiamo solo 3 anni per salvare Internet! Google Anticipa il Q-Day al 2029&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/abbiamo-solo-3-anni-per-salvare-internet-google-anticipa-il-q-day-al-2029/&#34;&gt;https://www.redhotcyber.com/post/abbiamo-solo-3-anni-per-salvare-internet-google-anticipa-il-q-day-al-2029/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #google #crittografia #sicurezzainformatica #informaticaquantistica #qday #cybersecurity&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/305/344/881/063/396/original/4d22eb0b7c4f362a.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-28T07:18:44&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsw07m0zs85kacyvtp0x4x390uhfsh2wcfk49lzm4l69fsjvwegy4czypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v22sjxxw</id>
    
      <title type="html">🚨 Resta sempre aggiornato sulla cybersecurity 📌 Segui RHC ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsw07m0zs85kacyvtp0x4x390uhfsh2wcfk49lzm4l69fsjvwegy4czypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v22sjxxw" />
    <content type="html">
      🚨 Resta sempre aggiornato sulla cybersecurity&lt;br/&gt;&lt;br/&gt;📌 Segui RHC su Google Discover: &lt;a href=&#34;https://share.google/GOhPTverA7qkgtbkF&#34;&gt;https://share.google/GOhPTverA7qkgtbkF&lt;/a&gt; &lt;br/&gt;➡️ Scrolla fino in basso e clicca su “SEGUI”&lt;br/&gt;&lt;br/&gt;#RedHotCyber #cybersecurity #infosec #threatintelligence #hacking #RedHotCyber #securitynews #cyberthreats&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/303/008/966/900/459/original/f5177d2fb278055e.png&#34;&gt; 
    </content>
    <updated>2026-03-27T21:24:41&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsz4cmuxr9wtfv2cavjkg390qgg066vz0vsv22kwgc4rn93wz9drcgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v26y3l2a</id>
    
      <title type="html">La sicurezza informatica delle infrastrutture critiche nazionali ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsz4cmuxr9wtfv2cavjkg390qgg066vz0vsv22kwgc4rn93wz9drcgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v26y3l2a" />
    <content type="html">
      La sicurezza informatica delle infrastrutture critiche nazionali è a rischio: quali sono le vere minacce che si nascondono dietro i sistemi obsoleti…&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/cyber-security-e-critical-national-infrastructure-il-93-e-stato-colpito-negli-ultimi-12-mesi/&#34;&gt;https://www.redhotcyber.com/post/cyber-security-e-critical-national-infrastructure-il-93-e-stato-colpito-negli-ultimi-12-mesi/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/302/181/140/680/218/original/850f58c6b10a7df4.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-27T17:54:09&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsqeu2y5wzekag57ktammksp0kpp8ghvdu2mazfy0rh2rvkjc8j6dszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2d0qva3</id>
    
      <title type="html">IaB: Condannato a 6 anni e mezzo di carcere per aver facilitato ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsqeu2y5wzekag57ktammksp0kpp8ghvdu2mazfy0rh2rvkjc8j6dszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2d0qva3" />
    <content type="html">
      IaB: Condannato a 6 anni e mezzo di carcere per aver facilitato gli attacchi ransomware&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/iab-condannato-a-6-anni-e-mezzo-di-carcere-per-aver-facilitato-gli-attacchi-ransomware/&#34;&gt;https://www.redhotcyber.com/post/iab-condannato-a-6-anni-e-mezzo-di-carcere-per-aver-facilitato-gli-attacchi-ransomware/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #malware #ransomware #criminalitainformatica #sicurezzainformatica #reatiinformatici&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/300/503/923/734/263/original/f4d86565fc64a019.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-27T10:47:37&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqswfnmp2234zskn2j9pqvlc4qnv633c2ne3h0axezklx8du6nr33qgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2lvuuhn</id>
    
      <title type="html">Il DLP non è il Grande Fratello: il problema è la progettazione ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqswfnmp2234zskn2j9pqvlc4qnv633c2ne3h0axezklx8du6nr33qgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2lvuuhn" />
    <content type="html">
      Il DLP non è il Grande Fratello: il problema è la progettazione&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/il-dlp-non-e-il-grande-fratello-il-problema-e-la-progettazione/&#34;&gt;https://www.redhotcyber.com/post/il-dlp-non-e-il-grande-fratello-il-problema-e-la-progettazione/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #protezionedatidigitali #sicurezzainformatica #dlp #dataleakprevention #protezioneinformazioni #sicurezzadelleinformazioni&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/300/385/949/526/771/original/42d8bf92a8130c67.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-27T10:17:37&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsxg25xkx7ttx49wg4arvu0h74k36y08m3uj08urn6c4wg2yt2424gzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v20kj6lv</id>
    
      <title type="html">Rete TELCO sotto assedio: BPFDoor è in scena per un attacco ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsxg25xkx7ttx49wg4arvu0h74k36y08m3uj08urn6c4wg2yt2424gzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v20kj6lv" />
    <content type="html">
      Rete TELCO sotto assedio: BPFDoor è in scena per un attacco senza precedenti&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/rete-telco-sotto-assedio-bpfdoor-e-in-scena-per-un-attacco-senza-precedenti/&#34;&gt;https://www.redhotcyber.com/post/rete-telco-sotto-assedio-bpfdoor-e-in-scena-per-un-attacco-senza-precedenti/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #malware #minaccesibernetica #sicurezzainformatica #gruppihacker #haccin Cina&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/300/030/037/243/874/original/761f4115fc03664d.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-27T08:47:06&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsduuuu4dft046qpnxwx4q4xljpmd2r5zmsqr5t62u2n5z2d7rlucczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v220th7j</id>
    
      <title type="html">🔴 Benvenuta Marilena in Red Hot Cyber Cyber Angels 🔴 🔗 ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsduuuu4dft046qpnxwx4q4xljpmd2r5zmsqr5t62u2n5z2d7rlucczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v220th7j" />
    <content type="html">
      🔴 Benvenuta Marilena in Red Hot Cyber Cyber Angels 🔴&lt;br/&gt;&lt;br/&gt;🔗 Seguitela attraverso Gli ultimi articoli su RHC : &lt;a href=&#34;https://www.redhotcyber.com/post/author/marilena-viotto/&#34;&gt;https://www.redhotcyber.com/post/author/marilena-viotto/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #rhccyberangels #hacking #benesseredigitale #it #cybercrime #cybersecurity&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/299/939/598/182/661/original/1d499f683b145bc6.png&#34;&gt; 
    </content>
    <updated>2026-03-27T08:24:06&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsp399s83ustkk6kju6je9sk3fll3u43q7meuepnqkm0aqwl52z3ygzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2p9rqvg</id>
    
      <title type="html">L’AI vuole entrare nell’energia nucleare: la tecnologia ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsp399s83ustkk6kju6je9sk3fll3u43q7meuepnqkm0aqwl52z3ygzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2p9rqvg" />
    <content type="html">
      L’AI vuole entrare nell’energia nucleare: la tecnologia c’è, ma il vero ostacolo è nascosto&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/lai-vuole-entrare-nellenergia-nucleare-la-tecnologia-ce-ma-il-vero-ostacolo-e-nascosto/&#34;&gt;https://www.redhotcyber.com/post/lai-vuole-entrare-nellenergia-nucleare-la-tecnologia-ce-ma-il-vero-ostacolo-e-nascosto/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #intelligenzaartificiale #energianucleare #digitaltwins #automazionedocumentale #tecnologiedigitali #settoreenergetico&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/299/923/869/221/923/original/2257d46b78c9c065.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-27T08:20:06&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs8kvf3jtr90kakcgu5ez89kqm42ckk3hphtr9u4jmdgd24kxsd0yszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2m9tl56</id>
    
      <title type="html">🚀 RHC Conference 2026: Workshop &amp;#34;Hands On&amp;#34; di Lunedì ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs8kvf3jtr90kakcgu5ez89kqm42ckk3hphtr9u4jmdgd24kxsd0yszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2m9tl56" />
    <content type="html">
      🚀 RHC Conference 2026: Workshop &amp;#34;Hands On&amp;#34; di Lunedì 18 Maggio&lt;br/&gt;&lt;br/&gt;Di seguito le informazioni sull&amp;#39;evento:&lt;br/&gt;&lt;br/&gt;📍Quando: Lunedì 18 Maggio 2026 (Mattina workshop &amp;#34;hands-on&amp;#34; e pomeriggio workshop &amp;#34;skill-on&amp;#34;)&lt;br/&gt;📍Dove: Teatro Italia, Via Bari 18, Roma (Metro Piazza Bologna)&lt;br/&gt;📍Programma: &lt;a href=&#34;https://www.redhotcyber.com/linksSk2L/programma-rhc-conf-2026&#34;&gt;https://www.redhotcyber.com/linksSk2L/programma-rhc-conf-2026&lt;/a&gt;&lt;br/&gt;📍Iscriviti ai Workshop di lunedì 18 maggio : &lt;a href=&#34;https://rhc-conference-2026-workshop.eventbrite.it&#34;&gt;https://rhc-conference-2026-workshop.eventbrite.it&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #rhcconference #conferenza #informationsecurity #ethicalhacking #dataprotection #hacking #cybersecurity #cybercrime #cybersecurityawareness #cybersecuritytraining #cybersecuritynews #privacy #infosecurity&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/299/744/950/303/426/original/bda87cb99fd4777f.jpeg&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/299/744/962/963/235/original/dd027b1d189e232d.jpeg&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/299/744/989/683/967/original/44da69ece18cff89.jpeg&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/299/745/002/660/929/original/e15d54d4c360ca04.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-27T07:34:37&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsxrumyv6ekgpel9lp2u4efyfwtpwfxg95y388xrztc0ap8ax2vmmqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v22j667g</id>
    
      <title type="html">Gli attacchi informatici si evolvono: le API sono nel mirino ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsxrumyv6ekgpel9lp2u4efyfwtpwfxg95y388xrztc0ap8ax2vmmqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v22j667g" />
    <content type="html">
      Gli attacchi informatici si evolvono: le API sono nel mirino degli aggressori&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/gli-attacchi-informatici-si-evolvono-le-api-sono-nel-mirino-degli-aggressori/&#34;&gt;https://www.redhotcyber.com/post/gli-attacchi-informatici-si-evolvono-le-api-sono-nel-mirino-degli-aggressori/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #akamai #rapportosullostatointernet #sicurezzainformatica #attacchidDos #abusoapi #attacchiweb #infrastrutturaaziendale&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/299/715/446/318/658/original/764f1be4895101f1.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-27T07:27:06&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsq232c852d8euxlp74rh89hje0cfsxujqt7eg3hk8gpushplfz6cgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v27z6at0</id>
    
      <title type="html">Ransomware in evoluzione: il 57% delle aziende colpite, subisce ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsq232c852d8euxlp74rh89hje0cfsxujqt7eg3hk8gpushplfz6cgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v27z6at0" />
    <content type="html">
      Ransomware in evoluzione: il 57% delle aziende colpite, subisce una nuova estorsione&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/ransomware-in-evoluzione-il-57-delle-aziende-colpite-ora-subisce-doppia-o-tripla-estorsione/&#34;&gt;https://www.redhotcyber.com/post/ransomware-in-evoluzione-il-57-delle-aziende-colpite-ora-subisce-doppia-o-tripla-estorsione/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #ransomware #attacchimirati #zerotrust #resilienzaoperativa #malware #ddos #insider #sicurezzainformatica&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/299/674/161/413/882/original/7141aa5db177e8e3.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-27T07:16:36&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs06c75zntlmlxhj0w5ny7ruav5njuacj52a9w8xcqckandtuuzyjczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2p5w8wn</id>
    
      <title type="html">OpenAI chiude Sora: il futuro dell’AI non è più Video! ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs06c75zntlmlxhj0w5ny7ruav5njuacj52a9w8xcqckandtuuzyjczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2p5w8wn" />
    <content type="html">
      OpenAI chiude Sora: il futuro dell’AI non è più Video! Scopriamo cosa sta accadendo&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/openai-chiude-sora-il-futuro-dellai-non-e-piu-video-scopriamo-cosa-sta-accadendo/&#34;&gt;https://www.redhotcyber.com/post/openai-chiude-sora-il-futuro-dellai-non-e-piu-video-scopriamo-cosa-sta-accadendo/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #openai #intelligenzaartificiale #soraplatform #generazionevideoai #monetizzazione #riskichilegali #copyright #robotica #agentiautonomi #probleminormativi #reputazioneonline #tecnologia&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/295/765/252/747/091/original/e5ef1eadab1a1b83.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-26T14:42:31&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs2smvxl0y83h6ydsl7phxy88sez9pg8f32dmcc6tgggqfdlhgfh9szypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2cnkh52</id>
    
      <title type="html">Il Ransomware è ora Democratico! TeamPCP e BreachForums assieme ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs2smvxl0y83h6ydsl7phxy88sez9pg8f32dmcc6tgggqfdlhgfh9szypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2cnkh52" />
    <content type="html">
      Il Ransomware è ora Democratico! TeamPCP e BreachForums assieme per elevare il RaaS&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/il-ransomware-e-ora-democratico-teampcp-e-breachforums-assieme-per-elevare-il-raas/&#34;&gt;https://www.redhotcyber.com/post/il-ransomware-e-ora-democratico-teampcp-e-breachforums-assieme-per-elevare-il-raas/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybercrime #ransomware #sicurezzainformatica #hacking #malware #attacchinformatici #vulnerabilita #supplychain&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/295/678/744/728/550/original/9112ad36c52ea1d5.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-26T14:20:31&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs8gp6vwapdzkefky2645zmr8s08w5647z8w92qs9s2mrv2u5q95jszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2g63tvu</id>
    
      <title type="html">Typosquatting: la trappola invisibile che svuota i conti con un ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs8gp6vwapdzkefky2645zmr8s08w5647z8w92qs9s2mrv2u5q95jszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2g63tvu" />
    <content type="html">
      Typosquatting: la trappola invisibile che svuota i conti con un refuso&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/typosquatting-la-trappola-invisibile-che-svuota-i-conti-con-un-refuso/&#34;&gt;https://www.redhotcyber.com/post/typosquatting-la-trappola-invisibile-che-svuota-i-conti-con-un-refuso/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #typosquatting #ciberpirateria #sicurezzainformatica #hacking #malware #phishing #brandhijacking #dominiomografi&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/295/246/175/853/000/original/0171b232957db687.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-26T12:30:30&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs9m7wjah7te5m4cj99tjx4uyc4m7y4ae898vwpvz5tq9rga5rplggzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2p8xqpz</id>
    
      <title type="html">Una vulnerabilità Critica in Dell RecoverPoint Semina il Caos. ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs9m7wjah7te5m4cj99tjx4uyc4m7y4ae898vwpvz5tq9rga5rplggzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2p8xqpz" />
    <content type="html">
      Una vulnerabilità Critica in Dell RecoverPoint Semina il Caos. Il malware GRIMBOLT in azione&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/una-vulnerabilita-critica-in-dell-recoverpoint-semina-il-caos-il-malware-grimbolt-in-azione/&#34;&gt;https://www.redhotcyber.com/post/una-vulnerabilita-critica-in-dell-recoverpoint-semina-il-caos-il-malware-grimbolt-in-azione/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #malware #ransomware #vulnerabilita #zeroday #dellrecoverpoint #macchinevirtuali #accessoRoot&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/294/628/770/815/930/original/9272062f498e6b3c.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-26T09:53:29&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs8y6ts0zaxlkgpnwkh0d7qxh5numw4ea5z8tdnhcjl8nv8pe82t5szypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2mhu8kt</id>
    
      <title type="html">Node.js rischia il crash remoto: aggiornamento urgente già ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs8y6ts0zaxlkgpnwkh0d7qxh5numw4ea5z8tdnhcjl8nv8pe82t5szypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2mhu8kt" />
    <content type="html">
      Node.js rischia il crash remoto: aggiornamento urgente già disponibile&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/node-js-rischia-il-crash-remoto-aggiornamento-urgente-gia-disponibile/&#34;&gt;https://www.redhotcyber.com/post/node-js-rischia-il-crash-remoto-aggiornamento-urgente-gia-disponibile/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #nodejs #sicurezzainformatica #tls #http2 #webcrypto #vulnerabilita #cybersecurity #hacking #malware #sicurezzadelsistema&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/294/178/496/476/645/original/01bda5678dfec19b.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-26T07:58:59&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsww54ezva6qegenusvfeyd8ad3wnd6se2yck4rym72lqwtkmwwqyszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2f544w8</id>
    
      <title type="html">Le minacce informatiche stanno cambiando: l’era degli attacchi ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsww54ezva6qegenusvfeyd8ad3wnd6se2yck4rym72lqwtkmwwqyszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2f544w8" />
    <content type="html">
      Le minacce informatiche stanno cambiando: l’era degli attacchi guidati dall’IA è ora!&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/le-minacce-informatiche-stanno-cambiando-lera-degli-attacchi-guidati-dallia-e-ora/&#34;&gt;https://www.redhotcyber.com/post/le-minacce-informatiche-stanno-cambiando-lera-degli-attacchi-guidati-dallia-e-ora/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #malware #ransomware #intelligenzaartificiale #sicherheitainformatica #minacceinformatiche&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/293/981/887/590/140/original/6126280e7c0e0a4e.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-26T07:08:59&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsxnxkrd8rghwqea8e3rpdjk6fdn6t093gn2jen5ufzuwmhrqg38zszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v293vey7</id>
    
      <title type="html">PornHub e la Guerra dei Clic: è sfida tra norme, sorveglianza di ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsxnxkrd8rghwqea8e3rpdjk6fdn6t093gn2jen5ufzuwmhrqg38zszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v293vey7" />
    <content type="html">
      PornHub e la Guerra dei Clic: è sfida tra norme, sorveglianza di stato e VPN&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/pornhub-e-la-guerra-dei-clic-e-sfida-tra-norme-sorveglianza-di-stato-e-vpn/&#34;&gt;https://www.redhotcyber.com/post/pornhub-e-la-guerra-dei-clic-e-sfida-tra-norme-sorveglianza-di-stato-e-vpn/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #pornhub #sicurezzainternet #libertadiparola #protezioneminori #dirittoprivacy #navigazioneonline #sicurezzadigital&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/291/563/414/639/522/original/cf32110ec63f357c.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-25T20:53:55&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsylz4x87ujl6wgszchmen59lgky5e6rkfjrw4gqrnqx4fpva9pyhqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2q788xr</id>
    
      <title type="html">Google usa Gemini per spiare il Dark Web: sicurezza rivoluzionata ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsylz4x87ujl6wgszchmen59lgky5e6rkfjrw4gqrnqx4fpva9pyhqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2q788xr" />
    <content type="html">
      Google usa Gemini per spiare il Dark Web: sicurezza rivoluzionata o nuova minaccia?&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/google-usa-gemini-per-spiare-il-dark-web-sicurezza-rivoluzionata-o-nuova-minaccia/&#34;&gt;https://www.redhotcyber.com/post/google-usa-gemini-per-spiare-il-dark-web-sicurezza-rivoluzionata-o-nuova-minaccia/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #darkweb #gemini #googlesicurezza #monitoraggiodarkweb #minacceinformatiche #profilaziendale&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/290/395/461/430/785/original/935e6e86200b0ef0.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-25T15:56:54&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsqp9gqjyy4lcn2wg2tejcdyyzzz5cdu8sqqg2mymwp8qqnw2trjhqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2d4m0uq</id>
    
      <title type="html">L’AI non ha ancora distrutto posti di lavoro… ma sta ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsqp9gqjyy4lcn2wg2tejcdyyzzz5cdu8sqqg2mymwp8qqnw2trjhqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2d4m0uq" />
    <content type="html">
      L’AI non ha ancora distrutto posti di lavoro… ma sta cambiando tutto silenziosamente&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/lai-non-ha-ancora-distrutto-posti-di-lavoro-ma-sta-cambiando-tutto-silenziosamente/&#34;&gt;https://www.redhotcyber.com/post/lai-non-ha-ancora-distrutto-posti-di-lavoro-ma-sta-cambiando-tutto-silenziosamente/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #intelligenzaartificiale #mercatoDelLavoro #cambiamentosilenzioso #lavorointelligente #giovanielavoro #ruolilavorativi&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/289/054/491/267/065/original/d5ae1cb83c0de290.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-25T10:15:52&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsqwyt3yf3yffjqkr770xcwywpdmw4xq0jpxalvqzyjv2lpp4z5mtgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2u4r8ny</id>
    
      <title type="html">Il cloud non è libero: la verità nascosta dietro gli ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsqwyt3yf3yffjqkr770xcwywpdmw4xq0jpxalvqzyjv2lpp4z5mtgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2u4r8ny" />
    <content type="html">
      Il cloud non è libero: la verità nascosta dietro gli hyperscaler, l’intelligence e la geopolitica&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/il-cloud-non-e-libero-la-verita-nascosta-dietro-gli-hyperscaler-lintelligence-e-la-geopolitica/&#34;&gt;https://www.redhotcyber.com/post/il-cloud-non-e-libero-la-verita-nascosta-dietro-gli-hyperscaler-lintelligence-e-la-geopolitica/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cloudfirst #geopatriation #cloudneutralita #assetstrategico #crisideiLimiti #dipendenzadallestero #interferenzestraniere&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/288/444/926/643/701/original/7b378be62a435c0d.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-25T07:40:51&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsgj8vaxp80v22y8zf7rt5uxv0fx40j4ex7fwvgapmkp8w25t2mkfgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2qeljza</id>
    
      <title type="html">🚀 RHC Conference 2026: Workshop &amp;#34;Hands On&amp;#34; di Lunedì ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsgj8vaxp80v22y8zf7rt5uxv0fx40j4ex7fwvgapmkp8w25t2mkfgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2qeljza" />
    <content type="html">
      🚀 RHC Conference 2026: Workshop &amp;#34;Hands On&amp;#34; di Lunedì 18 Maggio&lt;br/&gt;&lt;br/&gt;Di seguito le informazioni sull&amp;#39;evento:&lt;br/&gt;&lt;br/&gt;📍Quando: Lunedì 18 Maggio 2026 (Mattina workshop &amp;#34;hands-on&amp;#34; e pomeriggio workshop &amp;#34;skill-on&amp;#34;)&lt;br/&gt;📍Dove: Teatro Italia, Via Bari 18, Roma (Metro Piazza Bologna)&lt;br/&gt;📍Programma: &lt;a href=&#34;https://www.redhotcyber.com/linksSk2L/programma-rhc-conf-2026&#34;&gt;https://www.redhotcyber.com/linksSk2L/programma-rhc-conf-2026&lt;/a&gt;&lt;br/&gt;📍Iscriviti ai Workshop di lunedì 18 maggio : &lt;a href=&#34;https://rhc-conference-2026-workshop.eventbrite.it&#34;&gt;https://rhc-conference-2026-workshop.eventbrite.it&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #rhcconference #conferenza #informationsecurity #ethicalhacking #dataprotection #hacking #cybersecurity #cybercrime #cybersecurityawareness #cybersecuritytraining #cybersecuritynews #privacy #infosecurity&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/288/425/264/421/337/original/3ece5a87bddc0f05.jpeg&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/288/425/296/551/969/original/e3ad544650dfb68f.jpeg&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/288/425/312/304/326/original/1510b748b8d5f5c7.jpeg&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/288/425/322/971/077/original/777e2bfd9386cd87.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-25T07:35:52&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs04ul83cjhxxwej8w3lvett4f6f8fuxgn48dpxjs5rg26k5ukzr9szypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v28ajf98</id>
    
      <title type="html">Apocalisse nello spazio: come l’AI potrebbe distruggere ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs04ul83cjhxxwej8w3lvett4f6f8fuxgn48dpxjs5rg26k5ukzr9szypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v28ajf98" />
    <content type="html">
      Apocalisse nello spazio: come l’AI potrebbe distruggere l’internet satellitare in 24 ore&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/apocalisse-nello-spazio-come-lai-potrebbe-distruggere-linternet-satellitare-in-24-ore/&#34;&gt;https://www.redhotcyber.com/post/apocalisse-nello-spazio-come-lai-potrebbe-distruggere-linternet-satellitare-in-24-ore/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #sicurezzainformatica #attacchinformatici #intelligenzaartificiale #cybersecurity #hacking #malware #satelliti #spazio&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/285/597/776/168/440/original/f0057cf325e47fe4.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-24T19:36:47&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsv29ghj0gyy79q2svjq8dk3v2uf54zurg2ffl0ac9y69l0p9lcqmszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v24wz2j8</id>
    
      <title type="html">Handala, il sequestro dei domini e la guerra cyber che unisce ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsv29ghj0gyy79q2svjq8dk3v2uf54zurg2ffl0ac9y69l0p9lcqmszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v24wz2j8" />
    <content type="html">
      Handala, il sequestro dei domini e la guerra cyber che unisce leak, minacce e repressione transnazionale&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/handala-il-sequestro-dei-domini-e-la-guerra-cyber-che-unisce-leak-minacce-e-repressione-transnazionale/&#34;&gt;https://www.redhotcyber.com/post/handala-il-sequestro-dei-domini-e-la-guerra-cyber-che-unisce-leak-minacce-e-repressione-transnazionale/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #iran #ministerodellintelligence #statiuniti #dipartimentodigiustizia #sicurezzainformatica&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/284/832/887/182/216/original/729e81c970f3cf8b.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-24T16:22:16&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqszsdhl89kt72n97gha7zrxwya5xcfa3yv5zcwu6v7zw66x3ud46sgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2kezapv</id>
    
      <title type="html">Droni e robot: non è l’AI il vero problema, ma la connessione ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqszsdhl89kt72n97gha7zrxwya5xcfa3yv5zcwu6v7zw66x3ud46sgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2kezapv" />
    <content type="html">
      Droni e robot: non è l’AI il vero problema, ma la connessione&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/la-sfida-della-comunicazione-nei-droni-e-robot-autonomi/&#34;&gt;https://www.redhotcyber.com/post/la-sfida-della-comunicazione-nei-droni-e-robot-autonomi/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #comunicazione #droni #robot #trasmissionedati #wireless #canaleradio #dispositiviautonomi #intelligenzaartificiale&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/284/728/683/101/813/original/92fee9ed95d62254.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-24T15:55:46&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsgfs6lpcam0apvu0gkmrwcfu0x8xa8h8jyrp3s3peevjygvvsgpdczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2ezvwea</id>
    
      <title type="html">Morto Leonid Radvinsky, il miliardario fondatore di OnlyFans: ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsgfs6lpcam0apvu0gkmrwcfu0x8xa8h8jyrp3s3peevjygvvsgpdczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2ezvwea" />
    <content type="html">
      Morto Leonid Radvinsky, il miliardario fondatore di OnlyFans: aveva 43 anni&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/morto-leonid-radvinsky-il-miliardario-fondatore-di-onlyfans-aveva-43-anni/&#34;&gt;https://www.redhotcyber.com/post/morto-leonid-radvinsky-il-miliardario-fondatore-di-onlyfans-aveva-43-anni/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #onlyfans #leonidradvinsky #imprenditore #ucciso #ucraina #statunitense #monetizzazione #contenuti #malattia&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/283/543/033/010/909/original/11dde4993617f795.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-24T10:54:14&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs8y48mvyfwl84hk8eln0aw9qvxdwhm02du4gus5ph3uxx80wfck8szypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v29g28h7</id>
    
      <title type="html">IIS fuori supporto: 500.000 istanze su internet esposte agli ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs8y48mvyfwl84hk8eln0aw9qvxdwhm02du4gus5ph3uxx80wfck8szypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v29g28h7" />
    <content type="html">
      IIS fuori supporto: 500.000 istanze su internet esposte agli attacchi informatici&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/iis-fuori-supporto-500-000-istanze-su-internet-esposte-agli-attacchi-informatici/&#34;&gt;https://www.redhotcyber.com/post/iis-fuori-supporto-500-000-istanze-su-internet-esposte-agli-attacchi-informatici/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #microsoftiis #obsoletcenza #infrastrutturadigitale #sicurezzainformatica #problemistrutturali&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/283/181/245/505/662/original/6dfa98da12e3afd8.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-24T09:22:14&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsvpqf5tvhjvmavfn2pff6y9mye5ws4jggwlsk03x9dc464cys6kngzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2sxs4vs</id>
    
      <title type="html">🚀 RHC Conference 2026: Workshop &amp;#34;Hands On&amp;#34; di Lunedì ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsvpqf5tvhjvmavfn2pff6y9mye5ws4jggwlsk03x9dc464cys6kngzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2sxs4vs" />
    <content type="html">
      🚀 RHC Conference 2026: Workshop &amp;#34;Hands On&amp;#34; di Lunedì 18 Maggio&lt;br/&gt;&lt;br/&gt;Di seguito le informazioni sull&amp;#39;evento:&lt;br/&gt;&lt;br/&gt;📍Quando: Lunedì 18 Maggio 2026 (Mattina workshop &amp;#34;hands-on&amp;#34; e pomeriggio workshop &amp;#34;skill-on&amp;#34;)&lt;br/&gt;📍Dove: Teatro Italia, Via Bari 18, Roma (Metro Piazza Bologna)&lt;br/&gt;📍Programma: &lt;a href=&#34;https://www.redhotcyber.com/linksSk2L/programma-rhc-conf-2026&#34;&gt;https://www.redhotcyber.com/linksSk2L/programma-rhc-conf-2026&lt;/a&gt;&lt;br/&gt;📍Iscriviti ai Workshop di lunedì 18 maggio : &lt;a href=&#34;https://rhc-conference-2026-workshop.eventbrite.it&#34;&gt;https://rhc-conference-2026-workshop.eventbrite.it&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #rhcconference #conferenza #informationsecurity #ethicalhacking #dataprotection #hacking #cybersecurity #cybercrime #cybersecurityawareness #cybersecuritytraining #cybersecuritynews #privacy #infosecurity&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/282/685/751/639/854/original/ff264d847017c1d1.jpeg&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/282/685/764/724/946/original/4e17093fc0366bac.jpeg&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/282/685/776/168/044/original/5469622e8f526248.jpeg&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/282/685/788/381/213/original/f80b6cd1d144aca5.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-24T07:16:14&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsy42ct99tn09nwnl24s7lvyvlmxj96q5l4amus6uf8jm0x2junfdszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2rxyq3z</id>
    
      <title type="html">I robot ora leggono la mente: correggono gli errori prima che ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsy42ct99tn09nwnl24s7lvyvlmxj96q5l4amus6uf8jm0x2junfdszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2rxyq3z" />
    <content type="html">
      I robot ora leggono la mente: correggono gli errori prima che questi accadano&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/i-robot-iniziano-leggono-la-tua-mente-correggono-gli-errori-prima-che-accadano/&#34;&gt;https://www.redhotcyber.com/post/i-robot-iniziano-leggono-la-tua-mente-correggono-gli-errori-prima-che-accadano/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #robotica #intelligenzaartificiale #interfacciecervellocomputer #controlloadattivo #sicurezzarobotica #efficienza&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/282/628/725/738/478/original/e376df3acb4fd248.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-24T07:01:43&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs2tg5jfqvuukceu7mzqhyqajuzjnrmyv6tq0ht3y7uvdk9d422pkszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2qdlevz</id>
    
      <title type="html">UniFi Network Application: Ubiquiti tappa due falle critiche, una ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs2tg5jfqvuukceu7mzqhyqajuzjnrmyv6tq0ht3y7uvdk9d422pkszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2qdlevz" />
    <content type="html">
      UniFi Network Application: Ubiquiti tappa due falle critiche, una da CVSS 10&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/unifi-network-application-ubiquiti-tappa-due-falle-critiche-una-da-cvss-10/&#34;&gt;https://www.redhotcyber.com/post/unifi-network-application-ubiquiti-tappa-due-falle-critiche-una-da-cvss-10/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #hacking #vulnerabilita #unifi #networksecurity #sicurezzainformatica #path traversal #aggiornamentidisicurezza&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/282/609/068/285/962/original/1b9d428b3f6766ea.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-24T06:56:43&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs90rwf80m7dwhud67hzrm8x5sugfzzsmmymganmh09jmalkd38q6gzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v272mju4</id>
    
      <title type="html">Cybersecurity e PMI italiane: perché il nuovo voucher può fare ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs90rwf80m7dwhud67hzrm8x5sugfzzsmmymganmh09jmalkd38q6gzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v272mju4" />
    <content type="html">
      Cybersecurity e PMI italiane: perché il nuovo voucher può fare la differenza&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/cybersecurity-e-pmi-perche-il-nuovo-voucher-puo-fare-la-differenza/&#34;&gt;https://www.redhotcyber.com/post/cybersecurity-e-pmi-perche-il-nuovo-voucher-puo-fare-la-differenza/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #news #cybersecurity #sicurezzainformatica #attacchiinformatici #protezionedigitale #aziende #pmi&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/116/260/048/178/505/808/original/b0e9dcc4c21f717d.jpeg&#34;&gt; 
    </content>
    <updated>2026-03-20T07:19:11&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsf442lxwlwljrjh2xm6jr7jnkh60uazwc07et7nak5alpw9wnfj4qzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2523077</id>
    
      <title type="html">Vulnerabilità critica in Adobe Commerce e Magento: il bug ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsf442lxwlwljrjh2xm6jr7jnkh60uazwc07et7nak5alpw9wnfj4qzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2523077" />
    <content type="html">
      Vulnerabilità critica in Adobe Commerce e Magento: il bug SessionReaper&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/vulnerabilita-critica-in-adobe-commerce-e-magento-il-bug-sessionreaper/&#34;&gt;https://www.redhotcyber.com/post/vulnerabilita-critica-in-adobe-commerce-e-magento-il-bug-sessionreaper/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news #cyberthreatintelligence #innovation #privacy&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/115/181/006/335/459/616/original/e07b585131ccf58b.jpeg&#34;&gt; 
    </content>
    <updated>2025-09-10T18:44:39&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsg68ft4ylss7hwxyesgfgwatj9lwprd864aj4yn6r34z45ng2p6yszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2qa46hx</id>
    
      <title type="html">Gli hacker criminali di The Gentlemen pubblicano la prima vittima ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsg68ft4ylss7hwxyesgfgwatj9lwprd864aj4yn6r34z45ng2p6yszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2qa46hx" />
    <content type="html">
      Gli hacker criminali di The Gentlemen pubblicano la prima vittima italiana&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/gli-hacker-criminali-di-the-gentlemen-pubblicano-la-prima-vittima-italiana/&#34;&gt;https://www.redhotcyber.com/post/gli-hacker-criminali-di-the-gentlemen-pubblicano-la-prima-vittima-italiana/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news #cyberthreatintelligence #innovation #privacy&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/115/180/952/965/328/767/original/ae3493f84b18f537.jpeg&#34;&gt; 
    </content>
    <updated>2025-09-10T18:31:05&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsxfew8gpzupxmm5jfgjqt887vg0xeqngt7cx7afdzh4tjvgkqrpvczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2k8l9cl</id>
    
      <title type="html">Phishing in Classe! 115.000 email per 13.500 organizzazioni con ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsxfew8gpzupxmm5jfgjqt887vg0xeqngt7cx7afdzh4tjvgkqrpvczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2k8l9cl" />
    <content type="html">
      Phishing in Classe! 115.000 email per 13.500 organizzazioni con Google Classroom&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/phishing-in-classe-115-000-email-per-13-500-organizzazioni-con-google-classroom/&#34;&gt;https://www.redhotcyber.com/post/phishing-in-classe-115-000-email-per-13-500-organizzazioni-con-google-classroom/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news #cyberthreatintelligence #innovation #privacy&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/115/180/614/939/333/228/original/edd1da9915d949e5.jpeg&#34;&gt; 
    </content>
    <updated>2025-09-10T17:05:07&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqswemdf2k8qjjtr906tyn8fzdugutlj4mtesunmw0mgvlw2p3sqyaqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2plrrdp</id>
    
      <title type="html">6 milioni di euro al giorno! E’ il costo dell’Attacco ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqswemdf2k8qjjtr906tyn8fzdugutlj4mtesunmw0mgvlw2p3sqyaqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2plrrdp" />
    <content type="html">
      6 milioni di euro al giorno! E’ il costo dell’Attacco informatico a Jaguar Land Rover&lt;br/&gt;&lt;br/&gt;📌 Link all\&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/6-milioni-di-euro-al-giorno-e-il-costo-dellattacco-informatico-a-jaguar-land-rover/&#34;&gt;https://www.redhotcyber.com/post/6-milioni-di-euro-al-giorno-e-il-costo-dellattacco-informatico-a-jaguar-land-rover/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news #cyberthreatintelligence #innovation #privacy&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/115/179/889/154/439/059/original/bb0a662f6523f206.jpeg&#34;&gt; 
    </content>
    <updated>2025-09-10T14:00:32&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsqk5ugflnms3tyn0axfajjn88mm0wfwjh2uxqy8t373zew6kk5u3qzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2jvd2h4</id>
    
      <title type="html">Microsoft Patch Tuesday di settembre: 81 vulnerabilità e 2 0day ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsqk5ugflnms3tyn0axfajjn88mm0wfwjh2uxqy8t373zew6kk5u3qzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2jvd2h4" />
    <content type="html">
      Microsoft Patch Tuesday di settembre: 81 vulnerabilità e 2 0day attivi&lt;br/&gt;&lt;br/&gt;📌 Link all\&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/microsoft-patch-tuesday-di-settembre-81-vulnerabilita-e-2-0day-attivi/&#34;&gt;https://www.redhotcyber.com/post/microsoft-patch-tuesday-di-settembre-81-vulnerabilita-e-2-0day-attivi/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news #cyberthreatintelligence #innovation #privacy&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/115/179/746/655/306/414/original/0fde16b2868118c0.jpeg&#34;&gt; 
    </content>
    <updated>2025-09-10T13:24:18&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqspp4x9agrd2rfhy0leh5mnwdfc0uq32cx74grd53nctwq2tjckvwszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2f6y5l7</id>
    
      <title type="html">10 su 10! SAP rilascia patch di sicurezza per vulnerabilità ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqspp4x9agrd2rfhy0leh5mnwdfc0uq32cx74grd53nctwq2tjckvwszypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2f6y5l7" />
    <content type="html">
      10 su 10! SAP rilascia patch di sicurezza per vulnerabilità critiche in Netweaver&lt;br/&gt;&lt;br/&gt;📌 Link all\&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/10-su-10-sap-rilascia-patch-di-sicurezza-per-vulnerabilita-critiche-in-netweaver/&#34;&gt;https://www.redhotcyber.com/post/10-su-10-sap-rilascia-patch-di-sicurezza-per-vulnerabilita-critiche-in-netweaver/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news #cyberthreatintelligence #innovation #privacy&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/115/178/992/949/673/525/original/49fe5dd2a097ac80.jpeg&#34;&gt; 
    </content>
    <updated>2025-09-10T10:12:37&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsgsn34h9qs88ny9lyxwgvdwz75xdmdqme3nhgg8d9n6y74mncmg4szypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2j9ptjq</id>
    
      <title type="html">Verso L’Uroboro! Il CEO di OpenAI avverte: i social sono pieni ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsgsn34h9qs88ny9lyxwgvdwz75xdmdqme3nhgg8d9n6y74mncmg4szypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2j9ptjq" />
    <content type="html">
      Verso L’Uroboro! Il CEO di OpenAI avverte: i social sono pieni di contenuti dei bot AI&lt;br/&gt;&lt;br/&gt;📌 Link all\&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/verso-luroboro-il-ceo-di-openai-avverte-i-social-sono-pieni-di-contenuti-dei-bot-ai/&#34;&gt;https://www.redhotcyber.com/post/verso-luroboro-il-ceo-di-openai-avverte-i-social-sono-pieni-di-contenuti-dei-bot-ai/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news #cyberthreatintelligence #innovation #privacy&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/115/178/777/403/620/293/original/1d8e2c1b53fd25a4.jpeg&#34;&gt; 
    </content>
    <updated>2025-09-10T09:17:48&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs8uqtjjrxqr7l760rms9pz4dx96udy8rf9rggapa8ftcg6ugnpkjqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v23rqnm5</id>
    
      <title type="html">Preludio alla compromissione: è boom sulle scansioni mirate ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs8uqtjjrxqr7l760rms9pz4dx96udy8rf9rggapa8ftcg6ugnpkjqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v23rqnm5" />
    <content type="html">
      Preludio alla compromissione: è boom sulle scansioni mirate contro Cisco ASA&lt;br/&gt;&lt;br/&gt;📌 Link all\&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/preludio-alla-compromissione-e-boom-sulle-scansioni-mirate-contro-cisco-asa/&#34;&gt;https://www.redhotcyber.com/post/preludio-alla-compromissione-e-boom-sulle-scansioni-mirate-contro-cisco-asa/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news #cyberthreatintelligence #innovation #privacy&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/115/178/737/846/072/991/original/de616df337164de0.jpeg&#34;&gt; 
    </content>
    <updated>2025-09-10T09:07:45&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsxe03w3t9deare7rz2tqv6fnze2t6u0jezztseecqnqnvgy2ucd2czypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2kh84yy</id>
    
      <title type="html">Costa 5 iPhone, salta, tira pugni ma ancora non lava i piatti. ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsxe03w3t9deare7rz2tqv6fnze2t6u0jezztseecqnqnvgy2ucd2czypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2kh84yy" />
    <content type="html">
      Costa 5 iPhone, salta, tira pugni ma ancora non lava i piatti. R1, il robot cinese che sta sconvolgendo il web&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/costa-5-iphone-salta-tira-pugni-ma-ancora-non-lava-i-piatti-r1-il-robot-cinese-che-sta-sconvolgendo-il-web/&#34;&gt;https://www.redhotcyber.com/post/costa-5-iphone-salta-tira-pugni-ma-ancora-non-lava-i-piatti-r1-il-robot-cinese-che-sta-sconvolgendo-il-web/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news #cyberthreatintelligence #innovation #privacy&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/114/959/753/349/742/657/original/8b05e68715b57a85.jpeg&#34;&gt; 
    </content>
    <updated>2025-08-02T16:57:07&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsrzv9awdtpvwr3a9eynex55qfy8q6jjxv7dj64n7drgtre0kpfweqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v25srtqr</id>
    
      <title type="html">Arriva Koske: il malware per Linux sviluppato con ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsrzv9awdtpvwr3a9eynex55qfy8q6jjxv7dj64n7drgtre0kpfweqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v25srtqr" />
    <content type="html">
      Arriva Koske: il malware per Linux sviluppato con l’Intelligenza Artificiale&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/arriva-koske-il-malware-per-linux-sviluppato-con-lintelligenza-artificiale/&#34;&gt;https://www.redhotcyber.com/post/arriva-koske-il-malware-per-linux-sviluppato-con-lintelligenza-artificiale/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news #cyberthreatintelligence #innovation #privacy&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/114/920/011/037/806/520/original/aa87c30ad4849e3d.jpeg&#34;&gt; 
    </content>
    <updated>2025-07-26T16:30:07&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs9eh2wjn93fgtqd3h6re3ctmu789trcp3qpj7hcnckwuhdhuzkgrqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2nlrqnq</id>
    
      <title type="html">Un raggio di luce da 265 milioni di km: l’ESA stabilisce il ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs9eh2wjn93fgtqd3h6re3ctmu789trcp3qpj7hcnckwuhdhuzkgrqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2nlrqnq" />
    <content type="html">
      Un raggio di luce da 265 milioni di km: l’ESA stabilisce il primo collegamento ottico per l’internet del futuro&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/un-raggio-di-luce-da-265-milioni-di-km-lesa-stabilisce-il-primo-collegamento-ottico-per-linternet-del-futuro/&#34;&gt;https://www.redhotcyber.com/post/un-raggio-di-luce-da-265-milioni-di-km-lesa-stabilisce-il-primo-collegamento-ottico-per-linternet-del-futuro/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news #cyberthreatintelligence #innovation #privacy&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://mastodon.bida.im/system/media_attachments/files/114/844/730/794/030/056/original/f32cc1c70b3c1fab.jpeg&#34;&gt; 
    </content>
    <updated>2025-07-13T09:25:22&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs85ptpha9new6zqrm4e74srffastf0asckyskk7tehzf0n5sret7gzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2lgvvy5</id>
    
      <title type="html">Sarai disposto a spendere 3.500 dollari per un iPhone? Donald ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs85ptpha9new6zqrm4e74srffastf0asckyskk7tehzf0n5sret7gzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2lgvvy5" />
    <content type="html">
      Sarai disposto a spendere 3.500 dollari per un iPhone? Donald Trump sfida di nuovo Apple&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/sarai-disposto-a-spendere-3-500-dollari-per-un-iphone-donald-trump-sfida-di-nuovo-apple/&#34;&gt;https://www.redhotcyber.com/post/sarai-disposto-a-spendere-3-500-dollari-per-un-iphone-donald-trump-sfida-di-nuovo-apple/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news #cyberthreatintelligence #innovation #privacy #engineering #intelligence #intelligenzaartificiale #informationsecurity #ethicalhacking #dataprotection #cybersecurityawareness #cybersecuritytraining #cybersecuritynews #infosecurity
    </content>
    <updated>2025-05-25T09:00:16&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsvstlvd9qtldjpfvxrjtw4hw653xfkmj8a4qf4wrjd8dcte2x6lpczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2c58dtc</id>
    
      <title type="html">“Italia, Vergognati! Paese Mafioso!”. Insulti di Nova ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsvstlvd9qtldjpfvxrjtw4hw653xfkmj8a4qf4wrjd8dcte2x6lpczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2c58dtc" />
    <content type="html">
      “Italia, Vergognati! Paese Mafioso!”. Insulti di Nova all’Italia dopo l’Attacco al Comune di Pisa&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/italia-vergognati-paese-mafioso-insulti-di-nova-allitalia-dopo-lattacco-al-comune-di-pisa/&#34;&gt;https://www.redhotcyber.com/post/italia-vergognati-paese-mafioso-insulti-di-nova-allitalia-dopo-lattacco-al-comune-di-pisa/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;I black hacker di NOVA tornano a colpire, e questa volta con insulti all’Italia dopo la #pubblicazione dei #dati del presunto #attacco #informatico al Comune di Pisa. Dopo aver rivendicato l’attacco il 10 maggio 2025, il gruppo #criminale ha pubblicato i primi #dati rubati, esattamente 11 giorni dopo l’annuncio sul loro #forum #underground.&lt;br/&gt;&lt;br/&gt;#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news #cyberthreatintelligence #innovation #privacy #engineering #intelligence #intelligenzaartificiale #informationsecurity #ethicalhacking #dataprotection #cybersecurityawareness #cybersecuritytraining #cybersecuritynews #infosecurity
    </content>
    <updated>2025-05-23T10:38:35&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsdgsu9xat52qp3qlpqepzajksazmyrxsn8dmkac6ceqhew7jfvpvczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2ggs0ja</id>
    
      <title type="html">Microsoft licenzia 6000 persone e la Direttrice dell’IA: “Ho ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsdgsu9xat52qp3qlpqepzajksazmyrxsn8dmkac6ceqhew7jfvpvczypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2ggs0ja" />
    <content type="html">
      Microsoft licenzia 6000 persone e la Direttrice dell’IA: “Ho dato tutto, ma non è bastato”&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/microsoft-licenzia-6000-persone-e-la-direttrice-dellia-ho-dato-tutto-ma-non-e-bastato/&#34;&gt;https://www.redhotcyber.com/post/microsoft-licenzia-6000-persone-e-la-direttrice-dellia-ho-dato-tutto-ma-non-e-bastato/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news #cyberthreatintelligence #innovation #privacy #engineering #intelligence #intelligenzaartificiale #informationsecurity #ethicalhacking #dataprotection #cybersecurityawareness #cybersecuritytraining #cybersecuritynews #infosecurity
    </content>
    <updated>2025-05-17T09:16:00&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsvetqmayrceq4mt5aux4uxs77txjwte22c4tn876t77gjq47y0qwgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2femcgg</id>
    
      <title type="html">Microsoft Patch Tuesday Aprile 2025. 121 bug di sicurezza ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsvetqmayrceq4mt5aux4uxs77txjwte22c4tn876t77gjq47y0qwgzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2femcgg" />
    <content type="html">
      Microsoft Patch Tuesday Aprile 2025. 121 bug di sicurezza corretti: 49 PE e 31 RCE&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/microsoft-patch-tuesday-aprile-2025-corrette-121-vulnerabilita-inclusa-una-pericolosa-zero-day-gia-attivamente-sfruttata/&#34;&gt;https://www.redhotcyber.com/post/microsoft-patch-tuesday-aprile-2025-corrette-121-vulnerabilita-inclusa-una-pericolosa-zero-day-gia-attivamente-sfruttata/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news #cyberthreatintelligence #innovation #privacy #engineering #intelligence #intelligenzaartificiale #informationsecurity #ethicalhacking #dataprotection #cybersecurityawareness #cybersecuritytraining #cybersecuritynews #infosecurity
    </content>
    <updated>2025-04-09T09:03:24&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs08wxlugppe8j8w6k5t4tm2mm4vlc2yvdqaq86gk3h0vuz6rdmgvqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2vpecgk</id>
    
      <title type="html">L’impegno di Fortinet nel secure by design: misurare i ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs08wxlugppe8j8w6k5t4tm2mm4vlc2yvdqaq86gk3h0vuz6rdmgvqzypgk43uprkwwulnnf8dgxuf04f03ekv6yvp0artulqts9u7upn6v2vpecgk" />
    <content type="html">
      L’impegno di Fortinet nel secure by design: misurare i progressi nella sicurezza informatica&lt;br/&gt;&lt;br/&gt;📌 Link all&amp;#39;articolo : &lt;a href=&#34;https://www.redhotcyber.com/post/limpegno-di-fortinet-nel-secure-by-design-misurare-i-progressi-nella-sicurezza-informatica/&#34;&gt;https://www.redhotcyber.com/post/limpegno-di-fortinet-nel-secure-by-design-misurare-i-progressi-nella-sicurezza-informatica/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news #cyberthreatintelligence #innovation #privacy #engineering #intelligence #intelligenzaartificiale #informationsecurity #ethicalhacking #dataprotection #cybersecurityawareness #cybersecuritytraining #cybersecuritynews #infosecurity
    </content>
    <updated>2025-03-24T07:09:52&#43;01:00</updated>
  </entry>

</feed>